End-to-end authentication is a critical necessity in 5G networks due to increasing device demands and autonomously transmitted user data. A difficult problem in obtaining shared information is the lack of data-related characteristics and the communicating network. Furthermore, due to the network's lack of traceability and handoff, managing protection for the created data is impractical. The non-redundant traffic authentication scheme (NRTAS) is proposed with the aim of authenticating data sources and contact traffic through active user equipment. This scheme provides more efficient non-replicated authentication by classifying traffic based on its errors. Using a differential private key, the classified traffic is authenticated in a linear or discrete way. The suggested scheme's mechanism is tailored to all of the available contact slots, increasing the likelihood of success. Non-redundant authentication eliminates information sharing overhead while simultaneously achieving the shortest access time and response delay.