Table 7 An examination of the bandwidth utilization of the proposed protocol, in contrast to multiple AKA protocols discussed in the literature, n represents to the number of IoVT devices and a represents to the number of authentication parameters sent to MME by UDM.

From: A secure group-based authentication protocol for IoVT in 5G-enabled smart transportation and road safety systems

Protocol

Bandwidth consumption (Bits)

P1: 5G-AKA33

1920n

P2: Gharsallah rq s AKA10

848n + 656

P3: EPS-AKA50

n(592 + 544a)

P4: Miao’s AKA16

1760n + 1472

P5: Ouaissa’s AKA18

960n + 1344

P6: SEGB-AKA40

1600n + 1912

P7: EG-AKA39

1600n + 1088

P8: GLARAM43

1840n + 1860

P9: Choi’s AKA46

1200n + 1408

P10: Fu’s AKA48

2112n

P11: Proposed Protocol

768n + 672