This paper presents a comprehensive survey of existing authentication andprivacy-preserving schemes for 4G and 5G cellular networks. We start byproviding an overview of existing surveys that deal with 4G and 5Gcommunications, applications, standardization, and security. Then, we give aclassification of threat models in 4G and 5G cellular networks in fourcategories, including, attacks against privacy, attacks against integrity,attacks against availability, and attacks against authentication. We alsoprovide a classification of countermeasures into three types of categories,including, cryptography methods, humans factors, and intrusion detectionmethods. The countermeasures and informal and formal security analysistechniques used by the authentication and privacy preserving schemes aresummarized in form of tables. Based on the categorization of the authenticationand privacy models, we classify these schemes in seven types, including,handover authentication with privacy, mutual authentication with privacy, RFIDauthentication with privacy, deniable authentication with privacy,authentication with mutual anonymity, authentication and key agreement withprivacy, and three-factor authentication with privacy. In addition, we providea taxonomy and comparison of authentication and privacy-preserving schemes for4G and 5G cellular networks in form of tables. Based on the current survey,several recommendations for further research are discussed at the end of thispaper.
展开▼