Next Article in Journal
Cost-Effectiveness of Structural Health Monitoring in Aviation: A Literature Review
Previous Article in Journal
The AMEE-PPI Method to Extract Typical Outcrop Endmembers from GF-5 Hyperspectral Images
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Evaluating Transport Layer Security 1.3 Optimization Strategies for 5G Cross-Border Roaming: A Comprehensive Security and Performance Analysis

by
Jhury Kevin Lastre
,
Yongho Ko
,
Hoseok Kwon
and
Ilsun You
*
Department of Cyber Security, Kookmin University, Seoul 02707, Republic of Korea
*
Author to whom correspondence should be addressed.
Sensors 2025, 25(19), 6144; https://doi.org/10.3390/s25196144
Submission received: 9 September 2025 / Revised: 29 September 2025 / Accepted: 2 October 2025 / Published: 4 October 2025
(This article belongs to the Section Internet of Things)

Abstract

Cross-border Fifth Generation Mobile Communication (5G) roaming requires secure N32 connections between network operators via Security Edge Protection Proxy (SEPP) interfaces, but current Transport Layer Security (TLS) 1.3 implementations face a critical trade-off between connection latency and security guarantees. Standard TLS 1.3 optimization modes either compromise Perfect Forward Secrecy (PFS) or suffer from replay vulnerabilities, while full handshakes impose excessive latency penalties for time-sensitive roaming services. This research introduces Zero Round Trip Time Forward Secrecy (0-RTT FS), a novel protocol extension that achieves zero round-trip performance while maintaining comprehensive security properties, including PFS and replay protection. Our solution addresses the fundamental limitation where existing TLS 1.3 optimizations sacrifice security for performance in international roaming scenarios. Through formal verification using ProVerif and comprehensive performance evaluation, we demonstrate that 0-RTT FS delivers 195.0 μ s handshake latency (only 17% overhead compared to insecure 0-RTT) while providing full security guarantees that standard modes cannot achieve. Security analysis reveals critical replay vulnerabilities in all existing standard TLS 1.3 optimization modes, which our proposed approach successfully mitigates. The research provides operators with a decision framework for configuring sub-millisecond secure handshakes in next-generation roaming services, enabling both optimal performance and robust security for global 5G connectivity.

1. Introduction

Fifth Generation Mobile Communication (5G) technology has established itself as a cornerstone pillar for modern telecommunications, facilitating ultra-high-speed data transfer and ultra-low-latency services that support the growth of globally interconnected applications [1]. As 5G networks expand worldwide, cross-border roaming functionality has become indispensable, serving millions of users who depend on uninterrupted international mobile services for business operations, travel requirements, and everyday communication needs. The foundation of this international connectivity relies on the N32 interface operating between Security Edge Protection Proxies (SEPPs), which ensures secure communication across Public Land Mobile Networks (PLMNs) [2].
The N32 interface operates through a two-phase framework designed to establish and maintain secure communications between network functions. The initial N32-c phase handles system establishment by negotiating capabilities and configuring security parameters, with 3rd Generation Partnership Project (3GPP) standards mandating the use of Transport Layer Security (TLS) [3] 1.3 full handshake protocols for primary authentication [2,4]. Once established, the N32-f phase takes over to manage ongoing service message transmission, offering flexible communication pathways—either through direct bilateral exchanges using TLS 1.3 full handshake mechanisms, or through mediated scenarios that implement the Protocol for N32 Interconnect Security (PRINS) framework [2,4], while the full handshake implementation is mandatory according to 3GPP standards, TLS 1.3 itself inherently provides optimization capabilities, including Pre-Shared Key (PSK), PSK-(Elliptic Curve) Diffie–Hellman Ephemeral (PSK-(EC)DHE), and Zero Round Trip Time (0-RTT) modes, which enable efficient session resumption that reduces computational overhead and enhances overall network performance.
A critical challenge in current N32-f implementations is the mandatory use of the TLS 1.3 full handshake for every connection, which incurs substantial latency overhead and degrades user experience in international roaming. This issue is amplified by the inherent round-trip delays of cross-border communications, where authentication often traverses multiple network hops across continents. Although TLS 1.3 provides optimization modes such as PSK-based resumption and 0-RTT that could significantly reduce connection setup time, their applicability and security implications for N32-f remain unexamined. Addressing this gap is crucial, as mobile services demand both ultra-low latency and rigorous security. To date, no work has offered a comprehensive, evidence-based assessment that combines formal verification and controlled performance evaluation of TLS 1.3 optimization strategies in the context of 5G roaming. Such analysis is particularly urgent given that N32-based inter-operator authentication must span multiple administrative domains, endure variable latency conditions, and still satisfy strict international security requirements [5].
To date, no prior work has provided a comprehensive, evidence-based assessment that integrates formal security verification with controlled performance evaluation of TLS 1.3 optimization strategies specifically for 5G roaming environments. The absence of such analysis is particularly critical given that inter-operator authentication over N32 involves signaling that traverses multiple administrative domains, experiences variable latency conditions, and must comply with strict international security requirements [5].
Motivated by these challenges, this paper presents the first systematic evaluation of TLS 1.3 handshake options for 5G roaming, combining:
  • Comprehensive analysis of the 5G roaming authentication environment, identifying operational constraints, threat vectors, and security requirements specific to cross-border inter-operator communication.
  • Formal verification of each TLS 1.3 option’s cryptographic properties—confidentiality, integrity, authentication, and PFS—using pi-calculus–based ProVerif, aligned with the highest assurance level defined in ISO/IEC 29128-1:2023 [6].
  • Controlled performance analysis of N32-c negotiation and N32-f protection under roaming conditions, measuring handshake latency, and computational overhead.
  • Proposal of 0-RTT FS as an option for TLS 1.3 handshake that balances performance and security in the N32 interface for 5G roaming scenarios.
  • Proposal of a deployment-oriented decision framework that leverages the identified security–performance trade-offs to guide MNOs in selecting TLS 1.3 modes according to roaming requirements, threat models, and application criticality.
The remainder of this paper is organized as follows: Section 2 reviews related work on TLS 1.3 and 5G roaming security. Section 3 analyzes TLS 1.3 handshake options for the N32 interface and introduces our proposed 0-RTT FS approach. Section 4 presents the formal verification model and methodology using ProVerif. Section 5 describes the simulation environment, experimental setup, and performance results under varied roaming conditions. Section 6 synthesizes the identified security–performance trade-offs into a practical deployment decision framework, and Section 7 concludes with final remarks and future research directions.

2. Background and Related Work

2.1. 5G Network Architecture and Roaming

5G’s service-based architecture (SBA) fundamentally transforms cross-border roaming through disaggregated network functions and enhanced security mechanisms. The evolution from 4th Generation Mobile Network Technology (4G)/Long Term Evolution (LTE) elements to 5G equivalents creates new optimization opportunities: Access and Mobility Management Function (AMF) replaces the Mobility Management Entity (MME) with enhanced mobility management, Session Management Function (SMF) [7] supersedes the Packet Data Network Gateway Control Plane (PGW-C) with improved session handling, and User Plane Function (UPF) evolution from Packet Data Network Gateway User Plane (PGW-U) enables flexible deployment models crucial for roaming optimization.
The architectural transformation enables two primary roaming models with distinct performance characteristics. Local Breakout (LBO) roaming terminates data traffic locally in the visited network [8], achieving reduced latency for internet-bound services but requiring enhanced security coordination. Home Routed (HR) roaming maintains data paths through the home network, preserving service policies while introducing additional latency overhead [9] that TLS optimizations can potentially mitigate.
The evolution from legacy diameter-based roaming to 5G Service-Based Architecture fundamentally transforms international mobile connectivity through the SEPP framework [10]. Figure 1 shows this architectural shift which introduces the N32 interface as the critical communication pathway between home and visiting networks, operating through two distinct phases: N32-c for initial handshake and capability negotiation, and N32-f for ongoing message forwarding with application-layer security protection.
The SEPP deployment model offers two primary security approaches that directly impact TLS 1.3 implementation strategies. The direct TLS model enables bilateral connections between operators, providing optimal performance through standard TLS 1.3 handshakes. However, this approach requires extensive bilateral certificate management and may not accommodate complex roaming value chains. Alternatively, the Protocol for N32 Interconnect Security (PRINS) model supports mediated roaming through IP eXchange (IPX) providers but introduces substantial performance overhead. PRINS implementation adds 50–100 ms latency compared to direct TLS connections while reducing throughput by 15–25% due to JSON message reformatting requirements and additional cryptographic operations [2]. Although PRINS introduces additional overhead compared to direct TLS channels, many operators still deploy it because it aligns with existing roaming hub and IPX business models. By using PRINS, operators can delegate trust management, routing, and interoperability to centralized intermediaries, which reduces the need for maintaining numerous bilateral TLS agreements with individual partners [11]. In addition, hub providers often offer value-added services such as signaling analytics, filtering, and policy enforcement, which operators may prefer to retain in their roaming ecosystem [12]. These operational and business factors help explain why PRINS continues to see adoption despite its higher performance cost.
Despite these deployment model options, current industry deployments reveal concerning performance challenges that underscore the critical need for TLS 1.3 optimization. The complex certificate management requirements, manual policy negotiations, and limited SEPP vendor ecosystem create substantial operational bottlenecks that impact user experience and deployment timelines.

2.2. Advancements in TLS Enable Mobile Network Optimization Opportunities

The TLS 1.3 specification, defined in Request for Comments (RFCs) 8446, introduces fundamental improvements that directly address mobile network performance requirements [3]. The reduction from 2-RTT to 1-RTT handshake completion provides immediate latency benefits, particularly valuable in high-latency mobile environments where RTT can exceed 200 ms. The protocol’s 0-RTT resumption capability enables immediate application data transmission [13] for returning clients, potentially eliminating handshake latency entirely for frequent roaming scenarios.
TLS 1.3 also removes obsolete and vulnerable features from earlier versions, such as static Rivest–Shamir–Adleman (RSA) key exchange and compression. This results in a smaller attack surface and reduces message complexity, which is especially beneficial for mobile devices with constrained processing capabilities [14]. Mobile-specific optimizations include support for compressed certificates, defined in RFC 8879, which significantly reduce handshake size and bandwidth usage. This is crucial for mobile connections that are often metered or limited in throughput [15].
The streamlined cipher suite negotiation process in TLS 1.3 allows for adaptive cipher selection based on device capabilities or network conditions. This supports more efficient cryptographic operations, helping to balance performance and energy consumption. TLS 1.3 mandates forward secrecy and restricts cipher suite choices to AEAD algorithms, such as AES-GCM and ChaCha20-Poly1305. This enhances both security and performance across various hardware platforms, including those that lack cryptographic acceleration [16].
Mobile-specific optimizations include compressed certificate support to reduce bandwidth consumption and adaptive cipher suite selection based on network conditions. Research on 450 MHz LTE-M networks demonstrates successful TLS 1.3 deployment in critical infrastructure applications, showing reduced power consumption and improved reliability in constrained environments [17]. Performance analysis reveals wolfSSL implementations showing 15% improvement in RSA handshakes and 6–7% improvements in (EC)DHE scenarios. The protocol’s enhanced key derivation using HKDF provides more efficient key material generation, particularly beneficial for mobile devices with limited computational resources. Cloudflare reports that 40% of TLS sessions utilize resumption, indicating substantial real-world optimization potential for roaming scenarios.

2.3. TLS 1.3 Full Handshake and PSK Option

TLS 1.3’s deployment on the N32 interface is highly efficient for secure roaming communication establishment between SEPPs, which is crucial for the 5G roaming architecture. The ability to establish and resume sessions quickly using various handshake modes minimizes latency and computational overhead, enabling faster roaming setup compared with traditional approaches. This reduction in handshake latency is particularly beneficial in roaming scenarios where efficient and swift inter-Public Land Mobile Network (PLMN) communication is essential. This paper covers the five TLS 1.3 scenarios:
  • Full handshake provides comprehensive security through complete certificate verification and key exchange. Offers strongest initial security guarantees with PFS, ideal for first-time roaming partner establishments between previously unconnected PLMNs.
  • PSK-Only relies solely on PSKs for authentication and session establishment. Efficient but lacks PFS. Suitable when PSKs are securely managed and key compromise risk is minimal.
  • PSK-(EC)DHE combines PSK authentication with ephemeral Diffie–Hellman key exchange. Provides both mutual authentication and PFS, making it suitable for high-security roaming scenarios.
  • 0-RTT enables immediate roaming data transmission in the first handshake message, reducing latency for session resumption. Uses PSKs but has security risks, including replay attacks and limited forward secrecy.
  • 0-RTT FS combines 0-RTT performance with PFS and anti-replay using resumption tickets containing server ephemeral public keys and server generated nonce. Clients perform local ephemeral DH to derive forward-secure early data encryption keys.
The TLS 1.3 options for N32 are suitable for roaming resumption scenarios because they can be secured with operator-negotiated credentials while also providing efficient, low-latency session establishment and resumption, which are essential for the quick and secure interactions required between SEPPs in different PLMNs. These options reduce computational overhead and resource usage, making them ideal for high-volume roaming traffic while maintaining strong security. Additionally, the ability to reuse established sessions simplifies roaming management and aligns well with N32’s need for streamlined and secure inter-operator communication, enhancing the overall performance and security of roaming services.

