This paper analyzes authentication and key agreement protocols for heterogeneous networks in next-generation environments, emphasizing the need for secure identification and authorization of mobile nodes. Existing methods and frameworks, including contributions from the HOKEY working group and others, are evaluated for their strengths and weaknesses regarding security mechanisms. The research highlights the dynamic nature of future networks and proposes approaches to address emerging security threats associated with multiple operators managing core network connectivity.