2.4. TLS 1.3 Protocol-Level Vulnerabilities

While TLS 1.3 represents a significant cryptographic advancement over previous versions, formal analysis has revealed several protocol-level vulnerabilities and cryptographic design limitations that affect the security guarantees of the protocol itself. These vulnerabilities stem from fundamental design choices in the protocol specification rather than implementation flaws, highlighting the inherent challenges in designing secure cryptographic protocols.
The most prominent cryptographic vulnerability in TLS 1.3 is the 0-RTT replay attack, which fundamentally compromises the protocol’s security model for early data transmission. However, this optimization introduces critical weaknesses: the early data lacks replay protection and provides only limited forward secrecy [18,19]. In particular, early data keys are derived exclusively from previously established PSKs without fresh (EC)DHE contribution, meaning that compromise of the PSK enables retrospective decryption of all 0-RTT data. Forward secrecy is restored once the handshake completes, but the early data itself remains vulnerable.
Protocol-level downgrade attacks remain viable against TLS 1.3 through cryptographic design limitations in version negotiation. Despite TLS 1.3’s enhanced downgrade protection mechanisms, the protocol’s backward compatibility requirements create cryptographic vulnerabilities that enable sophisticated downgrade attacks [20]. These attacks exploit the cryptographic design of the version negotiation process, where certain combinations of supported cipher suites and protocol versions can be manipulated by attackers to force connections into weaker cryptographic modes. The attacks succeed by exploiting gaps in the cryptographic binding between negotiated parameters and the resulting security context, allowing attackers to manipulate the handshake flow while maintaining valid cryptographic signatures.
Forward secrecy limitations in TLS 1.3’s PSK modes create long-term cryptographic vulnerabilities. Unlike the full TLS 1.3 handshake which provides PFS through ephemeral key exchange, PSK-only modes rely on long-term shared secrets that compromise the cryptographic property of forward secrecy [21]. If the PSK is compromised, all past and future communications using that PSK become cryptographically vulnerable to decryption. This represents a fundamental trade-off in the protocol design where performance optimization through PSK modes comes at the cost of long-term cryptographic security. Even when PSK is combined with ephemeral Diffie–Hellman key exchange, the initial authentication and key derivation steps still depend on the long-term PSK, creating a window of cryptographic vulnerability.
Mixed authentication modes in TLS 1.3 create cryptographic binding issues that can be exploited to bypass security guarantees. When TLS 1.3 combines different authentication mechanisms, such as certificate-based authentication with PSK, the cryptographic binding between these different security contexts may be insufficient [19]. This creates opportunities for attacks that exploit the transitions between different cryptographic modes within a single handshake, potentially allowing attackers to gain stronger authentication guarantees than they should possess or to manipulate the security context in ways that violate the protocol’s intended security model.
Session resumption cryptographic vulnerabilities create ongoing security risks through the reuse of cryptographic material. The protocol’s session resumption mechanism, while providing performance benefits, extends the cryptographic lifetime of key material beyond individual sessions [19]. This creates a fundamental tension between performance optimization and cryptographic security, as longer-lived cryptographic secrets provide larger attack windows and reduce the overall security guarantees of the protocol.
These protocol-level vulnerabilities demonstrate that even carefully designed modern protocols like TLS 1.3 [3] face fundamental security challenges that arise from the inherent complexity of cryptographic protocol design. The extensive formal analysis efforts that have characterized TLS 1.3’s evaluation [18,22,23] continue to reveal subtle but significant vulnerabilities that require ongoing attention from both the cryptographic research community and protocol implementers.

2.5. Direct TLS Approach

In the Direct TLS model, SEPPs from two distinct PLMNs establish mutual TLS (mTLS) connections without the involvement of intermediary service providers or roaming hubs. The architecture maintains a clear security perimeter where each PLMN retains full control over its cryptographic keys, certificate management, and trust relationships. This bilateral approach ensures that sensitive signaling information traverses only a single encrypted tunnel between the communicating parties, providing the strongest possible security guarantees for inter-PLMN communication. Figure 2 shows the typical roaming TLS connection setup between the initiating SEPP (i-SEPP) and the responding SEPP (r-SEPP). The Direct TLS establishment process involves two distinct phases: the N32-c (control plane) handshake for capability negotiation and security parameter exchange, and the N32-f (forwarding plane) connection setup for actual service message transmission. Both connections utilize separate mTLS tunnels, with the N32-c connection typically being short-lived and used for periodic control exchanges, while N32-f connections are maintained as long-lived channels optimized for high-throughput message forwarding.
Step 1: Client Hello Initiation. The initiating SEPP (i-SEPP) establishes a TCP connection to the responding SEPP (r-SEPP) and sends a TLS Client Hello message to initiate the TLS handshake. This message includes the supported cipher suites and adds the selected r-SEPP FQDN(s) to the Server Name Indication (SNI) extension, enabling the r-SEPP to select the appropriate certificate if multiple certificates are available.
Step 2: Server Certificate Exchange and Key Setup. The r-SEPP responds according to TLS protocols by sending a sequence of messages: Server Hello with the selected cipher suite (2a), Certificate containing the certificate chain up to but not including the root Certificate Authority (CA) (2b), Server Key Exchange (2c), Certificate Request which may indicate trusted Root CAs (2d), and Server Hello Done (2e). The leaf server certificate contains the r-SEPP FQDN in the Common Name and includes all PLMN IDs in the SAN records for which the SEPP intends to use the N32 connection. The certificate is signed by the subCA certificate of the respective PLMN, which in turn is signed by the root CA of the respective PLMN.
Step 3: Client Certificate Authentication and Key Exchange. The i-SEPP performs certificate validation by matching the PLMN ID of the well-known FQDN to the SAN records and verifying the certificate chain against the list of Root CAs in the trust anchor. Subsequently, the i-SEPP sends its TLS client certificate to the r-SEPP containing its FQDN in the CN and SAN records with additional FQDNs for each supported PLMN ID (3a), followed by Client Key Exchange (3b), Certificate Verify with the certificate verification result (3c), Change Cipher Spec (3d), and Encrypted Handshake Message (3e).
Step 4: Handshake Completion and Secure Channel Establishment. The r-SEPP performs the same security checks as the i-SEPP, verifying that at least one SAN entry in the client TLS certificate contains a PLMN ID and that the certificate chain is anchored at one of the root CAs included in the selected trust anchor. The handshake concludes with the r-SEPP sending Change Cipher Spec (4a) and Encrypted Handshake Message (4b), completing the bidirectional mTLS handshake and establishing the secure communication channel between both PLMNs.

2.5.1. N32-c Handshake

The N32-c handshake procedure serves to create an N32-f context, which represents a communication session between two network endpoints identified by their FQDN:PORT combinations. This N32-f context is defined as a bidirectional connection pair linking the FQDN:PORT of the initiating SEPP with the FQDN:PORT of the responding SEPP. Figure 3 shows the N32-c handshake process.

2.5.2. N32-f Connection Setup

Following the completion of the N32-c handshake, a persistent mTLS connection can be established from the initiating SEPP in PLMN A to the responding SEPP in PLMN B to handle Network Function service requests originating from PLMN A and destined for PLMN B. Additionally, a second persistent mTLS connection may be established in the reverse direction, from PLMN B to PLMN A, to accommodate NF service requests flowing from PLMN B back to PLMN A. The same procedure and security checks as defined in Section 2.5 shall be used to set up the long-lived mTLS tunnel from i-SEPP to r-SEPP.

3. N32 Interface: TLS 1.3 Handshake Options for Inter-PLMN Communication

3.1. Options (a–d): Standard TLS 1.3 Resumption Modes

The N32 interface facilitates secure communication between SEPPs across different PLMNs in 5G architecture. This section analyzes the TLS 1.3 handshake options available in the N32 interface, with emphasis on their role during session resumption and reconnection. In accordance with 3GPP standards and Global System for Mobile Communications Association (GSMA) guidelines, the initial inter-PLMN connection establishment over N32-c and N32-f must always use a full certificate-based mutual TLS (mTLS) handshake anchored in the GSMA Public Key Infrastructure (PKI). Only after such an initial authenticated session has been established can PSK-based resumption options be considered.
The N32 interface implements a two-phase security establishment process: the initial N32-c (N32 control) handshake for capability negotiation, followed by N32-f (N32 forwarding) connection setup for long-lived inter-PLMN data exchange. The initial phase always requires a full mTLS handshake, while subsequent reconnections may employ one of several TLS 1.3 resumption modes:
  • Option (a)—Certificate-Based full handshake (Initial Setup) employs X.509 certificate chains with PLMN identifiers embedded in SAN extensions. Provides mutual authentication through ECDSA signatures and achieves forward secrecy via (EC)DHE key exchange. Certificate validation against GSMA/RAEX trust anchors ensures PLMN identity verification. This mode is mandatory for the first connection between SEPP peers.
  • Option (b)—Resumption: PSK-Only Mode utilizes a resumption PSK (PSK) derived from a prior full mTLS handshake. No certificate exchange occurs, reducing latency and overhead. However, forward secrecy is not preserved since the session relies solely on the previously derived PSK.
  • Option (c)—Resumption: PSK with (EC)DHE combines resumption PSK authentication with ephemeral key exchange, providing both efficiency and forward secrecy. The hybrid approach derives the handshake secret from both the PSK and a fresh (EC)DHE shared secret: Handshake_Secret = HKDF-Extract(Early_Secret, (EC)DHE_shared_secret). This mode is generally recommended for reconnections.
  • Option (d)—Resumption: PSK with 0-RTT extends PSK-based resumption by allowing early data transmission, reducing reconnection latency. Early application data are protected using the early_traffic_secret derived during the resumption handshake, while attractive for performance, this mode is generally considered unsafe for SEPP roaming due to replay attack risks, and is disabled in most deployments.
For N32 security establishment between PLMNs, the initial connection must use a full certificate-based TLS 1.3 handshake with mutual authentication (mTLS). Once this secure session is established, subsequent connections can leverage PSK-based resumption options, including PSK-only, PSK-(EC)DHE, and PSK with 0-RTT, to achieve performance improvements while maintaining varying levels of security assurance. Figure 4 illustrates these TLS 1.3 handshake options as they relate to N32 resumption scenarios, while Section Abbreviations provides definitions for the notations and symbols used throughout this analysis.

3.2. The Proposed Option (e): 0-RTT FS with Forward Secrecy and Replay Protection

We propose a new approach called 0-RTT FS, as Option (e) shown in Figure 4, which enhances TLS 1.3’s early data mechanism by adding PFS while maintaining zero round-trip latency. Standard 0-RTT derives early-data keys solely from a PSK, making past communications vulnerable if the PSK is later compromised.
0-RTT FS solves this by combining the PSK with a fresh ephemeral Diffie–Hellman shared secret, computed between a client-generated ephemeral key and a server ephemeral key embedded in the resumption ticket. Each resumption ticket contains both the server’s ephemeral public key and a unique server-generated nonce that are cryptographically bound into the key derivation process. The early-data encryption keys are derived from the combination of PSK, ephemeral DH shared secret, and server nonce using HKDF, ensuring that compromised long-term keys or expired tickets cannot decrypt past early data. The protocol implements anti-replay protection through a simple yet effective mechanism: each server-generated nonce embedded in tickets can only be used once and is tracked in a server-side cache with configurable Time To Live (TTL). Replay attacks are detected and rejected when the server nonce has already been consumed, providing strong replay resistance with minimal server state requirements. The security benefits of forward secrecy and enhanced replay protection justify this trade-off for security-sensitive applications.
All options terminate with the establishment of bidirectional N32-f connections protected by AES-256-GCM with AEAD. The security properties vary by option: certificate-based modes (a) provide PKI-based trust establishment, while PSK modes (b,c,d) rely on bilateral agreements. Forward secrecy is preserved in options (a) and (c) through (EC)DHE key exchange, while option (d) additionally enables 0-RTT data transmission for latency-critical applications. Option (e) uniquely combines the latency advantage of 0-RTT with full forward secrecy and robust replay protection, achieved through ephemeral key integration and single-use server nonce validation.

4. Formal Verification

Formal verification is necessary because manual analysis alone often fails to uncover subtle flaws in cryptographic protocols [24,25], and vulnerabilities in handshake design can have critical consequences in 5G roaming security. To ensure rigorous evaluation of TLS 1.3 handshake variants, we employ ProVerif, a symbolic model checker based on the applied pi-calculus and the Dolev–Yao adversary model. ProVerif has been widely used for protocols such as TLS 1.3 and Signal [26,27], and its automated verification of secrecy, authentication, and correspondence properties makes it well-suited for our roaming context. As shown in Figure 5, ProVerif belongs to the category of unbounded model checking tools, meaning it can analyze protocols with an arbitrary number of sessions and messages rather than being restricted to finite state spaces.

4.1. Security Models and Algorithmic Framework

The paper implements six key algorithms for formal verification using ProVerif with pi-calculus methodology aligned with ISO/IEC 29128-1:2023 standards.
Algorithm 1 establishes the formal verification framework by defining channel specifications for secure communication, security requirement verification queries (Q1–Q6), and event definitions for protocol step validation. This foundational algorithm creates the symbolic model checker environment under the Dolev–Yao adversary model, where the attacker has complete control over the network but cannot break cryptographic primitives.
Algorithm 1 Declaration & Queries
1:
(* Channel specification *)
2:
free c: channel.
3:
free sp: channel [private].
4:
(* Type specification *)
5:
type G, exponent, label, keyid, key.
6:
(* Application Data specification *)
7:
free App Data1, App Data2, App Data3: bitstring [private].
8:
(* TLS 1.3 Label specification *)
9:
const p_b_binder, c_e_traffic : label.
10:
(* Queries specification *)
11:
event S_STEP1_C_to_S(keyid, key, bitstring, bitstring, bitstring).
12:
event E_STEP1_C_to_S(keyid, key, bitstring, bitstring, bitstring).
13:
event S_STEP2_S_to_C(keyid, key, label, bitstring).
14:
event E_STEP2_S_to_C(keyid, key, label, bitstring).
15:
event S_STEP3_C_to_S(keyid, key, label, bitstring).
16:
event E_STEP3_C_to_S(keyid, key, label, bitstring).
17:
(* Security requirements verification *)
18:
query kid: keyid, psk: key, rand: bitstring, binder: bitstring, ClienttHello: bitstring;
19:
Q1: inj-event(E_STEP1_C_to_S(kid, psk, rand, binder, ClienttHello))
20:
    ==> inj-event(S_STEP1_C_to_S(kid, psk, rand, binder, ClienttHello)).
21:
query kid: keyid, k: key, lb_finished: label, aead_finished: bitstring;
22:
Q2: inj-event(E_STEP2_S_to_C(kid, k, lb_finished, aead_finished))
23:
    ==> inj-event(S_STEP2_S_to_C(kid, k, lb_finished, aead_finished)).
24:
query kid: keyid, k: key, lb_finished: label, aead_finished: bitstring;
25:
Q3: inj-event(E_STEP3_C_to_S(kid, k, lb_finished, aead_finished))
26:
    ==> inj-event(S_STEP3_C_to_S(kid, k, lb_finished, aead_finished)).
27:
(* Secrecy verification *)
28:
Q4: query attacker(App Data1).
29:
Q5: query attacker(App Data2).
30:
Q6: query attacker(App Data3).
Algorithm 2 initializes a fresh ‘session_id’ and ‘psk’, then runs vSEPP (client) and hSEPP (server) in parallel with unbounded replication to allow arbitrary interleavings and replays. In ‘phase 1’, it outputs ‘initial_psk’ on ‘c’ to model post-handshake key exposure, enabling forward secrecy evaluation.
Algorithm 3 implements the full handshake approach with complete certificate-based authentication, featuring mutual certificate verification against RAEX trust anchors, (EC)DHE key exchange for PFS, and PLMN ID validation in certificate SAN records. This algorithm provides the strongest initial security guarantees through comprehensive certificate verification and key exchange, making it ideal for first-time roaming partner establishments between previously unconnected PLMNs.
Algorithm 4 presents the PSK-only mode utilizing PSK authentication with efficient key derivation without certificate overhead, HKDF-based traffic key generation, and bilateral PSK agreement validation, while this approach eliminates certificate exchange overhead, it sacrifices forward secrecy, making it suitable when PSKs are securely managed and key compromise risk is minimal.
Algorithm 5 introduces the PSK-(EC)DHE hybrid approach that combines PSK efficiency with forward secrecy through PSK authentication with ephemeral key exchange, DHE shared secret integration into handshake secret derivation, and a balanced security-performance approach. This hybrid method provides both mutual authentication and PFS, making it suitable for high-security roaming scenarios.
Algorithm 6 implements standard 0-RTT with early data transmission capability, featuring immediate application data transmission, early traffic secret derivation, and session resumption capabilities. This algorithm reduces handshake latency for time-sensitive 5G network function communications but introduces security risks, including replay attacks and limited forward secrecy.
Algorithm 7 presents the novel 0-RTT FS contribution, enhancing standard 0-RTT with server ephemeral keys embedded in resumption tickets, client ephemeral key generation for each session, and combined PSK+DH secret derivation for forward secrecy. This innovative approach addresses fundamental limitations in standard TLS 1.3 early data mechanisms.
Table 1 summarizes the formal verification queries defined in our ProVerif model. Queries Q1–Q3 verify correspondence and injectivity properties that ensure mutual authentication and secure key exchange between client and server events. Queries Q4–Q6 focus on secrecy properties, checking whether application data remains confidential against an active Dolev–Yao adversary. Together, these six queries cover the core TLS 1.3 requirements of authentication, confidentiality, integrity, forward secrecy, and replay protection in the N32 roaming context
Algorithm 2 Main Process with FS
  • 1: (* Main Process *)
    2: process
    3:     new initial_sid: session_id;
    4:     new initial_psk: key;
    5:     
    6:     ( (!proc_vSEPP(initial_sid, initial_psk)) | (!proc_hSEPP()) |
    7:     phase 1; out(c, initial_psk)
    8:     )
Algorithm 3 TLS 1.3 full handshake option for N32 Roaming
1:
Input: supported_groups, certificate_chain, roaming_context
2:
Output: full handshake secure channel with forward secrecy
3:
Step 1: vSEPP ClientHello Generation
4:
     c l i e n t _ r a n d o m { 0 , 1 } 256
5:
     x Z q , c l i e n t _ k e y _ s h a r e g x
6:
     C l i e n t H e l l o ( t l s _ 1.3 , c l i e n t _ r a n d o m , c l i e n t _ k e y _ s h a r e , s u p p o r t e d _ g r o u p s , c e r t i f i c a t e _ k e )
7:
    Event  S _ S T E P 1 _ C _ t o _ S ( s e s s i o n _ i d , c l i e n t _ k e y _ s h a r e , c l i e n t _ r a n d o m , C l i e n t H e l l o , c e r t i f i c a t e _ k e )
8:
    Send ( C l i e n t H e l l o ) to hSEPP
9:
    Event  E _ S T E P 1 _ C _ t o _ S ( s e s s i o n _ i d , c l i e n t _ k e y _ s h a r e , c l i e n t _ r a n d o m , C l i e n t H e l l o , c e r t i f i c a t e _ k e )
10:
Step 2: hSEPP ServerHello and Certificate Exchange
11:
     y Z q , s e r v e r _ k e y _ s h a r e g y
12:
     s e r v e r _ r a n d o m { 0 , 1 } 256
13:
     S e r v e r H e l l o ( t l s _ 1.3 , s e r v e r _ r a n d o m , s e r v e r _ k e y _ s h a r e , c e r t i f i c a t e _ k e )
14:
    Event  S _ S T E P 2 _ S _ t o _ C ( s e s s i o n _ i d , s e r v e r _ k e y _ s h a r e , server_hello , S e r v e r H e l l o )
15:
    Send ( S e r v e r H e l l o , C e r t i f i c a t e , C e r t i f i c a t e R e q u e s t , S e r v e r H e l l o D o n e ) to vSEPP
16:
    Event  E _ S T E P 2 _ S _ t o _ C ( s e s s i o n _ i d , s e r v e r _ k e y _ s h a r e , server_hello , S e r v e r H e l l o )
17:
Step 3: vSEPP Certificate Verification and Key Exchange
18:
    Verify server certificate chain against RAEX trust anchor
19:
    Validate PLMN ID in server certificate SAN records
20:
     D H E _ s h a r e d ( s e r v e r _ k e y _ s h a r e ) x                   ▷ Client computes shared secret
21:
     E S H K D F . E x t r a c t ( 0 , 0 )                                ▷ No PSK input
22:
     H S H K D F . E x t r a c t ( D H E _ s h a r e d , d e r i v e _ s e c r e t ( E S , derived ) )               ▷ Includes DHE
23:
     ( t k c _ h s , t k s _ h s , t k c _ a p p , t k s _ a p p ) d e r i v e _ t r a f f i c _ k e y s ( H S , t r a n s c r i p t )
24:
    Event  S _ S T E P 3 _ C _ t o _ S ( s e s s i o n _ i d , t k c _ a p p , client_finished , F i n i s h e d )
25:
    Send ( C e r t i f i c a t e , C l i e n t K e y E x c h a n g e , C e r t i f i c a t e V e r i f y , F i n i s h e d ) to hSEPP
26:
    Event  E _ S T E P 3 _ C _ t o _ S ( s e s s i o n _ i d , t k c _ a p p , client_finished , F i n i s h e d )
27:
Step 4: hSEPP Certificate Verification and Session Completion
28:
    Verify client certificate chain against RAEX trust anchor
29:
    Validate PLMN ID in client certificate SAN records
30:
     D H E _ s h a r e d ( c l i e n t _ k e y _ s h a r e ) y                   ▷ Server computes shared secret
31:
    Recompute handshake and application keys using D H E _ s h a r e d
32:
    Verify client Finished message, send server Finished
Algorithm 4 TLS 1.3 PSK-only option for N32 Roaming
1:
Input:  P S K s h a r e d , P S K i d e n t i t y , roaming_context
2:
Output: PSK-only secure channel
3:
Step 1: vSEPP ClientHello Generation
4:
     c l i e n t _ r a n d o m { 0 , 1 } 256
5:
     C l i e n t H e l l o ( t l s _ 1.3 , c l i e n t _ r a n d o m , P S K i d e n t i t y , p s k _ k e )
6:
     E S H K D F . E x t r a c t ( P S K s h a r e d , 0 )
7:
     b i n d e r _ k e y d e r i v e _ s e c r e t ( E S , res_binder , C l i e n t H e l l o )
8:
     b i n d e r H M A C ( b i n d e r _ k e y , h a s h ( C l i e n t H e l l o ) )
9:
    Event  S _ S T E P 1 _ C _ t o _ S ( P S K i d e n t i t y , P S K s h a r e d , c l i e n t _ r a n d o m , C l i e n t H e l l o , b i n d e r )
10:
  Send ( C l i e n t H e l l o , b i n d e r ) to hSEPP
11:
  Event  E _ S T E P 1 _ C _ t o _ S ( P S K i d e n t i t y , P S K s h a r e d , c l i e n t _ r a n d o m , C l i e n t H e l l o , b i n d e r )
12:
Step 2: hSEPP ServerHello and Key Derivation
13:
    Verify b i n d e r using shared P S K s h a r e d
14:
     s e r v e r _ r a n d o m { 0 , 1 } 256
15:
     S e r v e r H e l l o ( t l s _ 1.3 , s e r v e r _ r a n d o m , P S K i d e n t i t y , p s k _ k e )
16:
     H S H K D F . E x t r a c t ( 0 , d e r i v e _ s e c r e t ( E S , derived ) )                  ▷ No DHE input
17:
     ( t k c _ h s , t k s _ h s , t k c _ a p p , t k s _ a p p ) d e r i v e _ t r a f f i c _ k e y s ( H S , t r a n s c r i p t )
18:
    Event  S _ S T E P 2 _ S _ t o _ C ( P S K i d e n t i t y , t k s _ a p p , server_finished , S e r v e r H e l l o )
19:
    Send ( S e r v e r H e l l o , F i n i s h e d ) to vSEPP
20:
    Event  E _ S T E P 2 _ S _ t o _ C ( P S K i d e n t i t y , t k s _ a p p , server_finished , S e r v e r H e l l o )
21:
Step 3: Session Completion
22:
    vSEPP verifies server Finished message
23:
    Event  S _ S T E P 3 _ C _ t o _ S ( P S K i d e n t i t y , t k c _ a p p , client_finished , F i n i s h e d )
24:
    Send client F i n i s h e d to hSEPP
25:
    Event  E _ S T E P 3 _ C _ t o _ S ( P S K i d e n t i t y , t k c _ a p p , client_finished , F i n i s h e d )
Algorithm 5 TLS 1.3 PSK-(EC)DHE option for N32 Roaming
1:
Input:  P S K s h a r e d , P S K i d e n t i t y , supported_groups
2:
Output: PSK-(EC)DHE secure channel with forward secrecy
3:
Step 1: vSEPP ClientHello with Key Share
4:
     c l i e n t _ r a n d o m { 0 , 1 } 256
5:
     x Z q , c l i e n t _ k e y _ s h a r e g x
6:
     C l i e n t H e l l o ( t l s _ 1.3 , c l i e n t _ r a n d o m , c l i e n t _ k e y _ s h a r e , P S K i d e n t i t y , p s k _ d h e _ k e )
7:
     E S H K D F . E x t r a c t ( P S K s h a r e d , 0 )
8:
     b i n d e r _ k e y d e r i v e _ s e c r e t ( E S , res_binder , C l i e n t H e l l o )
9:
     b i n d e r H M A C ( b i n d e r _ k e y , h a s h ( C l i e n t H e l l o ) )
10:
  Event  S _ S T E P 1 _ C _ t o _ S ( P S K i d e n t i t y , c l i e n t _ k e y _ s h a r e , c l i e n t _ r a n d o m , C l i e n t H e l l o , b i n d e r )
11:
  Send ( C l i e n t H e l l o , b i n d e r ) to hSEPP
12:
  Event  E _ S T E P 1 _ C _ t o _ S ( P S K i d e n t i t y , c l i e n t _ k e y _ s h a r e , c l i e n t _ r a n d o m , C l i e n t H e l l o , b i n d e r )
13:
Step 2: hSEPP ServerHello with DHE
14:
    Verify b i n d e r using shared P S K s h a r e d
15:
     y Z q , s e r v e r _ k e y _ s h a r e g y
16:
     D H E _ s h a r e d ( c l i e n t _ k e y _ s h a r e ) y
17:
     s e r v e r _ r a n d o m { 0 , 1 } 256
18:
     S e r v e r H e l l o ( t l s _ 1.3 , s e r v e r _ r a n d o m , s e r v e r _ k e y _ s h a r e , P S K i d e n t i t y , p s k _ d h e _ k e )
19:
     H S H K D F . E x t r a c t ( D H E _ s h a r e d , d e r i v e _ s e c r e t ( E S , derived ) )              ▷ Includes DHE
20:
     ( t k c _ h s , t k s _ h s , t k c _ a p p , t k s _ a p p ) d e r i v e _ t r a f f i c _ k e y s ( H S , t r a n s c r i p t )
21:
    Event  S _ S T E P 2 _ S _ t o _ C ( P S K i d e n t i t y , s e r v e r _ k e y _ s h a r e , server_finished , S e r v e r H e l l o )
22:
    Send ( S e r v e r H e l l o , F i n i s h e d ) to vSEPP
23:
    Event  E _ S T E P 2 _ S _ t o _ C ( P S K i d e n t i t y , s e r v e r _ k e y _ s h a r e , server_finished , S e r v e r H e l l o )
24:
Step 3: vSEPP Key Computation and Session Completion
25:
     D H E _ s h a r e d ( s e r v e r _ k e y _ s h a r e ) x
26:
    Recompute handshake and application keys using D H E _ s h a r e d
27:
    Verify server Finished message, send client Finished
28:
    Event  S _ S T E P 3 _ C _ t o _ S ( P S K i d e n t i t y , t k c _ a p p , client_finished , F i n i s h e d )
29:
    Event  E _ S T E P 3 _ C _ t o _ S ( P S K i d e n t i t y , t k c _ a p p , client_finished , F i n i s h e d )
Algorithm 6 TLS 1.3 0-RTT option for N32 Roaming
1:
Input:  P S K s h a r e d , P S K i d e n t i t y , early_data_context
2:
Output: 0-RTT channel with immediate data transmission
3:
Step 1: vSEPP Early Data Transmission
4:
     c l i e n t _ r a n d o m { 0 , 1 } 256
5:
     x Z q , c l i e n t _ k e y _ s h a r e g x
6:
     C l i e n t H e l l o ( t l s _ 1.3 , c l i e n t _ r a n d o m , e a r l y _ d a t a , c l i e n t _ k e y _ s h a r e , P S K i d e n t i t y , p s k _ d h e _ k e )
7:
     E S H K D F . E x t r a c t ( P S K s h a r e d , 0 )
8:
     c l i e n t _ e a r l y _ t r a f f i c _ s e c r e t d e r i v e _ s e c r e t ( E S , c_e_traffic , C l i e n t H e l l o )
9:
     e a r l y _ d a t a _ e n c r y p t e d A E A D . E n c r y p t ( c l i e n t _ e a r l y _ t r a f f i c _ s e c r e t , e a r l y _ d a t a _ c o n t e x t )
10:
   b i n d e r H M A C ( d e r i v e _ s e c r e t ( E S , res_binder ) , h a s h ( C l i e n t H e l l o ) )
11:
  Event  S _ S T E P 1 _ C _ t o _ S ( P S K i d e n t i t y , c l i e n t _ e a r l y _ t r a f f i c _ s e c r e t , c l i e n t _ r a n d o m , C l i e n t H e l l o , e a r l y _ d a t a _ e n c r y p t e d )
12:
  Send ( C l i e n t H e l l o , b i n d e r , e a r l y _ d a t a _ e n c r y p t e d ) to hSEPP               ▷ 0-RTT data
13:
  Event  E _ S T E P 1 _ C _ t o _ S ( P S K i d e n t i t y , c l i e n t _ e a r l y _ t r a f f i c _ s e c r e t , c l i e n t _ r a n d o m , C l i e n t H e l l o , e a r l y _ d a t a _ e n c r y p t e d )
14:
Step 2: hSEPP Early Data Processing
15:
    Verify b i n d e r using shared P S K s h a r e d
16:
     c l i e n t _ e a r l y _ t r a f f i c _ s e c r e t d e r i v e _ s e c r e t ( E S , c_e_traffic , C l i e n t H e l l o )
17:
     d e c r y p t e d _ e a r l y _ d a t a A E A D . D e c r y p t ( c l i e n t _ e a r l y _ t r a f f i c _ s e c r e t , e a r l y _ d a t a _ e n c r y p t e d )
18:
    Process early data immediately                ▷ No handshake completion wait
19:
     y Z q , s e r v e r _ k e y _ s h a r e g y
20:
    Event  S _ S T E P 2 _ S _ t o _ C ( P S K i d e n t i t y , s e r v e r _ k e y _ s h a r e , early_data_accept , d e c r y p t e d _ e a r l y _ d a t a )
21:
    Continue with standard PSK-(EC)DHE handshake completion
22:
    Event  E _ S T E P 2 _ S _ t o _ C ( P S K i d e n t i t y , s e r v e r _ k e y _ s h a r e , early_data_accept , d e c r y p t e d _ e a r l y _ d a t a )
23:
Step 3: Handshake Completion with End of Early Data
24:
    Complete DHE key exchange as in Algorithm 5
25:
    vSEPP sends E n d O f E a r l y D a t a message
26:
    Transition to handshake traffic keys, then application traffic keys
27:
    Event  S _ S T E P 3 _ C _ t o _ S ( P S K i d e n t i t y , t k c _ a p p , end_early_data , E n d O f E a r l y D a t a )
28:
    Event  E _ S T E P 3 _ C _ t o _ S ( P S K i d e n t i t y , t k c _ a p p , end_early_data , E n d O f E a r l y D a t a )
Algorithm 7 TLS 1.3 0-RTT FS option for N32 Roaming (Simplified)
1:
Input:  P S K s h a r e d , P S K i d e n t i t y , resumption_ticket, early_data_context
2:
Output: 0-RTT FS channel with forward secrecy and replay resistance
3:
Step 1: Client Early Data with Ephemeral Keys
4:
    Extract ( r _ S E P P _ e p h _ p u b , s e r v e r _ n o n c e , t i c k e t _ l i f e t i m e ) from resumption_ticket
5:
    if  c u r r e n t _ t i m e > t i c k e t _ l i f e t i m e  then reject fi
6:
    Generate ephemeral key pair: ( i _ S E P P _ e p h _ p r i v , i _ S E P P _ e p h _ p u b ) ( E C ) D H E . K e y G e n ( )
7:
     e p h e m e r a l _ s h a r e d X 25519 ( i _ S E P P _ e p h _ p r i v , r _ S E P P _ e p h _ p u b )
8:
     e a r l y _ s e c r e t H K D F . E x t r a c t ( P S K s h a r e d , e p h e m e r a l _ s h a r e d )
9:
     e a r l y _ k e y H K D F . E x p a n d ( e a r l y _ s e c r e t , early_traffic , t r a n s c r i p t )
10:
   n o n c e _ c o m m i t m e n t H M A C ( e a r l y _ k e y , s e r v e r _ n o n c e | | t i m e s t a m p )
11:
   e a r l y _ d a t a _ e n c r y p t e d A E A D . E n c r y p t ( e a r l y _ k e y , e a r l y _ d a t a _ c o n t e x t , n o n c e _ c o m m i t m e n t )
12:
  Event  S _ S T E P 1 _ C _ t o _ S ( P S K i d e n t i t y , e a r l y _ k e y , n o n c e _ c o m m i t m e n t , C l i e n t H e l l o , e a r l y _ d a t a _ e n c r y p t e d )
13:
  Send ( C l i e n t H e l l o , i _ S E P P _ e p h _ p u b , n o n c e _ c o m m i t m e n t , e a r l y _ d a t a _ e n c r y p t e d ) to hSEPP
14:
  Event  E _ S T E P 1 _ C _ t o _ S ( P S K i d e n t i t y , e a r l y _ k e y , n o n c e _ c o m m i t m e n t , C l i e n t H e l l o , e a r l y _ d a t a _ e n c r y p t e d )
15:
Step 2: Server Nonce Verification and Key Derivation
16:
     e p h e m e r a l _ s h a r e d X 25519 ( r _ S E P P _ e p h _ p r i v , i _ S E P P _ e p h _ p u b )
17:
     e a r l y _ s e c r e t H K D F . E x t r a c t ( P S K s h a r e d , e p h e m e r a l _ s h a r e d )
18:
     e a r l y _ k e y H K D F . E x p a n d ( e a r l y _ s e c r e t , early_traffic , t r a n s c r i p t )
19:
    if  H M A C . V e r i f y ( e a r l y _ k e y , s e r v e r _ n o n c e | | t i m e s t a m p , n o n c e _ c o m m i t m e n t ) = f a l s e  then reject
20:
    if  r e p l a y _ c a c h e . c o n t a i n s ( n o n c e _ c o m m i t m e n t )  then reject
21:
     d e c r y p t e d _ d a t a A E A D . D e c r y p t ( e a r l y _ k e y , e a r l y _ d a t a _ e n c r y p t e d , n o n c e _ c o m m i t m e n t )
22:
     r e p l a y _ c a c h e . a d d ( n o n c e _ c o m m i t m e n t , T T L )
23:
    Event  S _ S T E P 2 _ S _ t o _ C ( P S K i d e n t i t y , e a r l y _ k e y , verified , d e c r y p t e d _ d a t a )
24:
    Process early_data, continue standard 1-RTT handshake completion
25:
    Event  E _ S T E P 2 _ S _ t o _ C ( P S K i d e n t i t y , e a r l y _ k e y , verified , d e c r y p t e d _ d a t a )
26:
Step 3: Fresh Ticket Generation
27:
    Generate fresh ephemeral key pair: ( r _ S E P P _ e p h _ p r i v n e w , r _ S E P P _ e p h _ p u b n e w ) ( E C ) D H E . K e y G e n ( )
28:
     s e r v e r _ n o n c e n e w R a n d o m ( 32 )
29:
     t i c k e t _ l i f e t i m e n e w c u r r e n t _ t i m e + T T L
30:
     n e w _ t i c k e t C r e a t e T i c k e t ( P S K n e w , r _ S E P P _ e p h _ p u b n e w , s e r v e r _ n o n c e n e w , t i c k e t _ l i f e t i m e n e w )
31:
    Event  S _ S T E P 3 _ C _ t o _ S ( P S K i d e n t i t y , t k c _ a p p , refresh , n e w _ t i c k e t )
32:
    Send n e w _ t i c k e t to vSEPP
33:
    Event  E _ S T E P 3 _ C _ t o _ S ( P S K i d e n t i t y , t k c _ a p p , refresh , n e w _ t i c k e t )

4.1.1. Replay Attacks on TLS 1.3 0-RTT

0-RTT replay attacks [28] exploit the zero round-trip time feature in protocols like TLS 1.3 and QUIC, where clients can send encrypted application data immediately using cryptographic material from previous connections, without waiting for server interaction. The attack works by an adversary intercepting a client’s 0-RTT messages and data, forwarding them to the server (which processes the data), but then dropping the server’s response and forcing the server to lose state (e.g., through rebooting). When the attacker replays the same 0-RTT messages, the server rejects the 0-RTT portion for security reasons but continues with a regular handshake. The client, believing the data were not delivered due to the protocol’s reliable delivery mechanism, automatically resends the same application data under the final handshake key, causing the server to process identical data twice [13]. This demonstrates that even if replay protection exists at the key exchange level, logical replays at the application level remain inevitable due to automatic retransmission mechanisms, leading TLS 1.3 to accept such replays as unavoidable rather than attempting to prevent them.
Figure 6 shows a diagram of the ProVerif attack trace for a typical 0-RTT replay attack scenario simulated on the N32 context. The analysis reveals a critical replay attack vulnerability where the same 0-RTT roaming message can be processed multiple times by the home SEPP. This occurs when a single SEPP-V process sends one 0-RTT message with crand_4 and x_25, but the home SEPP processes this identical message twice with different session IDs (sess_id_4, sess_id_5). Since the same cryptographic parameters are used, this results in identical early data encryption that passes validation in both instances, causing both to trigger E_STEP1_C_to_S events. This violates the injectivity property where one authentic send event corresponds to multiple receive events, enabling replay attacks on roaming signaling.

4.1.2. Result

The ProVerif verification summary results for each TLS option are shown in Figure 7, while Table 2 provides a simple explanation of the security properties for easier interpretation. Together, these results highlight the critical security differentiators between TLS 1.3 handshake options, with particular emphasis on forward secrecy and replay attack resistance, while standard 0-RTT offers performance benefits with zero round-trips, it sacrifices forward secrecy and replay protection. The proposed 0-RTT FS solution uniquely delivers both zero round-trip performance and forward secrecy through innovative ephemeral key exchange and anti-replay mechanisms, addressing fundamental limitations in conventional TLS 1.3 implementations at the cost of moderate computational overhead. Table 3 shows a summary of the security comparison for the TLS 1.3 options.
Critical Security Differentiators: The formal verification of the results reveal significant differences in PFS support across options. Full handshake achieves complete PFS via (EC)DHE key exchange, ensuring that compromise of long-term keys cannot decrypt past communications. PSK-only mode lacks PFS entirely, making historical sessions vulnerable if the PSK is later compromised. PSK-(EC)DHE provides full PFS through its hybrid approach, combining PSK authentication with ephemeral key exchange. Standard 0-RTT offers limited PFS, with early data remaining vulnerable to long-term key compromise. The proposed 0-RTT FS achieves full PFS while maintaining zero round-trip performance through its innovative ephemeral key integration.
Replay attack resistance analysis reveals vulnerabilities across standard implementations. All conventional TLS 1.3 options demonstrate susceptibility to signaling-level replay attacks due to the absence of freshness mechanisms in ClientHello messages. Standard 0-RTT exhibits additional data-level replay vulnerability due to immediate early data transmission. The proposed 0-RTT FS provides comprehensive anti-replay protection through configurable defense mechanisms, including single-use ticket tracking, ephemeral key-based bloom filters, and application-level idempotency tokens.
0-RTT FS: The proposed 0-RTT FS option addresses fundamental limitations in standard TLS 1.3 early data mechanisms by introducing PFS while maintaining zero round-trip latency. This protocol combines PSK with fresh ephemeral DH shared secrets and implements ticket-based anti-replay protection through server-generated nonces, enabling secure early data transmission without compromising forward secrecy guarantees.
The security design of 0-RTT FS centers on three core mechanisms: forward secrecy through combined PSK and ephemeral DH key derivation using HKDF, anti-replay protection via unique server nonces embedded in resumption tickets and validated through server-side caching, and ephemeral key rotation where each ticket contains fresh server ephemeral keys. Early data encryption keys are derived from the combination of PSK, (EC)DHE shared secret (computed between client ephemeral key and server ephemeral key from ticket), and the server nonce, ensuring that compromise of long-term keys cannot decrypt past communications.
While 0-RTT FS achieves the same network round-trip count as standard 0-RTT, it incurs additional computational overhead due to (EC)DHE operations and nonce validation. This trade-off provides essential forward secrecy guarantees that standard 0-RTT lacks, making it suitable for security-critical applications where the computational cost is justified by the enhanced security properties.
Vulnerability Assessment and Threat Model Implications: The formal verification results expose critical limitations across standard TLS 1.3 options, particularly in replay attack resistance and forward secrecy provision. Standard 0-RTT suffers from both protocol-level and application-level replay vulnerabilities due to deterministic key derivation from static PSKs, while PSK compromise in standard implementations can expose historical session data.
Critical findings include protocol-level replay vulnerabilities in standard 0-RTT due to lack of freshness mechanisms, forward secrecy absence in PSK-based early data encryption, and significant security degradation upon PSK compromise. The 0-RTT FS option addresses these vulnerabilities through server nonce uniqueness verification and ephemeral key integration, providing replay resistance and forward secrecy at the cost of increased computational complexity. These findings demonstrate the necessity of enhanced security mechanisms for applications requiring both low latency and strong security guarantees.

5. Simulation Environment

5.1. Setup

To evaluate TLS 1.3 resumption performance for 5G cross-border roaming scenarios, we develop a comprehensive Python-based simulation framework that models N32 interface communications between SEPPs. Our simulation environment simulates the N32-c (control plane) and N32-f (data plane) protocols, with support for all standard TLS 1.3 resumption options plus our novel 0-RTT FS proposal.
The simulation architecture consists of four core components: (1) HandshakeSimulator implementing RFC 8446-compliant TLS 1.3 options with precise cryptographic timing, (2) SEPPSimulator modeling home and visited SEPP behavior with socket-based communication, (3) NetworkTopology providing realistic geographical latency simulation using NetworkX, and (4) PerformanceMonitor collecting comprehensive metrics and generating analytical reports. The system uses deterministic cryptographic operations with X25519 (EC)DHE key exchange, HKDF-SHA384 key derivation, and AES-256-GCM AEAD encryption to ensure reproducible performance measurements.

5.2. TLS 1.3 Options Evaluated

We evaluate five TLS 1.3 handshake options representative of different security-performance trade–offs in 5G roaming scenarios:
(a)
Full handshake: Complete (EC)DHE with mutual certificate authentication, providing PFS and fresh authentication. Used for initial N32-c establishment.
(b)
PSK-Only: PSK resumption without ephemeral key exchange (1-RTT), offering rapid reconnection at the cost of forward secrecy.
(c)
PSK-(EC)DHE: Hybrid mode combining PSK with ephemeral (EC)DHE (1-RTT), maintaining forward secrecy while enabling session resumption.
(d)
0-RTT: Zero round-trip resumption using early data keys, providing minimal latency for application data transmission.
(e)
0-RTT FS: Our novel proposal combining 0-RTT performance with forward secrecy through server-generated ephemeral tickets and nonce-based replay protection.

5.3. Test Methodologies

The simulation framework supports three distinct evaluation methodologies to comprehensively assess TLS 1.3 performance across different operational scenarios:
Simple Evaluation performs iterative testing with configurable resumption patterns. After an initial full handshake for N32-c establishment, subsequent N32-f connections cycle through specified resumption methods. For 0-RTT FS evaluation, we pre-generate batches of 1000+ unique tickets to ensure accurate resumption timing measurement without including ticket generation overhead.
Load Testing simulates concurrent roaming users with configurable load patterns (1, 5, 10, 20, 50, and 100 simultaneous connections). Each user thread performs multiple N32-f exchanges using specified resumption methods, with thread-safe ticket management ensuring proper nonce uniqueness for 0-RTT FS. The results include success rates, latency distributions, and system resource utilization under varying loads.
Geographical Testing models realistic cross-border roaming scenarios using a mesh network topology spanning Asia (Seoul-Tokyo, 33 ms), and Americas (Los Angeles, 134 ms). Network latencies include base propagation delay, and congestion modeling using exponential distributions. Each geographical connection measures the same network conditions across all TLS options to isolate protocol performance differences.

5.4. Metrics and Measurements

Our performance measurement system captures fine-grained timing data across multiple operational layers. Cryptographic metrics include individual operation timings for key generation, (EC)DHE computation, certificate verification, and HKDF key derivation. Protocol metrics record round-trip counts, payload sizes, and end-to-end handshake completion times. Network metrics separate TLS processing time from geographical latency, enabling fair cross-regional performance comparisons.
For 0-RTT FS evaluation, we implement specialized batch processing to measure resumption performance independently of ticket generation costs. The system pre-generates cryptographically secure tickets with unique nonces, tracks their single-use consumption in a thread-safe manner, and validates replay protection mechanisms under concurrent access patterns. Table 4 shows a summary of the setup environment.

5.5. Performance Results

The timing analysis of TLS 1.3 handshake performance requires careful distinction between sending latency and receiving latency, as illustrated in Figure 8. Sending latency represents the total time from when a protocol participant initiates transmission of a message until that message has been fully processed by the receiving party. In the context of TLS handshakes, this encompasses the computational time required to prepare cryptographic materials, perform necessary cryptographic operations such as key generation or encryption, and serialize the message for transmission. For protocols requiring handshake completion before data transmission (PSK-only, PSK-(EC)DHE, and full handshake), sending latency includes the network round-trip time as the client must wait for the server’s response before application data can be sent. Zero round-trip protocols (0-RTT and 0-RTT FS) eliminate this network dependency, allowing immediate transmission of encrypted early data alongside the initial ClientHello message. Therefore, the sending latency captures both the computational overhead of message preparation and any protocol-mandated waiting periods before secure data transmission can commence.
Receiving latency, conversely, measures the time from when an incoming message arrives at the receiver’s network interface until the complete response has been processed by the initiating party. This metric captures the server-side computational overhead of parsing received messages, performing cryptographic validation operations such as signature verification or decryption, generating response messages, and the network propagation time for the response to reach the client. All TLS 1.3 handshake modes incur network round-trip time in their receiving latency as the server’s response must traverse the network back to the client. The computational complexity varies significantly between protocols, with PSK-only mode requiring minimal cryptographic operations while full handshake mode demands certificate chain validation, signature generation, and ephemeral key generation. Receiving latency thus reflects both the server’s processing efficiency and the inherent network transmission delay in completing the bidirectional communication flow.

5.6. Latency Analysis for TLS Handshake Variants

The simulation results presented in Figure 9 provide empirical validation of the theoretical latency predictions for various TLS handshake configurations in 5G SEPP N32 direct connections. The measurements demonstrate clear performance differentials between handshake variants across both sending and receiving phases. The total latency and summary is presented in Table 5.

Sending vs. Receiving Latency of TLS Options

Figure 9 compares the latency of several TLS 1.3 handshake variants in a high-speed ideal environment. Standard 0-RTT achieves extremely low client-to-server latency at 15 microseconds since early data are encrypted using only the PSK derived from the resumption ticket. However, this comes at the cost of weaker security because forward secrecy is not obtained until the server sends its fresh ephemeral key in the ServerHello. Our proposed 0-RTT FS approach shows a sending latency of 52 microseconds, which is slightly higher than standard 0-RTT due to the extra ECDH scalar multiplication performed by the client when it includes its ephemeral key in the first flight. In return, it achieves forward secrecy immediately since both client and server can derive the early traffic key using the PSK and the server’s pre-generated ephemeral key that is securely bound to the ticket during issuance.
On the receiving side, the proposed 0-RTT FS variant demonstrates a latency of 143 microseconds, which is lower than the 152 microseconds measured for standard 0-RTT and comparable to PSK-(EC)DHE at 144 microseconds. This difference arises because 0-RTT FS shifts the server’s expensive ephemeral key generation away from the critical path and into the ticket issuance stage. When resumption occurs, the server already holds its long-lived ephemeral private key and needs only a single ECDH operation to derive the forward-secret early key. Standard 0-RTT, by contrast, must complete the full ECDHE exchange during the handshake before forward secrecy is available, adding to its processing overhead. In both directions, the full handshake remains the slowest option, requiring 734 microseconds for sending and 669 microseconds for receiving due to fresh ephemeral generation and certificate validation. Overall, the results show that 0-RTT FS preserves the performance benefits of resumption while offering forward secrecy at the earliest stage of communication, improving both security and efficiency.

5.7. Memory Degradation Under Increasing Load

Memory Component Analysis

Figure 10 reveals the underlying drivers of memory consumption across TLS variants under two distinct deployment scenarios measured in KiloBytes (KB). In the new connections scenario (client → server), full handshake exhibits the highest memory consumption at 9.2 KB per connection, with certificate memory, ECDH operations, and signature verification contributing substantially to the memory footprint. The component analysis shows a clear progression in memory requirements: PSK-only (2.1 KB) represents the most efficient approach, followed by PSK-(EC)DHE (2.9 KB), 0-RTT Standard (4.2 KB), 0-RTT FS Proposed (6.2 KB), and full handshake (9.2 KB).
In the session resumption scenario (server → client), the memory hierarchy shifts notably, while PSK-only remains the most efficient at 2.8 KB, the 0-RTT FS Proposed variant now consumes the most memory at 7.5 KB, exceeding even the full handshake at 6.0 KB. This reversal occurs because session resumptions reduce the certificate and signature overhead in full handshakes, while the proposed 0-RTT FS variant maintains its replay protection state and forward secrecy computation requirements regardless of the connection type.
The component analysis exposes a fundamental architectural trade-off in 5G security design: the relative efficiency of different approaches depends heavily on the deployment scenario. New connection workloads show a 4.4× memory difference between the most and least efficient variants (9.2 KB vs. 2.1 KB), while session resumption workloads demonstrate a 2.7× difference (7.5 KB vs. 2.8 KB). For SEPP deployments, this analysis suggests that PSK-based approaches offer consistent efficiency advantages, while the proposed 0-RTT FS variant’s memory overhead becomes more pronounced in resumption-heavy scenarios.

5.8. Multi-Network Framework

To evaluate TLS 1.3 performance across international roaming scenarios, we developed a comprehensive multi-network simulation framework using NetworkX for graph-based network modeling and threading for concurrent connection handling. Figure 11 shows that this simulation incorporates realistic geographical latency characteristics while providing controlled testing conditions to measure both cryptographic overhead and network topology impacts of different TLS options. The framework specifically models 5G N32 interface communications between SEPPs.
These measurements represent real-world network latencies between Seoul and major international destinations, enabling our simulation to model geographically distributed 5G roaming scenarios. The 4× latency difference between regional (Tokyo) [29] and intercontinental (Los Angeles) [30] connections demonstrates how geographic distance amplifies the performance benefits of TLS handshake optimizations. By incorporating these empirical RTT values, our mesh network model captures the realistic latency constraints faced by SEPP implementations in global roaming architectures, where the choice between security protocols becomes increasingly critical as network distance increases. This geographic modeling approach allows us to evaluate how TLS variant performance scales across different international roaming contexts, from neighboring countries with sub-50 ms connectivity to transcontinental links exceeding 100 ms round-trip times.

Geographical Latency Performance Analysis

The graph in Figure 12 presents the latency performance of different TLS handshake variants across varying geographic region pairs in 5G roaming scenarios, with simulated latency [29,30], packet loss % and jitter. The results demonstrate the combined impact of handshake complexity and network distance on session establishment time. As expected, the full handshake consistently exhibits the highest latency across all region pairs since it requires multiple round trips and complete certificate exchange operations before application data transmission. This effect is most pronounced in the Seoul–Los Angeles path, where transcontinental propagation delay compounds the cryptographic overhead. PSK-(EC)DHE follows with substantial latency, requiring additional round trips for ephemeral key establishment despite avoiding full certificate validation.
PSK-only handshakes achieve significantly lower latency by leveraging pre-shared secrets, eliminating certificate operations while still requiring at least one network round trip for session establishment. However, performance remains constrained by network propagation delays inherent in the handshake protocol. The optimal latencies are consistently achieved by both 0-RTT variants across all geographic pairs. These protocols enable immediate application data transmission with the initial handshake flight, effectively bypassing network round-trip limitations. The proposed 0-RTT FS introduces minimal additional overhead compared to standard 0-RTT while providing forward secrecy guarantees.
Geographic distance clearly impacts absolute performance, with Seoul–Tokyo achieving the lowest latencies, Tokyo-LA showing moderate increases, and Seoul-LA demonstrating maximum latencies due to intercontinental routing. Nevertheless, the relative performance hierarchy remains consistent across all region pairs, with 0-RTT variants providing substantial advantages for latency-sensitive 5G roaming applications regardless of geographic separation between SEPPs.

6. Discussion

This study presents the first systematic evaluation of TLS 1.3 handshake options for 5G cross-border roaming, bridging a critical gap between cryptographic security theory and practical deployment requirements in inter-PLMN communications. By integrating formal verification with comprehensive performance analysis, our research provides mobile network operators with preliminary evidence-based guidance for understanding the security–performance trade-offs in latency-sensitive 5G roaming scenarios.

6.1. Principal Findings and Contributions

Our evaluation reveals a clear performance hierarchy among TLS 1.3 options based on measured handshake completion times: 0-RTT achieving 167.0 μ s (baseline), our proposed 0-RTT FS at 195.0 μ s (17% overhead), PSK-only at 224.0 μ s (34% overhead), PSK-(EC)DHE at 288.0 μ s (72% overhead), and full handshake at 1403.0 μ s (740% overhead). These simulation results provide initial insights into relative performance characteristics under controlled conditions.
The 0-RTT FS proposal demonstrates competitive simulated performance while providing enhanced security guarantees. Although it introduces a 17% latency overhead compared to standard 0-RTT in our testing environment, it delivers comprehensive forward secrecy and replay protection that are absent in conventional 0-RTT implementations. This suggests that security enhancements need not necessarily impose prohibitive overhead, though real-world validation remains essential.
The formal verification results provide critical security insights, exposing a fundamental vulnerability across all standard TLS 1.3 options: susceptibility to replay attacks due to the absence of freshness mechanisms in ClientHello messages. This finding has significant theoretical implications for 5G roaming, where duplicate authentication requests could potentially compromise network integrity and billing accuracy. Our 0-RTT FS proposal addresses these vulnerabilities through cryptographically bound server nonces and ephemeral key integration.

6.2. Security-Performance Trade-Offs and Simulation Insights

The evaluation reveals that security–performance trade-offs in 5G roaming contexts are complex, with different protocols offering distinct advantages depending on operational requirements. PSK-only modes demonstrate favorable performance characteristics (224.0 μ s) in our controlled environment, but the absence of Perfect Forward Secrecy (PFS) creates genuine long-term security considerations for international roaming partnerships.
Full handshake protocols, despite providing comprehensive security guarantees, impose substantial latency penalties (1403.0 μ s) in our simulations that could potentially impact user experience in latency-sensitive applications. The PSK-(EC)DHE hybrid approach (288.0 μ s) appears to offer a practical balance between security and performance based on our measurements, providing PFS while maintaining reasonable latency in the test environment.
Our 0-RTT FS proposal shows promise in simulation, achieving near-optimal performance (195.0 μ s) with comprehensive security properties. However, this represents preliminary results under idealized conditions, and several deployment challenges require further investigation before practical implementation.

6.3. Geographical Analysis and Scalability Considerations

Our multi-network simulation incorporates latency variations from 50 ms to 371 ms across international routes, providing initial insights into how geographic distance affects protocol performance. The results suggest that optimization benefits may scale with network distance, though this relationship requires validation in production environments with diverse routing policies and quality-of-service implementations.
Load testing results suggest potential scalability advantages for resumption-based approaches under our controlled conditions. The memory efficiency analysis reveals substantial differences, with measured consumption ranging from 2.1 KB (PSK-only) to 9.2 KB (full handshake) per connection in new connection scenarios. In session resumption scenarios with increasing load, the hierarchy shifts with 0-RTT FS consuming 7.5 KB compared to full handshake’s 6.0 KB, demonstrating the computational overhead of maintaining forward secrecy and replay protection state. These variations have significant implications for large-scale deployments.

6.4. Deployment Considerations and Practical Challenges

The deployment of 0-RTT FS would face substantial practical obstacles that extend beyond our simulation scope. The server-side nonce tracking requirement introduces state management complexity that would need evaluation at the scale of millions of concurrent roaming sessions typical in large mobile networks. Critical factors, including network partitions, server failures, and distributed state synchronization across geographically dispersed SEPP installations, require dedicated analysis.
The mobile operator ecosystem presents unique adoption challenges compared to web-based TLS deployments. SEPP infrastructure involves multiple vendors, extensive certification processes, and risk-averse operators managing critical infrastructure. The historical precedent of TLS 1.3 adoption, which required over three years in less constrained environments [14], provides context for realistic deployment timelines. Beyond these organizational and ecosystem-level challenges, real-world network conditions themselves can also cause performance to diverge from simulation-based results, as discussed below.

6.4.1. Real-World Deployment Gaps

While our simulation framework isolates cryptographic and network parameters, real-world performance may deviate due to additional factors not captured in controlled models. These include bursty or correlated packet loss, variable queuing delays, and SEPP processing bottlenecks. Prior studies show that correlated loss and jitter can significantly increase retransmission overhead in TLS sessions [31,32], while cloud-based SEPP deployments may introduce nondeterministic delays from CPU contention and virtualization overhead [33]. Such effects generally increase handshake latency and variance beyond idealized predictions, although the relative ordering of TLS modes is expected to remain stable.
To address this gap, future work should incorporate calibrated loss and jitter models or validate findings using controlled testbeds, as recommended in prior analyses of 5G latency and network modeling [34,35]. Acknowledging these deviations frames our results as preliminary but robust, highlighting the importance of field validation before operational adoption.

6.4.2. Nonce Cache Scalability and Synchronization

A central element of the 0-RTT FS proposal is the server-side nonce cache, which enforces single-use tickets to prevent replay attacks, while effective in controlled settings, scaling this mechanism to carrier-grade deployments introduces additional challenges. In networks supporting millions of concurrent roaming sessions, cache lookup and insertion operations must be highly efficient to avoid becoming a performance bottleneck. Under heavy load, the latency of nonce validation could directly impact handshake completion times, especially if cache structures are not optimized for constant-time access.
Beyond local performance, geographically distributed SEPP deployments face the added requirement of maintaining replay protection across multiple sites. If nonce states are not synchronized, adversaries could exploit inconsistencies between SEPP nodes to replay early data. This problem resembles consistency trade-offs in distributed systems, where asynchronous replication or eventual consistency may introduce short windows of vulnerability. To mitigate these risks, large-scale deployments would likely require strategies such as sharded caches, Bloom filter-based membership checks, or hierarchical validation layers. Prior studies of cloud-based mobile core networks have shown that state synchronization overhead, if not carefully managed, can degrade end-to-end performance [36].
These considerations highlight that, while the nonce cache design is cryptographically sound, its real-world viability depends on engineering solutions that balance strong replay resistance with scalable, low-latency operation.

6.5. Preliminary Decision Framework

Based on our controlled experimental findings, we propose a preliminary decision framework to guide operators in evaluating TLS 1.3 options for inter-PLMN roaming. This framework is summarized in Table 6 and supported by the following key considerations:
  • For security assessment: Formal verification reveals replay vulnerabilities in standard options, indicating potential value in enhanced approaches;
  • For performance-critical scenarios: 0-RTT achieves optimal simulated latency (167.0 μ s) but lacks forward secrecy; 0-RTT FS provides competitive simulated performance (195.0 μ s) with comprehensive security;
  • For security-sensitive deployments: PSK-(EC)DHE provides established security properties with moderate performance overhead (288.0 μ s) in testing;
  • For resource-constrained environments: PSK-only offers efficiency (224.0 μ s) but requires security risk assessment due to absence of PFS.
These considerations are consolidated into Table 6, which presents a structured decision framework linking handshake modes, security risks, and deployment contexts.
Table 6. N32 TLS option preliminary decision framework for inter-PLMN roaming scenarios (simulation-based).
Table 6. N32 TLS option preliminary decision framework for inter-PLMN roaming scenarios (simulation-based).
N32-c Initial
Establishment
N32-f Protection
(Reconnection)
Simulated
Assessment
Risk LevelNotes
FH (mTLS)PSKConcerningHighSecurity downgrade, no PFS
FH (mTLS)PSK-(EC)DHEAcceptableLowMaintains forward secrecy
FH (mTLS)0-RTTConcerningHighReplay vulnerabilities
FH (mTLS)0-RTT FSPromisingLowRequires validation
FH (mTLS)PSK + 0-RTTConcerningHighMixed mode complexity
FH (mTLS)full handshakeAcceptableLowMaximum security, high latency
Following 3GPP TS 33.501, initial N32-c establishment requires full handshake with mutual TLS. Assessments based on controlled simulation results.

6.6. Methodological Scope and Validation Requirements

Our simulation framework provides valuable insights into relative protocol behavior under controlled conditions, though several factors limit direct applicability to production environments. The idealized network conditions do not capture the full complexity of production mobile networks, including packet loss, network congestion, and dynamic routing policies that significantly influence real-world performance.
The geographical testing incorporates realistic baseline latency measurements but cannot fully model the complexity of international routing and quality-of-service implementations. Similarly, our load testing provides initial scalability insights, though production environments involve additional complexities, including traffic patterns, connection churn, and resource contention.
Critical factors requiring dedicated analysis include energy consumption patterns, integration with existing SEPP infrastructure, vendor compatibility, and the economic incentives that drive deployment decisions in mobile operator environments.
Implementing TLS modifications in 5G environments requires more than technical validation at the operator or vendor level. Formal adoption necessitates approval from key standardization bodies, including 3GPP, which defines 5G security architecture specifications, and the IETF, which governs TLS protocol evolution. The standardization process represents an institutional prerequisite that parallels the technical validation presented in this research, as widespread deployment depends on coordinated acceptance across the telecommunications ecosystem rather than individual organizational initiatives.

6.7. Future Research Directions

An important next step is validating 0-RTT FS under operational roaming conditions, where network latency variations, dynamic routing policies, and scale requirements may reveal deployment challenges not apparent in controlled simulations. Equally critical is assessing the energy implications of different handshake variants on mobile devices. Recent evaluations of TLS 1.3 with advanced cryptographic mechanisms indicate that more complex operations can impose additional energy costs on constrained platforms [37]. Extending this analysis to PSK-(EC)DHE and 0-RTT FS would determine whether the enhanced security properties come with measurable impacts on mobile device battery life.
Recent work on edge computing in future wireless networks highlights the importance of distributed and hierarchical architectures for supporting low-latency, secure services in next-generation mobile environments [38]. Integrating 0-RTT FS and other handshake optimizations with edge computing frameworks could further reduce latency and improve scalability for roaming and mission-critical applications.
Additionally, adversarial testing methodologies such as those demonstrated in WAFBooster [39] could be systematically adapted to N32 signaling protocols. Automatically generated and mutated JSON/HTTP payloads would enable comprehensive assessment of SEPP resilience against malformed or intentionally evasive roaming traffic, extending beyond transport-layer security to examine application-layer vulnerabilities, including replay attacks and message tampering scenarios.
Furthermore, the emergence of automated machine learning approaches for encrypted traffic fingerprinting, such as those applied to QUIC website identification, underscores the need for robust privacy and obfuscation strategies in future protocol designs [40]. These techniques could be adapted to evaluate the resilience of 0-RTT FS and related handshake variants against traffic analysis and fingerprinting attacks in real-world deployments.
The demonstrated feasibility of combining forward secrecy with zero-round-trip operation represents a meaningful advance in cryptographic protocol design. Translating this theoretical contribution into practical deployment will require comprehensive evaluation of operational constraints and coordinated industry efforts toward standardization across the mobile ecosystem, including 3GPP and the IETF, to ensure adoption beyond research prototypes.

7. Conclusions

This research presents the first systematic evaluation of TLS 1.3 optimization strategies for 5G cross-border roaming, addressing critical gaps in securing inter-operator communications while maintaining ultra-low latency requirements. Through rigorous formal verification aligned with ISO/IEC 29128-1:2023 standards and comprehensive performance analysis across realistic international scenarios, we establish evidence-based guidelines for mobile operators navigating the complex security–performance landscape of N32 interface optimization. Our findings highlight the trade-offs between handshake latency, security properties, and resource overhead, providing operators with practical insights into selecting suitable TLS 1.3 options for inter-PLMN roaming scenarios.
Our performance evaluation reveals a clear hierarchy among TLS 1.3 options, with handshake completion times ranging from 167.0 μ s (0-RTT) to 1403.0 μ s (full handshake). The novel 0-RTT FS option achieves competitive balance at 195.0 μ s, providing both PFS and replay protection while maintaining near-optimal performance. This represents only a 17% overhead compared to standard 0-RTT but delivers substantially enhanced security guarantees that are absent in conventional resumption approaches. The quantitative analysis demonstrates that PSK-only delivers efficient resumption at 224.0 μ s but sacrifices forward secrecy, while PSK-(EC)DHE provides balanced security with PFS at 288.0 μ s. The performance hierarchy confirms that security enhancements need not come at prohibitive costs—0-RTT FS achieves 32% performance improvement over PSK-(EC)DHE while maintaining identical security properties, challenging conventional assumptions about the security-performance trade-off.
The formal verification exposes a critical universal vulnerability: all standard TLS 1.3 options demonstrate susceptibility to replay attacks due to missing freshness mechanisms in ClientHello messages. This finding has profound implications for 5G roaming, where duplicate authentication requests could compromise network integrity and billing accuracy. Our 0-RTT FS proposal directly addresses these vulnerabilities through cryptographically bound server nonces and ephemeral key integration, making it the only option to achieve comprehensive replay resistance.
Geographical analysis reveals substantial latency variations across international routes (50 ms to 371 ms), while load testing confirms linear scalability for PSK-based options under concurrent access patterns. Memory efficiency analysis shows significant differences, with measured consumption ranging from 2.1 KB (PSK-only) to 9.2 KB (full handshake) per connection in new connection scenarios—a 4.4× variation with important scalability implications. In session resumption scenarios, the hierarchy shifts with 0-RTT FS consuming 7.5 KB compared to full handshake’s 6.0 KB, demonstrating the computational overhead of maintaining forward secrecy and replay protection state.
While our simulation-based evaluation provides valuable insights into protocol behavior and relative performance characteristics, the findings require validation in production environments to account for real-world factors, including network variability, traffic patterns, and operational constraints, that cannot be fully captured in controlled laboratory conditions. The demonstrated security vulnerabilities in standard implementations and the promising performance characteristics of our 0-RTT FS proposal warrant further investigation through field trials and industry collaboration.
As 5G networks expand globally and roaming relationships become increasingly complex, this research provides the analytical foundation necessary for optimizing secure session resumption in latency-sensitive telecommunications environments. The demonstrated feasibility of 0-RTT FS, with its sub-millisecond performance and comprehensive security properties, positions it as a compelling standardization candidate that could transform secure communications across next-generation mobile networks, ultimately contributing to improved service quality and security in international mobile connectivity.

Author Contributions

Conceptualization, J.K.L., Y.K. and I.Y.; Methodology, J.K.L., Y.K. and H.K.; Software, J.K.L.; Validation, J.K.L., Y.K. and H.K.; Formal analysis, J.K.L. and Y.K.; Investigation, J.K.L.; Resources, I.Y.; Data curation, J.K.L.; Writing—original draft preparation, J.K.L.; Writing—review and editing, J.K.L., Y.K., H.K. and I.Y.; Visualization, J.K.L.; Supervision, I.Y.; Project administration, I.Y.; Funding acquisition, I.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by Institute of Information & communications Technology Planning and Evaluation (IITP) grant funded by the Korea government (MSIT) (RS-2024-00441484, Development of open roaming technology for Private 5G network, 100%).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author(s).

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
x , y (EC)DHE private keys (256-bit random values)
i S E P P , r S E P P initiating SEPP and responding SEPP
h S E P P , v S E P P Home Network SEPP and Visiting Network SEPP
x · G , y · G (EC)DHE public keys on P-256 curve
S K . i S E P P , S K . r S E P P ECDSA private keys for certificate signing
P K . i S E P P , P K . r S E P P ECDSA public keys embedded in X.509 certificates
C E R T . i S E P P , C E R T . r S E P P X.509 certificate chains with PLMN identifiers
P S K , P S K _ I D PSK and identifier from bilateral agreement
N X Fresh Nonce of X
P L M N _ I D Public Land Mobile Network identifier
F Q D N Fully Qualified Domain Name of SEPP endpoint
r - S E P P _ e p h _ p r i v , r - S E P P _ e p h _ p u b Server ephemeral key pair for ticket-based resumption
i - S E P P _ e p h _ p r i v , i - S E P P _ e p h _ p u b Client ephemeral key pair for 0-RTT FS
s h a r e d Computed shared secret from X25519 ephemeral DH
t i c k e t _ i d 128-bit random identifier for session resumption ticket
e a r l y _ s e c r e t Secret derived from PSK and ephemeral shared secret
e a r l y _ k e y , e a r l y _ n o n c e Keys for AEAD encryption of early data
X 25519 ( · ) Elliptic curve Diffie–Hellman function on Curve25519
E C D S A ( · ) Elliptic Curve Digital Signature Algorithm
H K D F ( · ) HMAC-based Key Derivation Function
H M A C ( · ) Hash-based Message Authentication Code
A E A D _ E n c r y p t ( · ) Authenticated Encryption with Associated Data
E a r l y _ S e c r e t Initial secret derived from PSK or zero
H a n d s h a k e _ S e c r e t Intermediate secret for handshake protection
M a s t e r _ S e c r e t Final secret for application traffic keys
N e w S e s s i o n T i c k e t TLS 1.3 session resumption ticket message
S A N Subject Alternative Name certificate extension
R A E X Root Authority Exchange trust anchor
S E P P Security Edge Protection Proxy
N 32 - c N32 control interface for capability negotiation
N 32 - f N32 forwarding interface for data transmission

References

  1. Nuriev, M.; Kalyashina, A.; Smirnov, Y.; Gumerova, G.; Gadzhieva, G. The 5G revolution transforming connectivity and powering innovations. In Proceedings of the E3S Web of Conferences. EDP Sciences, Wuhan, China, 22–23 November 2024; Volume 515, p. 04008. [Google Scholar] [CrossRef]
  2. NG.113—5GS Roaming Guidelines, Version 11.0; Permanent reference document: Ng.113, GSMA, 2024; Covers architecture, control-plane and user-plane interfaces, security, QoS and deployment models; GSM Association: London, UK, October 2024. Available online: https://www.gsma.com/newsroom/wp-content/uploads/NG.113.v.11.0-12.pdf (accessed on 28 September 2025).
  3. Rescorla, E. The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446, RFC 8446, RFC Editor. 2018. 2018. Available online: https://www.rfc-editor.org/info/rfc8446 (accessed on 28 September 2025).
  4. 3rd Generation Partnership Project (3GPP). System Architecture for the 5G System (5GS). 2025. Version 17.7.0, Release 17, January 2023. 2025. Available online: https://www.3gpp.org/dynareport/23501.htm (accessed on 28 September 2025).
  5. Køien, G.M. On Threats to the 5G Service Based Architecture. Wirel. Pers. Commun. 2021, 119, 97–116. [Google Scholar] [CrossRef]
  6. ISO/IEC 29128-1:2023; Information Security, Cybersecurity and Privacy Protection—Verification of Cryptographic Protocols—Part 1: Methodology. International Organization for Standardization: Geneva, Switzerland, 2023.
  7. Abdul Ghaffar, A.A.; Mahmoud, A.; Sheltami, T.; Abu-Amara, M. A Survey on Software-Defined Networking-Based 5G Mobile Core Architectures. Arab. J. Sci. Eng. 2022, 48, 2313–2330. [Google Scholar] [CrossRef]
  8. Gegenhuber, G.K.; Mayer, W.; Weippl, E.; Dabrowski, A. MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy Research. In Proceedings of the 32nd USENIX Security Symposium (USENIX Security 23), Anaheim, CA, USA, 9 August 2023; pp. 3493–3510. [Google Scholar]
  9. Mandalari, A.M.; Lutu, A.; Custura, A.; Khatouni, A.S.; Alay, Ö.; Bagnulo, M.; Bajpai, V.; Brunstrom, A.; Ott, J.; Trevisan, M.; et al. Measuring Roaming in Europe: Infrastructure and Implications on Users’ QoE. IEEE Trans. Mob. Comput. 2022, 21, 3687–3699. [Google Scholar] [CrossRef]
  10. Shetty, R.S. 5G Overview. In 5G Mobile Core Network: Design, Deployment, Automation, and Testing Strategies; Apress: Berkeley, CA, USA, 2021; pp. 1–67. [Google Scholar] [CrossRef]
  11. NG.132—PRINS: Protecting Roaming Interfaces in 5G; GSM Association: London, UK, 2021. Available online: https://www.gsma.com/newsroom/wp-content/uploads/NG.132-v5.0-4.pdf (accessed on 28 September 2025).
  12. Comfone. 5G SA Roaming: How to Strike the Right Balance Between SWecurity and Business Objectives. Industry Blog Discussing Operator Incentives to Use PRINS and Hub-Based Roaming Despite Performance Trade-Offs. 2023. Available online: https://www.comfone.com/blog/5g-sa-how-to-strike-the-right-balance-between-security-measures-and-business-objectives/ (accessed on 28 September 2025).
  13. Fischlin, M.; Günther, F. Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates. In Proceedings of the 2017 IEEE European Symposium on Security and Privacy (EuroS&P), Paris, France, 26–28 April 2017; pp. 60–75. [Google Scholar] [CrossRef]
  14. Lee, H.; Kim, D.; Kwon, Y. TLS 1.3 in Practice: How TLS 1.3 Contributes to the Internet. In Proceedings of the Web Conference 2021, WWW ’21, New York, NY, USA, 19–23 April 2021; pp. 70–79. [Google Scholar] [CrossRef]
  15. Ghedini, A.; Vasiliev, V. TLS Certificate Compression. RFC 8879. 2020. Available online: https://www.rfc-editor.org/info/rfc8879 (accessed on 28 September 2025).
  16. de Carné de Carnavalet, X.; van Oorschot, P.C. A Survey and Analysis of TLS Interception Mechanisms and Motivations: Exploring how end-to-end TLS is made “end-to-me” for web traffic. ACM Comput. Surv. 2023, 55, 269. [Google Scholar] [CrossRef]
  17. Bodenhausen, J.; Grote, L.; Rademacher, M.; Henze, M. Adaptive Optimization of TLS Overhead for Wireless Communication in Critical Infrastructure. Accepted for Publication in Proceedings of the 2024 8th Cyber Security in Networking Conference (CSNet). arXiv 2024, arXiv:2411.01971. [Google Scholar]
  18. Ko, Y.; Pawana, I.W.A.J.; Won, T.; Astillo, P.V.; You, I. Toward an Era of Secure 5G Convergence Applications: Formal Security Verification of 3GPP AKMA with TLS 1.3 PSK Option. Appl. Sci. 2024, 14, 11152. [Google Scholar] [CrossRef]
  19. Cremers, C.; Horvat, M.; Scott, S.; van der Merwe, T. Automated analysis and verification of TLS 1.3: 0-RTT, resumption and delayed authentication. In Proceedings of the 2016 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 23–25 May 2016; pp. 470–485. [Google Scholar] [CrossRef]
  20. Wu, K.; Chau, S.; Vilela, J.; Schulmann, H.; Li, N. Return of version downgrade attack in the era of TLS 1.3. In Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies, Barcelona, Spain, 1–4 December 2020; pp. 20–33. [Google Scholar] [CrossRef]
  21. Davis, H.; Diemert, D.; Günther, F.; Jager, T. On the concrete security of TLS 1.3 PSK mode. In Proceedings of the Advances in Cryptology–EUROCRYPT 2022: 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, 30 May–3 June 2022; pp. 876–907. [Google Scholar] [CrossRef]
  22. Cremers, C.; Horvat, M.; Hoyland, J.; Scott, S.; van der Merwe, T. A comprehensive symbolic analysis of TLS 1.3. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA, 30 October–3 November 2017; pp. 1773–1788. [Google Scholar] [CrossRef]
  23. Bhargavan, K.; Blanchet, B.; Kobeissi, N. Verified models and reference implementations for the TLS 1.3 standard candidate. In Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 22–26 May 2017; pp. 483–502. [Google Scholar] [CrossRef]
  24. Avalle, M.; Pironti, A.; Sisto, R. Formal verification of security protocol implementations: A survey. Form. Asp. Comput. 2014, 26, 99–123. [Google Scholar] [CrossRef]
  25. Coffey, T.; Dojen, R.; Flanagan, T. Formal verification: An imperative step in the design of security protocols. Comput. Networks 2003, 43, 601–618. [Google Scholar] [CrossRef]
  26. Blanchet, B. Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif. In Foundations of Security Analysis and Design VII: FOSAD 2012/2013 Tutorial Lectures; Aldini, A., Lopez, J., Martinelli, F., Eds.; Springer International Publishing: Cham, Switzerland, 2014; pp. 54–87. [Google Scholar] [CrossRef]
  27. Kobeissi, N.; Bhargavan, K.; Blanchet, B. Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach. In Proceedings of the 2017 IEEE European Symposium on Security and Privacy (EuroS&P), Paris, France, 26–28 April 2017; pp. 435–450. [Google Scholar] [CrossRef]
  28. Rescorla, E. 0-RTT and Anti-Replay. IETF TLS Working Group Mailing List. 2015. Available online: https://mailarchive.ietf.org/arch/msg/tls/gDzOxgKQADVfItfC4NyW3ylr7yc/ (accessed on 19 August 2025).
  29. WonderNetwork. Ping Times: Tokyo to Seoul. 2025. Available online: https://wondernetwork.com/pings/Seoul/Tokyo (accessed on 28 September 2025).
  30. WonderNetwork. Ping Times: Los Angeles to Seoul. 2025. Available online: https://wondernetwork.com/pings/Los%20Angeles/Seoul (accessed on 28 September 2025).
  31. Otten, J.; Khatibi, S.; Isakov, A. Generating More Realistic Packet Loss Patterns for Network Simulation. In Proceedings of the 36th International The Florida AI Research Society (FLAIRS) Conference, Clearwater Beach, FL, USA, 14–17 May 2023; pp. 133099–137620. [Google Scholar]
  32. Shakshuki, E.; Kang, K.; Sheltami, T. A Comparative Study on Simulation vs. Real-Time Deployment of Protocols. J. Syst. Softw. 2010, 83, 420–432. [Google Scholar] [CrossRef]
  33. Andreoli, R.; Mini, R.; Skarin, P.; Gustafsson, H.; Harmatos, J.; Abeni, L.; Cucinotta, T. A multi-domain survey on time-criticality in cloud computing. IEEE Trans. Serv. Comput. 2025, 18, 1152–1170. [Google Scholar] [CrossRef]
  34. Parvez, I.; Rahman, A.; Guvenc, I.; Sarwat, A. A Survey on Low Latency Towards 5G: RAN, Core Network and Caching Solutions. IEEE Commun. Surv. Tutorials 2018, 20, 3098–3130. [Google Scholar] [CrossRef]
  35. Davoudzade, M.; Akgul, M.; Helmy, A. Enhancing Network Simulation Accuracy through Calibration and Model Optimization. In Proceedings of the 18th EAI International Conference on Performance Evaluation Methodologies and Tools (EAI VALUETOOLS), Milan, Italy, 12–13 December 2024; pp. 1–8. [Google Scholar]
  36. Patounas, G.; Alay, O.; Khatouni, A.; Ott, J.; Lutu, A. Characterization and Identification of Cloudified Mobile Network Performance Bottlenecks. IEEE Trans. Netw. Serv. Manag. 2020, 17, 2592–2606. [Google Scholar] [CrossRef]
  37. Tasopoulos, G.; Dimopoulos, C.; Fournaris, A.P.; Zhao, R.K.; Sakzad, A.; Steinfeld, R. Energy Consumption Evaluation of Post-Quantum TLS 1.3 for Resource-Constrained Embedded Devices. In Proceedings of the 20th ACM International Conference on Computing Frontiers (CF ’23), New York, NY, USA, 9–11 May 2023; pp. 366–374. [Google Scholar] [CrossRef]
  38. Ergen, M.; Saoud, B.; Shayea, I.; El-Saleh, A.A.; Ergen, O.; Inan, F.; Tuysuz, M.F. Edge computing in future wireless networks: A comprehensive evaluation and vision for 6G and beyond. ICT Express 2024, 10, 1151–1173. [Google Scholar] [CrossRef]
  39. Wu, C.; Chen, J.; Zhu, S.; Feng, W.; He, K.; Du, R.; Xiang, Y. WAFBooster: Automatic Boosting of WAF Security Against Mutated Malicious Payloads. IEEE Trans. Dependable Secur. Comput. 2024, 22, 1118–1131. [Google Scholar] [CrossRef]
  40. Ha, J.; Roh, H. QUIC website fingerprinting based on automated machine learning. ICT Express 2024, 10, 594–599. [Google Scholar] [CrossRef]
Figure 1. 5G core network with a roaming scenario.
Figure 1. 5G core network with a roaming scenario.
Sensors 25 06144 g001
Figure 2. Typical 5G Roaming Direct TLS Setup.
Figure 2. Typical 5G Roaming Direct TLS Setup.
Sensors 25 06144 g002
Figure 3. N32-c handshake.
Figure 3. N32-c handshake.
Sensors 25 06144 g003
Figure 4. TLS connection procedure showing full mTLS handshake and resumption options.
Figure 4. TLS connection procedure showing full mTLS handshake and resumption options.
Sensors 25 06144 g004
Figure 5. Formal verification tools.
Figure 5. Formal verification tools.
Sensors 25 06144 g005
Figure 6. ProVerif Trace: 0-RTT replay attack, simulating N32 environment.
Figure 6. ProVerif Trace: 0-RTT replay attack, simulating N32 environment.
Sensors 25 06144 g006
Figure 7. Formal verification results for TLS 1.3 options.
Figure 7. Formal verification results for TLS 1.3 options.
Sensors 25 06144 g007
Figure 8. Process on time capture on N32 simulation interface.
Figure 8. Process on time capture on N32 simulation interface.
Sensors 25 06144 g008
Figure 9. Sending latency and receiving latency per TLS option.
Figure 9. Sending latency and receiving latency per TLS option.
Sensors 25 06144 g009
Figure 10. Memory component breakdown by TLS variant under different scenarios.
Figure 10. Memory component breakdown by TLS variant under different scenarios.
Sensors 25 06144 g010
Figure 11. NetworkX network topology for international roaming scenario.
Figure 11. NetworkX network topology for international roaming scenario.
Sensors 25 06144 g011
Figure 12. Region based latency comparison.
Figure 12. Region based latency comparison.
Sensors 25 06144 g012
Table 1. Security requirements verification query.
Table 1. Security requirements verification query.
Security RequirementVerification Query
ConfidentialityQ4: attacker(App Data1)
Q5: attacker(App Data2)
Q6: attacker(App Data3)
IntegrityQ1: inj-event(E_STEP1_C_to_S) ==> inj-event(S_STEP1_C_to_S)
Q2: inj-event(E_STEP2_S_to_C) ==> inj-event(S_STEP2_S_to_C)
Q3: inj-event(E_STEP3_C_to_S) ==> inj-event(S_STEP3_C_to_S)
Mutual AuthenticationQ2: inj-event(E_STEP2_S_to_C) ==> inj-event(S_STEP2_S_to_C)
&&
Q3: inj-event(E_STEP3_C_to_S) ==> inj-event(S_STEP3_C_to_S)
Secure Key ExchangeQ2: inj-event(E_STEP2_S_to_C) ==> inj-event(S_STEP2_S_to_C)
&&
Q3: inj-event(E_STEP3_C_to_S) ==> inj-event(S_STEP3_C_to_S)
PFSQ4: attacker(App Data1)
Q5: attacker(App Data2)
Q6: attacker(App Data3)
Defense against replay attackQ1: inj-event(E_STEP1_C_to_S) ==> inj-event(S_STEP1_C_to_S)
Q2: inj-event(E_STEP2_S_to_C) ==> inj-event(S_STEP2_S_to_C)
Q3: inj-event(E_STEP3_C_to_S) ==> inj-event(S_STEP3_C_to_S)
Table 2. ProVerif failing security queries for TLS 1.3 options.
Table 2. ProVerif failing security queries for TLS 1.3 options.
OptionFailed Property and Implication
Full Handshake (a)Q1 = false: duplicate ClientHello may be accepted, creating a signaling-level replay risk.
PSK-Only (b)Confidentiality failure (Q4/Q6 = false): attacker can recover protected application data if PSK is compromised.
PSK-(EC)DHE (c)Q1 = false: duplicate ClientHello may be accepted, creating a signaling-level replay risk.
0-RTT (d)Q1 = false: replay possible at ClientHello stage.
Q4 = false: early data confidentiality is broken, attacker can learn the first message.
0-RTT FS (e)No failures observed: confidentiality, integrity, authentication, forward secrecy, and replay protection all hold.
Table 3. Security comparison of the TLS 1.3 options for N32 roaming.
Table 3. Security comparison of the TLS 1.3 options for N32 roaming.
Security RequirementFull HandshakePSK-OnlyPSK-(EC)DHE0-RTT0-RTT FS
Confidentiality
Integrity
Mutual Authentication
Secure Key Exchange
PFS×
Defense against replay attack×1×1×1×1,2
1 Signaling-level replay attack; 2 Data-level replay attack; ◯: Support; △: Limited support; ×: Not supported.
Table 4. Software and system environment for the N32/TLS 1.3 simulations.
Table 4. Software and system environment for the N32/TLS 1.3 simulations.
ComponentDetails
Operating systemUbuntu 22.04 (kernel 6.14.0-27-generic)
Programming languagePython 3.11 (CPython)
Cipher suiteTLS_AES_256_GCM_SHA256
Key exchange(EC)DHE (Curve25519) when applicable
AuthenticationX.509 mTLS (full); PSK (psk/psk-(EC)DHE); resumption ticket (0-RTT)
KDF / MACHKDF via HMAC-SHA256
AEADAES-256-GCM (12-byte nonce, seq#-XOR style)
Librariescryptography, psutil, stdlib (dataclasses, typing, json, time, os), networkx, asyncio
Hardware (Memory)64GB
Host architecturex86_64
Table 5. Latency performance comparison of the TLS 1.3 options for N32 roaming based on measured sending and receiving latency.
Table 5. Latency performance comparison of the TLS 1.3 options for N32 roaming based on measured sending and receiving latency.
TLS OptionSending
Latency ( μ s)
Receiving
Latency ( μ s)
Total
Latency ( μ s)
Relative
Performance
0-RTT (Standard)15.0152.0167.01.00× (Baseline)
0-RTT FS (Proposed)52.0143.0195.01.17×
PSK-only112.0112.0224.01.34×
PSK-(EC)DHE144.0144.0288.01.72×
full handshake734.0669.01403.08.40×
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Lastre, J.K.; Ko, Y.; Kwon, H.; You, I. Evaluating Transport Layer Security 1.3 Optimization Strategies for 5G Cross-Border Roaming: A Comprehensive Security and Performance Analysis. Sensors 2025, 25, 6144. https://doi.org/10.3390/s25196144

AMA Style

Lastre JK, Ko Y, Kwon H, You I. Evaluating Transport Layer Security 1.3 Optimization Strategies for 5G Cross-Border Roaming: A Comprehensive Security and Performance Analysis. Sensors. 2025; 25(19):6144. https://doi.org/10.3390/s25196144

Chicago/Turabian Style

Lastre, Jhury Kevin, Yongho Ko, Hoseok Kwon, and Ilsun You. 2025. "Evaluating Transport Layer Security 1.3 Optimization Strategies for 5G Cross-Border Roaming: A Comprehensive Security and Performance Analysis" Sensors 25, no. 19: 6144. https://doi.org/10.3390/s25196144

APA Style

Lastre, J. K., Ko, Y., Kwon, H., & You, I. (2025). Evaluating Transport Layer Security 1.3 Optimization Strategies for 5G Cross-Border Roaming: A Comprehensive Security and Performance Analysis. Sensors, 25(19), 6144. https://doi.org/10.3390/s25196144

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop