Next Article in Journal
Control of a Scenedesmus obliquus UTEX 393 Microalgae Culture Using Virtual Reference Feedback Tuning
Previous Article in Journal
Advanced Ultrasonic Diagnostics for Restoration: Effectiveness of Natural Consolidants on Painted Surfaces
Previous Article in Special Issue
CoFT: A Fair and Transparent Compensation Framework for Hierarchical Federated Learning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Towards 6G Roaming Security: Experimental Analysis of SUCI-Based DoS, Cost, and NF Stress

Department of Cyber Security, Kookmin University, Seoul 02707, Republic of Korea
*
Author to whom correspondence should be addressed.
Appl. Sci. 2026, 16(1), 508; https://doi.org/10.3390/app16010508 (registering DOI)
Submission received: 17 November 2025 / Revised: 26 December 2025 / Accepted: 26 December 2025 / Published: 4 January 2026
(This article belongs to the Special Issue AI-Enabled Next-Generation Computing and Its Applications)

Abstract

This study investigates performance overheads and security threats in 6th Generation Mobile Communication (6G) roaming environments, which are expected to enable services such as autonomous driving, smart cities, and remote healthcare that demand ultra-low latency and high reliability. To bridge the gap between standardization and real-world deployment, we built a realistic roaming testbed by separating the home and visited public land mobile networks (H-PLMN and V-PLMN) and simulating user equipment (UE) interactions. In this environment, we defined and measured roaming cost by comparing non-roaming and roaming procedures, and reproduced two Subscription Concealed Identifier (SUCI)-based denial-of-service (DoS) attacks: random generation and replay. Our experiments showed that intermediary functions such as the Security Edge Protection Proxy (SEPP) and Service Communication Proxy (SCP) introduced CPU/memory overhead and latency, highlighting performance degradation unique to roaming. Moreover, random SUCI generation concentrated load on the Authentication Server Function (AUSF) in the H-PLMN, whereas replay attacks distributed it across both the H-PLMN and the V-PLMN, consistently identifying the AUSF as a bottleneck. These findings demonstrate that roaming enlarges the attack surface and exposes vulnerabilities not fully addressed in current standards. We conclude that secure and reliable 6G roaming requires multi-layered defense strategies with inter-operator cooperation, providing empirical evidence to guide standardization and operational practice.

1. Introduction

ITU-R (International Telecommunication Union Radio Communication Sector) IMT-2030 (International Mobile Telecommunications-2030) [1] presents core scenarios for 6th Generation Mobile Communication (6G) services, as shown in Figure 1, expanding to autonomous driving, smart cities, and healthcare, highlighting artificial intelligence (AI) convergence and ubiquitous connectivity. In this context, it emphasizes the importance of roaming by naming interoperability and interworking across heterogeneous networks and non-terrestrial networks (NTN) as key principles. Therefore, roaming is positioned not merely as a technical feature but as a critical requirement for ensuring both security and performance in the 6G era.
Meanwhile, the 3rd Generation Partnership Project (3GPP) 6G standardization roadmap moves from Release 20 to Release 21 and addresses migration and interworking with 5th Generation Mobile Communication (5G) systems [2,3]. However, the standardization discussions mainly focus on procedural and architectural aspects, leaving performance degradation and attack impacts in practical deployments underexplored. This study addresses this gap by providing empirical evidence that can inform both the standardization process and operator practices.
Although this work is positioned in the context of 6G roaming, the experimental evaluation is conducted on a 5G standalone (SA) roaming platform as a practical baseline, because 6G roaming protocols and implementations are not yet finalized. Therefore, the reported results should be interpreted as forward-looking evidence that informs early 6G roaming design and operational planning, rather than as measurements of a finalized 6G system.
In global roaming procedures, packets traverse multiple national or operator domains. As the number of transit points increases, the attack surface broadens and transmission latency grows. 5G roaming provides security negotiation and message protection based on the Security Edge Protection Proxy (SEPP). In this process, additional latency and resource consumption are inevitable. Thus, roaming inherently entails a dual burden of degraded service quality and heightened security risk.
Recent studies have reported vulnerabilities related to subscriber identifiers, including attacks leveraging the Subscription Concealed Identifier (SUCI), such as SUCI-Catchers and fake base station based tracking [4,5,6,7,8], indicating that SUCI security is not yet complete. In particular, the roaming setting enables unique attack vectors that are not feasible in non-roaming baseline. These include generating SUCI values at random to send non-existent subscriber information, and replaying previously used SUCIs to induce authentication failure. Such attacks place additional load on both the home public land mobile network (H-PLMN) and the visited public land mobile network (V-PLMN) and, depending on the attack type, can create bottlenecks at specific network functions (NFs).
To ensure seamless roaming services in the 6G era, a realistic, scenario-based experimental environment and quantitative analysis are essential. Although roaming studies have been reported previously [9,10,11,12,13], practical operational aspects, such as separation of H-PLMN and V-PLMN environments, have not been sufficiently considered, limiting reproducibility and precise measurement. In particular, these studies generated signaling traffic internally within the core network without UE simulation, thereby assuming an internal attacker model and failing to reflect actual user flows; in contrast, our work incorporates UE-based scenarios to reproduce more realistic roaming procedures. Consequently, practical applicability and generalizability have also been constrained.
Accordingly, this study aims to build a realistic roaming environment and systematically analyze the performance overhead and security threats that arise during roaming. By measuring roaming cost and analyzing the impact of SUCI-based attacks, we report structural vulnerabilities and propose responses to the expanded attack surface, thereby offering insights into 6G roaming security. Unlike existing standardization efforts that emphasize procedural and architectural aspects, our empirical results shed light on operational issues that arise in practice, thereby bridging the gap between specification and deployment.
The contributions of this paper are as follows.
  • Construction of a realistic roaming testbed: By separating H-PLMN and V-PLMN, we enable reproducibility and fine-grained measurement that were lacking in prior work.
  • Definition and measurement of roaming cost: We execute the same procedures in non-roaming and roaming environments and analyze the roaming cost, which refers to additional resource consumption and latency introduced by SEPP-based procedures.
  • Reproduction and analysis of SUCI-based attacks: We reproduce SUCI random-generation and SUCI replay attacks, compare the load distribution between H-PLMN and V-PLMN, and identify the NFs at which bottlenecks occur in each network.
  • Guidance under an expanded attack surface: Considering the expanded attack surface in roaming, we propose broader detection and prediction strategies, providing insights for 6G roaming.
The remainder of this paper is organized as follows. Section 2 reviews the background of 5G roaming and two types of SUCI-based denial-of-service (DoS) attacks (random generation and replay). Section 3 presents the experimental environment, threat model, and evaluation metrics. Section 4 reports scenario-based experimental results and provides quantitative comparison and analysis. Section 5 describes mitigation strategies, detection criteria, and discussion of the findings. Finally, Section 6 concludes the paper and outlines future research directions.

2. Background

2.1. Fifth Generation Roaming Architecture and Registration Procedures

The 5G core network adopts a service-based architecture (SBA) that departs from previous generations through its disaggregated network functions (NFs) and service-oriented design. In roaming scenarios, this architecture requires coordination across multiple operator domains, resulting in complex inter-operator signaling flows that traverse network boundaries [12].
Key network functions involved in roaming registration include the Access and Mobility Management Function (AMF), Authentication Server Function (AUSF), Unified Data Management (UDM), Unified Data Repository (UDR), and Service Communication Proxy (SCP), which collectively handle mobility management, authentication, subscription data access, and service discovery [12,14,15]. In addition, the Security Edge Protection Proxy (SEPP) plays a critical role in roaming environments by providing end-to-end protection for inter-PLMN signaling through message filtering, topology hiding, and cryptographic mechanisms [16]; while SEPP strengthens inter-operator security, it also introduces additional processing overhead and latency, contributing to the overall roaming cost in terms of resource consumption and signaling delay.
In roaming scenarios, the visited public land mobile network (V-PLMN) operates its own set of NFs, including a visited AMF (vAMF), visited SCP (vSCP), and visited SEPP (vSEPP), while the home PLMN (H-PLMN) maintains corresponding home network functions such as hAUSF, hUDM, hUDR, hSCP, and hSEPP [14]. The roaming registration procedure begins when the user equipment (UE) initiates registration via the visited network’s gNB, after which authentication and subscription verification are performed through inter-operator signaling between the visited and home networks.
Figure 2 illustrates the 5G roaming registration flow. First, vSEPP and hSEPP establish a secure N32 interface using mutual TLS authentication and capability negotiation. The UE then transmits a registration request containing an encrypted SUCI, which is forwarded from the gNB to the vAMF. The vAMF relays the authentication request through the SEPPs to the hAUSF, which decrypts the SUCI and coordinates with the hUDM to retrieve subscriber authentication vectors and subscription data. Following successful authentication and NAS security context establishment, the vAMF completes the procedure by issuing a Registration Accept message to the UE.
Although these procedures ensure interoperability and security across operator domains, they also introduce extended signaling paths and interdependencies that amplify processing overhead in roaming environments. This complexity motivates a closer examination of how subscriber identity protection mechanisms, particularly SUCI, behave under roaming conditions.

2.2. SUCI Privacy Mechanism and Roaming-Specific Attack Surface

The Subscription Concealed Identifier (SUCI) was introduced in 5G to mitigate privacy risks associated with transmitting permanent subscriber identifiers in plain text. By encrypting the Subscription Permanent Identifier (SUPI) using the home network’s public key, SUCI ensures that only the H-PLMN can recover the subscriber identity while preserving the routing information required for network selection [7,17].
Prior studies have identified several limitations in SUCI-based privacy protection, including linkability across sessions and reduced anonymity due to variable-length identifiers [4,7]. Other research has explored attacks targeting intelligent network components, particularly in O-RAN environments, rather than the SUCI mechanism itself [6]. However, these studies primarily focused on standalone network scenarios and did not consider the operational impact of SUCI processing in multi-operator roaming environments.
Roaming fundamentally alters the threat landscape by distributing authentication procedures across administrative domains and extending signaling paths. In such environments, SUCI validation requires inter-operator communication before subscriber legitimacy can be determined, increasing resource consumption prior to attack detection. This work therefore shifts focus from privacy compromise to resource exhaustion, identifying SUCI-based registration as a vector for volumetric denial-of-service (DoS) attacks in roaming contexts.
Two attack mechanisms exploit SUCI processing requirements during roaming registration. In the SUCI random generation attack, adversaries construct syntactically valid but cryptographically random SUCI values using publicly known parameters such as MCC and MNC. These requests are forwarded through the visited network to the home network, where decryption attempts and subscriber lookups consume computational resources before failure is detected. In the SUCI replay attack, previously observed legitimate SUCI values are reused to trigger repeated authentication attempts, forcing the network to process redundant signaling procedures that ultimately fail during verification.
These attacks differ from prior SUCI-related threats in several key aspects. First, the attack surface is extended across multiple operator domains. Second, resource exhaustion impacts both visited and home networks simultaneously. Third, SUCI validity can only be determined after extensive inter-operator signaling, maximizing resource consumption before mitigation becomes possible. Finally, home operators have limited visibility and control over traffic originating from visited networks, complicating defense deployment [18].

2.3. Roaming Security Challenges in Multi-Operator Environments

Roaming agreements establish trust relationships that create interdependent security domains, where vulnerabilities or misconfigurations in one operator’s network can propagate to roaming partners across regions. These dependencies are further exacerbated by asymmetries in operator capabilities, as smaller networks may lack the resources to implement security controls comparable to those of larger operators [19].
While SEPP provides confidentiality and integrity protection for inter-operator signaling, the distributed nature of roaming authentication increases processing overhead and exposes additional attack surfaces. Roaming traffic must traverse multiple administrative domains and security checkpoints before reaching validation points in the home network, introducing both latency and opportunities for adversarial exploitation. Prior work has examined SEPP configuration trade-offs, highlighting the balance between cryptographic strength and performance degradation in roaming procedures [20].
Despite these protections, current roaming security frameworks remain vulnerable to volumetric attacks that exploit protocol-compliant signaling rather than cryptographic weaknesses. The service-based architecture of 5G, while improving flexibility and scalability, amplifies these risks by requiring coordination across disaggregated NFs and inter-operator interfaces, each representing a potential target for denial-of-service attacks [21,22].

2.4. Evolution of DoS Attacks in Roaming Contexts

The transition to cloud-native, disaggregated 5G architectures has reshaped denial-of-service attack strategies, shifting focus from bandwidth exhaustion to computational and signaling resource depletion [23]. The exposure of numerous API endpoints within the service-based architecture enables attackers to exploit protocol-compliant requests that trigger costly authentication and state management operations [24]. SUCI-based flooding exemplifies this class of attacks, allowing adversaries to induce substantial disruption with relatively low traffic volumes.
Emerging 5G features such as network slicing and massive machine-type communications further amplify DoS risks by increasing resource contention across shared infrastructure layers [25,26]. In roaming environments, these vulnerabilities are magnified, as attacks may originate from external networks that are beyond the home operator’s direct control. SUCI-based flooding attacks can simultaneously overload visited and home network functions, while SEPPs themselves may become bottlenecks due to mandatory processing of all inter-operator traffic.
Looking toward 6G, the integration of AI-driven optimization, non-terrestrial networks, and ultra-dense connectivity is expected to further expand the attack surface [27,28,29]. These trends reinforce the need for empirical investigation into roaming-specific DoS vulnerabilities, motivating the experimental analysis presented in this study.

3. Methodology

3.1. Experimental Environment

The experimental environment is summarized in Table 1. We conducted experiments on a KVM/QEMU-based host equipped with an AMD Ryzen Threadripper PRO 5975WX 32-core processor and 256 GiB of memory. The host operating system was Debian GNU/Linux 12 with kernel version 6.8.4.
Three virtual machines were provisioned for the experiments. The first virtual machine acted as the UE and gNB, running PacketRusher on Ubuntu 24.04.1 LTS. It was allocated 8 vCPUs and 16 GiB of memory, and operated within the 10.10.1.0/24 subnet. The second virtual machine was configured as the V-PLMN and ran Open5GS 2.7.5. This VM was allocated 4 vCPUs and 8 GiB of memory, and connected to the 10.10.2.0/24 subnet. The third virtual machine served as the H-PLMN, also running Open5GS 2.7.5 on Ubuntu 24.04.1 LTS. It was allocated 8 vCPUs and 16 GiB of memory, and used the 10.10.3.0/24 subnet.
All three virtual machines were attached to the same Linux bridge, while distinct /24 subnets were assigned to ensure clear separation among PLMNs. All systems were synchronized via NTP, and no additional artificial latency or bandwidth constraints were imposed during the experiments.

3.2. Threat Model and Assumptions

The threat model of this study is premised on a roaming environment. A UE accesses the H-PLMN through a V-PLMN, and it is assumed that a roaming agreement between the two networks enables the registration procedure to be carried out normally; while the non-roaming environment is not part of the threat model itself, it is employed in the experiments as a baseline scenario for comparison.
The adversary is assumed to know the network identifiers (MCC/MNC) of both the H-PLMN and V-PLMN and to be aware that a roaming agreement exists between them. The adversary also understands the basic signaling flow of the initial registration procedure, in which a UE communicates with the gNB, the request is passed to the V-PLMN AMF, and subsequently forwarded to the AUSF and UDM in the H-PLMN. Furthermore, the adversary recognizes that the SUCI represents an encrypted subscriber identifier. Although it cannot be decrypted, the adversary is aware that it is used as an input to the registration procedure.
The adversary is capable of sending registration requests directly to the V-PLMN. It can generate random SUCIs and transmit them in large volumes, and it can observe other UEs’ registration requests over the V-PLMN radio interface. Based on this capability, the adversary can replay the observed SUCIs, thereby causing unnecessary resource consumption in the H-PLMN.
However, the adversary is not capable of breaking the underlying cryptographic algorithms (e.g., SUCI encryption, TLS key exchange), nor is it assumed to compromise NF instances within the H-PLMN or V-PLMN or gain operator-level privileges. The attacks considered in this study are strictly limited to exploiting the procedural handling of the protocol, rather than breaking its cryptographic foundations.
Figure 3 illustrates the random SUCI generation attack, in which syntactically valid but non-existent SUCIs are forged and forwarded to the home network. The processing chain leads to a lookup failure at the hUDM, resulting in a 404 USER_NOT_FOUND, but only after CPU and memory resources are consumed across the AUSF and UDM. Figure 4 shows the SUCI replay attack, where previously observed legitimate SUCIs are replayed. Because the identifiers are valid in format and routing, the requests traverse deeper into the visited network’s processing path and trigger stateful authentication steps before ultimately failing with a RES*_MISMATCH. These diagrams highlight how different SUCI-based attacks propagate through the roaming architecture and indicate the points where unnecessary resource consumption occurs.
Random SUCIs were synthetically generated by selecting valid MCC/MNC values corresponding to the target PLMN and applying the standard SUCI construction procedure defined in 3GPP TS 33.501 [30]. The routing indicator was populated with valid but non-subscriber-specific values, and the SUCI was encrypted using the ECIES-based protection profile as specified in the 5G standard. Replay SUCIs were obtained through internal logging of previously generated SUCI messages within the testbed, rather than over-the-air capture. Although 5G-AKA provides replay protection mechanisms based on SQN and RES*, the evaluated SUCI replay attacks target pre-authentication signaling and therefore are not mitigated by these protections.

3.3. Workloads and Procedure

This study defines two workload modes. First, the burst mode increases the number of simultaneous registration attempts from 1000 to 5000 and continues until all requests are completed, to evaluate the impact of instantaneous concurrent load. Second, in the request per second (RPS) mode, the request rate starts at 25 and doubles step by step (25, 50, 100, 200, 400). Each workload proceeds until a total of 10,000 requests have been completed, thereby assessing the impact of sustained load. Every workload was repeated ten times, and the average values were used for analysis.
All experiments followed these two workload modes, namely burst and RPS. First, baseline data were collected from normal registration requests, which were conducted in both roaming and non-roaming environments to compare resource consumption and to establish the notion of roaming cost. Here, roaming cost is defined as the incremental overhead of roaming relative to the non-roaming baseline under the same workload, i.e., the additional CPU, memory, and (when reported) latency introduced by inter-PLMN signaling and roaming security mechanisms (e.g., SEPP/SCP processing and N32-related protection). Subsequently, two SUCI-based attack scenarios, random SUCI generation and SUCI replay, were carried out under the roaming environment, to observe deviations from the baseline and to analyze resource consumption and bottlenecks across NFs in both the H-PLMN and V-PLMN.
After each workload was completed, the virtual machines were rebooted to reset the system state before the next experiment. Measurements were taken according to the characteristics of each workload: in the burst mode, CPU and memory utilization were recorded every 0.1 s; meanwhile, in RPS mode, the same metrics were collected at 1 s intervals. Through this procedure, the study enabled quantitative comparisons of NF resource consumption and system response characteristics under different workloads.

3.4. Metrics and Validity

For the analysis of experimental results, this study defines resource consumption, latency, success rate, and error rate as the primary metrics. NF-level resource usage was measured in terms of CPU and memory utilization. In the non-roaming baseline, the monitored NFs included the AMF, SCP, AUSF, UDM, and UDR. In the roaming scenario, the measurements covered the vAMF, vSCP, and vSEPP in the V-PLMN, as well as the hAUSF, hUDM, hUDR, hSCP, and hSEPP in the H-PLMN, thereby enabling a clear distinction of resource usage distribution introduced by the roaming procedure.
End-to-end latency was measured from the perspective of the PacketRusher, defined as the elapsed time between the transmission of a registration request and the reception of a Registration Accept message. The success rate was calculated based on whether a Registration Accept message was received; meanwhile, timeouts, NAS retransmissions, and SCTP reconnections were recorded as error rates.
To ensure validity, each workload was executed ten times, and the average values were used in the analysis. After each workload, the virtual machines were rebooted to reset the system state and to prevent residual effects from influencing subsequent experiments. No artificial network delay or packet loss was introduced, and background load was minimized. The baseline was established using normal registration procedures in both roaming and non-roaming environments, allowing the definition of roaming cost and comparison with SUCI-based attack scenarios.

4. Experimental Evaluations

4.1. Gate Experiment and Valid Window

Before conducting roaming cost evaluation and scenario-based analysis, a gate experiment was performed to validate the effective workload ranges. The evaluation metric was defined as the error count observed during the registration procedure, and each experiment was repeated three times with the average values reported. Although CPU and memory utilization, as well as latency, are also important indicators, they are largely constrained by the maximum capacity of the allocated virtual resources. Hence, they were not used as the primary determinants for workload validity. Instead, error count was chosen as the most direct and reliable metric for this purpose.
For the burst workload, error counts increased linearly within the range of 1000–4000 UEs, remaining within a predictable margin. Beyond 4500 UEs, however, error counts rose sharply, deviating from the linear approximation with more than a 20% prediction error. Therefore, the valid window for burst workload was defined as 1000–4000 UEs (Figure 5).
For the RPS workload, error counts showed a near-linear increase across 25–400 RPS, with only minor deviations from the fitted line. At 800 RPS, however, the error rate exceeded 5% and the deviation from the linear prediction became significant, indicating the onset of instability. Accordingly, the valid window for RPS workload was set to 25–400 RPS (Figure 6).
In summary, the burst workload illustrates the system’s tolerance to instantaneous concurrent load, while the RPS workload captures the effect of sustained request rates. These valid windows provide the basis for subsequent analysis in Section 4.2, Section 4.3 and Section 4.4, ensuring that the evaluation is confined to meaningful and stable operating ranges.

4.2. Roaming Cost

In this study, roaming cost refers to the incremental overhead observed when roaming is enabled, measured as the difference between roaming and non-roaming baselines under identical workloads. This overhead captures additional CPU and memory utilization and the added processing/queuing latency caused by inter-PLMN signaling and roaming security functions (e.g., SEPP, SCP, and N32-related protection).
We primarily focus on CPU and memory because roaming-related control plane load and SUCI-based attacks manifest as resource exhaustion at core network functions, directly affecting availability and stability. CPU/memory utilization is also consistently measurable across deployments, making it a practical operator-relevant metric; latency is reported as a complementary indicator where appropriate.

4.2.1. Burst Workload Results

In the burst mode experiment with 1000–4000 concurrent UEs, the bar chart in Figure 7 shows that, even under identical registration procedures, the CPU usage is significantly higher in the roaming scenario than in the non-roaming baseline. This is because additional NFs in the H-PLMN, such as AUSF, UDM/UDR, and SEPP, are engaged, while the V-PLMN’s AMF also experiences additional memory overhead for context management.
Meanwhile, the cost graph in Figure 8 does not merely compare values but quantifies the additional CPU burden attributable to roaming. The fitted cost function with UE count u (scaled by 1000) is as follows:
Cos t C P U ( u ) = 0.4968 u 2 0.2740 u + 27.0058 , ( R 2 = 0.99965 ) ,
indicating that the incremental resource consumption due to roaming grows non-linearly with the number of concurrent UEs.
The memory usage results are summarized in Table 2. Roaming memory usage increases steadily with load, mainly due to the V-PLMN AMF overhead.

4.2.2. RPS Workload Results

In the RPS mode, the request rate was increased from 25 up to 400 RPS with a total of 10,000 registration attempts. The bar chart in Figure 9 shows that CPU usage in the roaming scenario grows more rapidly than in the non-roaming baseline. This is due to the continuous involvement of H-PLMN NFs (AUSF, UDM/UDR, SEPP, SCP) in processing each request.
The cost graph in Figure 10 quantifies the additional CPU overhead caused by roaming. The fitted quadratic function with request rate r (scaled by 100) is as follows:
Cost C P U ( r ) = 9.5346 r 2 + 70.2526 r 2.3539 , ( R 2 = 0.99964 ) ,
showing that, beyond a certain RPS threshold, roaming introduces disproportionately high additional resource consumption.
Memory usage also shows consistently higher values in roaming than in non-roaming, though with a gentler growth rate. As in the burst case, most of the overhead originates from the V-PLMN AMF, which manages subscriber state. Table 3 summarizes the results.
In summary, the bar charts highlight that the same registration procedure imposes higher CPU and memory loads in roaming scenarios, while the cost graphs generalize the incremental resource consumption through fitted functions. Together, These results emphasize the tangible overhead introduced by roaming procedures and provide a quantitative basis for defining “roaming cost” in terms of system resources.

4.3. Attack Scenario 1—Random SUCI Registration Request

The random SUCI registration request attack transmits non-existent subscriber identifiers to induce unnecessary processing in the core network. In this experiment, we emulate the case where randomly generated SUCIs are forwarded from the V-PLMN to the H-PLMN. The analysis focuses on burst workloads with 1000–4000 UEs and RPS workloads with 25–400 RPS, selecting the lower and upper bounds of the valid range (Section 4.1) to represent relatively relaxed and saturated states. We report CPU utilization as the main metric, since memory variations were marginal and did not substantially affect interpretation.

4.3.1. Burst Workload Results

Table 4 shows CPU utilization when simultaneous registration requests are injected. At 1000 UEs, hAUSF increased from 2.61% to 6.49% (+3.88%p) and hUDM from 2.57% to 6.78% (+4.21%p). At 4000 UEs, hAUSF increased from 9.11% to 19.04% (+9.93%p) and hUDM from 9.32% to 30.78% (+21.46%p). These correspond to increases of 2.5–3.2 times relative to the normal case. Although V-PLMN functions such as AMF show larger absolute values, this is due to state maintenance overhead in normal procedures. The critical observation is that attack traffic systematically drives up H-PLMN authentication functions.

4.3.2. RPS Workload Results

Table 5 presents CPU utilization under sustained request rates. At 25 RPS, hAUSF grew from 0.52% to 1.36% (+0.84%p) and hUDM from 0.51% to 4.91% (+4.40%p). At 400 RPS, hAUSF jumped from 6.24% to 11.12% (+4.88%p) while hUDM surged from 6.93% to 37.27% (+30.34%p). In particular, hUDM consumed more than five times the CPU compared to the normal baseline, highlighting that sustained random SUCIs severely stress subscriber data management.

4.3.3. Interpretation

In Table 4 and Table 5, blue values denote decreases in CPU utilization, which occur because invalid SUCIs terminate registration prematurely and thus reduce V-PLMN load. Increases are distinguished by color: orange values highlight moderate but meaningful growth, whereas red values indicate sharp surges corresponding to NF bottlenecks. The random SUCI registration attack therefore constitutes an asymmetric DoS that disproportionately exhausts H-PLMN resources. Although V-PLMN functions maintain higher absolute load due to session handling, the attack specifically escalates CPU usage of AUSF and UDM by 2–5 times. This directly threatens registration latency and success rates of legitimate subscribers, undermining the availability of roaming services. In addition, the standard deviations reported in Table 4 and Table 5 remain relatively small across all workloads, indicating that the observed CPU utilization patterns are stable and consistently reproducible over repeated runs. This suggests that the increases in hAUSF and hUDM load under random SUCI attacks are not caused by transient fluctuations but reflect systematic stress introduced by the attack.

4.4. Attack Scenario 2: SUCI Replay Attack

In this section, we compare Attack Scenario 1 (random SUCI) and Attack Scenario 2 (replayed SUCI) to analyze the NF-level changes in workload. This comparison highlights the difference between invalid random inputs and validly formatted replayed identifiers, showing how the latter propagates deeper into the signaling path and results in broader resource consumption.

4.4.1. Burst Workload Results

Table 6 illustrates the key CPU utilization trends observed under burst workloads with 1000 and 4000 concurrent UEs for both Attack1 and Attack2. Across the V-PLMN, replay attacks (Attack2) consistently induce substantially higher CPU utilization at AMF, SCP, and SEPP than random SUCI flooding (Attack1). This reflects the fact that replayed identifiers traverse deeper into the roaming signaling chain, amplifying processing overheads at the visited network functions. On the H-PLMN side, AUSF exhibits a clear increase in CPU utilization under replay attacks, indicating repeated synchronization failure checks and concentrated authentication processing. This trend becomes more pronounced as the number of UEs increases, demonstrating that burst-scale replay attacks can rapidly escalate the authentication workload at the home network.

4.4.2. RPS Workload Results

Table 7 summarizes the CPU utilization trends under sustained request-rate workloads at 25 and 400 RPS. Similar to the burst scenario, replay attacks impose significantly higher overhead on V-PLMN network functions, particularly AMF, SCP, and SEPP, highlighting the impact of deeper signaling traversal under replayed SUCI identifiers. In the H-PLMN, AUSF shows a markedly steeper increase in CPU utilization under replay attacks as the request rate rises. Compared to burst workloads, the RPS scenario demonstrates that continuous replay traffic can deplete authentication resources more aggressively, underscoring the heightened risk posed by sustained attack patterns.

4.4.3. Interpretation

As highlighted by the key trends in Table 6 and Table 7, replay attacks consistently induce broader and more severe resource consumption than random SUCI flooding. V-PLMN network functions (AMF, SEPP, and SCP) experience higher CPU utilization under Attack2, as replayed identifiers propagate deeper into the roaming signaling path. On the H-PLMN side, AUSF exhibits the most pronounced sensitivity to replay attacks, with sustained RPS workloads causing sharper increases than burst scenarios. This indicates that continuous replay traffic can deplete authentication resources more effectively than short-lived bursts.
Overall, Attack1 primarily concentrates load on the H-PLMN authentication infrastructure, whereas Attack2 distributes the workload across both V-PLMN and H-PLMN. This distributed impact amplifies the overall stress on roaming operations and poses a greater threat to service stability. The consistently low standard deviation across repeated runs confirms that these trends are robust and reproducible, reinforcing the reliability of the comparative analysis.

5. Mitigation, Detection, and Discussion

5.1. Observed Resource Utilization Patterns

The time series analysis in Figure 11 captures network function resource utilization across alternating scenarios of normal operation and RPS 100 DoS attacks in home and visiting 5G roaming networks. This experimental design intentionally mixes baseline conditions with attack periods to demonstrate the stark contrast in resource consumption patterns and validate detection thresholds. The temporal sequence shows: (1) initial baseline operation (before 08:29:00), (2) first DoS attack period (08:29:00–08:29:40), (3) return to normal operation (08:29:40–08:29:50), and (4) resumed attack scenario (after 08:29:50).
During baseline operation, resource utilization remains consistently low with CPU usage below 5% and memory consumption under 20% across all network functions. Upon attack initiation at 08:29:00, sudden spikes appear across multiple functions, with SCP experiencing the highest impact, reaching 40–60% CPU utilization in both networks. The home network demonstrates more comprehensive stress across additional functions including AUSF, UDM, and UDR, with sustained elevation in SCP and SEPP. Memory consumption patterns follow similar trends, with the home network reaching higher peak memory usage during attack periods.
The intentional return to normal operation around 08:29:40 is evidenced by the abrupt drop in all metrics back to baseline levels, demonstrating system recovery when attack traffic ceases. The subsequent spike at 08:29:50 represents a resumed attack scenario, again elevating resource consumption to attack-level patterns. This cyclical behavior validates that the observed resource exhaustion is directly attributable to the DoS attack rather than system instability. The visiting network shows particularly pronounced vulnerability with sharp resource spikes and more volatile consumption patterns during attack phases. System-level CPU consumption increases to 15–50% across both networks during attacks, with corresponding memory utilization rising significantly above baseline. The clear correlation between attack presence and resource stress, combined with rapid recovery during normal periods, provides robust indicators for anomaly detection systems with well-defined deviation thresholds distinguishing normal roaming operations from DoS attack conditions.

5.2. Mitigation Strategies

5.2.1. Rate Limiting

Rate limiting is a common network defense technique that restricts the number of requests or messages processed within a given time window, helping to prevent overload and DoS conditions. In 5G roaming, it is especially critical for protecting control plane entities against flooding attacks and malicious traffic bursts.
Figure 12 shows Oracle’s SEPP which integrates rate limiting as a core defense feature to secure inter-PLMN communication [31]. The SEPP enforces configurable ingress and egress traffic thresholds, ensuring that only traffic within acceptable bounds is forwarded between operators. When limits are exceeded, the SEPP automatically blocks excessive requests and returns standardized error responses, thereby preventing abnormal signaling spikes from exhausting network resources. This mechanism provides operators with fine-grained control over roaming traffic while maintaining compliance with 3GPP standards, making it a practical first line of defense against volumetric signaling attacks in 5G core deployments.

5.2.2. Dynamic Network Function Scaling

Cloud-native design emphasizes building applications that fully leverage modern cloud environments, enabling flexibility, scalability, and resilience. Kubernetes, a leading container orchestration platform, automates the deployment, scaling, and management of containerized applications, allowing networks to adapt quickly to changing demands [32]. In 5G roaming scenarios, Kubernetes enables both horizontal and vertical autoscaling of roaming-related core network functions (CNFs) such as SEPP, AUSF, UDM, and UDR, automatically adjusting resources based on monitored performance metrics like CPU, memory, and network throughput. This ensures that roaming services remain resilient and responsive, even under fluctuating inter-operator traffic conditions.
Beyond performance, Kubernetes-based scaling enhances robustness and security for roaming traffic. By dynamically adding instances or allocating additional resources to critical functions, the system can absorb sudden traffic spikes, including potential DoS [33] attacks targeting roaming interfaces, reducing the risk of service degradation. Combined with monitoring and automated scaling policies, this approach allows operators to maintain high availability and consistent service quality for subscribers traveling across different networks.

5.2.3. Blockchain

The 5GSBA protocol (“Secure Blockchain-based Authentication and Key Agreement for 3GPP 5G Networks”) proposes decentralizing parts of the authentication function across base stations via a blockchain ledger to eliminate the single point of failure in the centralized UDM entity [34]. By employing one-time secret hash functions, SUCI encryption, and replacing sequence number linkability with ECDH, the design counters replay attacks, linkability attacks, and crucially DoS and Distributed DoS (DDoS) threats.

5.3. Proof-of-Concept: Rate Limiter

5.3.1. Technical Setup

The proof-of-concept implements a rate-limiter for the SEPP in a realistic 5G roaming scenario emulation inside a cloud environment. The experimental environment consists of the technical components and technologies shown in Table 8.

5.3.2. Rate Limiter Implementation

The rate limiter is deployed as an NGINX reverse proxy positioned in front of the SEPP N32-f service. This architecture emulates industry-grade rate limiting solutions such as Oracle SEPP’s rate limiter. The rate limiting policy is implemented using NGINX’s limit_req and limit_conn modules, which regulate request rates and concurrent connections at the inter-PLMN boundary. The complete NGINX configuration is provided in Appendix A. In our deployment, the configuration enforces a base rate of 100 requests per second per IP address, with a burst capacity of 200 requests to accommodate legitimate traffic spikes. Connection limits are set to 50 concurrent connections per IP, preventing connection exhaustion attacks.

5.3.3. Attack Scenarios and Results

Three experimental scenarios were evaluated to assess the rate limiter’s effectiveness:
  • No rate limit (Apache Bench): Baseline measurement with direct SEPP access
  • Rate-limited (Apache Bench): NGINX rate limiter protecting against Apache Bench attack
  • Rate-limited (WRK): NGINX rate limiter defending against high-performance WRK attack
To ensure grayscale readability, Figure 13 and Figure 14 should be interpreted based on the scenario labels and throughput magnitude rather than color. In Figure 13, the no-rate-limit baseline exhibits the highest throughput, whereas both rate-limited cases remain substantially lower (with WRK slightly higher than Apache Bench under the same policy). Figure 14 summarizes these differences via throughput distributions and summary statistics, providing a monochrome-safe comparison across scenarios.

5.3.4. Analysis and Insights

The experimental results demonstrate the rate limiter’s effectiveness in mitigating DDoS attacks on the N32-f interface:
  • Throughput reduction: Without rate limiting, the Apache Bench attack achieved a mean receive throughput of 1.44 MB/s with peaks at 1.96 MB/s. With rate limiting enabled, this was reduced to 0.12 MB/s (92% reduction) for Apache Bench and 0.24 MB/s (83% reduction) for WRK attacks.
  • Packet rate control: Receive packet rates were suppressed from a mean of 958 packets/s (peak: 1303) to 115 packets/s for Apache Bench attacks and 161 packets/sec for WRK attacks when rate limiting was active.
  • Attack pattern differences: The WRK attack tool demonstrated approximately 2× higher throughput compared to Apache Bench under rate limiting conditions, indicating its more sophisticated request generation capabilities. However, both attack vectors were effectively constrained below harmful levels.
  • Traffic stability: The time series analysis reveals that rate limiting produces stable, controlled throughput patterns, eliminating the volatile spikes characteristic of unprotected services. This stability is crucial for maintaining Quality of Service (QoS) for legitimate roaming traffic.
  • Resource protection: By limiting concurrent connections and request rates per IP, the rate limiter prevents resource exhaustion at the SEPP level, ensuring availability for legitimate inter-operator signaling.
This proof-of-concept validates that rate limiting provides effective protection for 5G roaming interfaces against common HTTP flood attacks, demonstrating behavior comparable to commercial-grade SEPP rate limiters. The solution successfully maintains system stability and resource availability even under sustained attack conditions.

5.4. Proof-of-Concept Anomaly Detection Implementation

Anomaly detection in network security encompasses several methodological approaches, including specification-based detection (rule-based thresholds), statistical methods such as z-score and percentile-based detection [35], distance-based techniques such as k-Nearest Neighbors (k-NN) and Local Outlier Factor (LOF) [36], and machine learning approaches including One-Class Support Vector Machine (One-Class SVM), Isolation Forest [37], autoencoders, and ensemble methods [38]. Each approach presents distinct trade-offs in computational complexity, interpretability, and detection performance.
To demonstrate the practical applicability of our experimental findings, we develop a proof-of-concept anomaly detection framework using the resource utilization data collected from our roaming security experiments. The dataset comprises performance metrics from both normal operations and SUCI-based attack scenarios, enabling the detection of malicious roaming traffic patterns from NF-level resource signals.

5.4.1. Model Comparisons

Recent studies have evaluated a range of anomaly detection methods, including Isolation Forest, One-Class SVM, autoencoders, and ensemble approaches, across widely used network intrusion datasets. These works provide methodological baselines and empirical evidence that inform our model selection. A consolidated comparison of representative studies is provided in Appendix B. Overall, this body of evidence indicates that Isolation Forest and One-Class SVM remain competitive unsupervised baselines across diverse network datasets, while autoencoder-based approaches often achieve superior performance in complex or zero-day attack scenarios.

5.4.2. Detection Framework

For our proof-of-concept, we select Isolation Forest due to several advantages supported by recent research. First, Isolation Forest demonstrates favorable scalability with O(n log n) time complexity and low memory requirements, making it well-suited for high-volume monitoring [37]. Second, recent advances such as Extended Isolation Forest (EIF) address the curse of dimensionality by using hyperplane-based splitting rather than axis-parallel cuts, improving performance in high-dimensional feature spaces [39]. Third, Isolation Forest makes no strong assumptions about data distribution and can perform well when trained only on normal data without labeled anomalies [40]. Unlike density-based methods that often degrade under high dimensionality [37,41], Isolation Forest is based on anomaly isolation rather than explicit profiling of normal behavior. The mathematical formulation of the Isolation Forest anomaly score and its associated parameters are provided in Appendix C.1.
Our implementation employs an Isolation Forest with 300 trees using automatic sample sizing (50% of the training data per tree) and a contamination threshold of 8%. The model is trained exclusively on baseline (normal operation) data to establish normal behavior boundaries. The contamination parameter controls the strictness of the decision boundary and represents the proportion of the decision space flagged as anomalous, rather than the actual percentage of attacks in the dataset. A value of 8% provides a practical balance between precision and false alarms for production-style 5G monitoring. In addition, dynamic threshold optimization is applied to maximize the F1 score within a target recall range, supporting stable performance across varying operating conditions.

5.4.3. Feature Selection and Data Sources

Our feature selection targets CPU and memory utilization metrics collected from the host system and six critical 5G network functions (AMF, SEPP, SCP, AUSF, UDM, and UDR). These metrics are selected due to their direct correlation with attack-induced performance degradation and their universal availability in practical 5G deployments. The feature vector combines raw metrics with temporal statistics to capture both instantaneous and short-term behavioral patterns. The formal definition of the feature vector is provided in Appendix C.2.
Specifically, the model uses 14 raw CPU and memory metrics. Each raw metric is augmented with temporal statistics computed over a 30 s rolling window, including the mean, standard deviation, and maximum. This yields a total of 56 features, enabling detection of both abrupt spikes and gradually evolving resource-consumption patterns. All features are standardized using z-score normalization. Missing metrics are zero-filled to ensure consistent dimensionality across heterogeneous configurations. This design supports real-time deployment by balancing descriptive power and computational efficiency.
Figure 15 illustrates the distribution of the first two scaled features. To ensure grayscale readability, the figure should be interpreted using the legend-defined class labels (normal operation vs. SUCI-based DoS) rather than relying on color cues. The visualization shows distinguishable clustering tendencies between normal operation samples and attack samples, while also exhibiting partial overlap consistent with realistic operational conditions.

5.4.4. Evaluation Methodology

Our evaluation assesses the Isolation Forest model for 5G roaming attack detection using standard classification metrics and synthetic data augmentation to emulate deployment variability. The original dataset comprises 444 normal operation samples (baseline scenarios) and 121 attack samples RPS 100 scenarios representing high-rate DoS conditions), totaling 565 samples. From these samples, we extract 56 engineered features derived from CPU and memory utilization signals captured from the host system and key 5G network functions (AMF, SEPP, SCP, AUSF, UDM, and UDR). To improve robustness, we augment the dataset to include varying attack difficulty levels, gradual transitions, partial attacks, and realistic noise patterns. The model is trained exclusively on normal operation data and evaluated on both the original and augmented datasets. We report detection capability, false positive behavior, and generalization tendencies across different attack conditions. This proof-of-concept focuses on a single model family and a single high-rate scenario. A production-grade deployment would benefit from k-fold cross-validation, broader empirical comparisons (e.g., One-Class SVM and autoencoders), and evaluation across multiple attack intensities. These limitations are discussed further in Section 5.6. Performance metrics are computed as follows: precision is T P T P + F P , recall is T P T P + F N , and F1 score is 2 × P r e c i s i o n × R e c a l l P r e c i s i o n + R e c a l l , where T P , F P , and F N denote true positives, false positives, and false negatives, respectively.
Table 9 shows 92.1% precision, indicating a low false-alarm tendency when an attack is flagged. The recall of 85.3% confirms that most attack instances are detected. The resulting F1 score (88.6%) summarizes a balanced trade-off between precision and recall. Overall, these results suggest that the proof-of-concept can detect high-rate roaming DoS conditions with modest false positives. Figure 16 provides a low-dimensional view of the separation learned between normal operation and attack samples. For grayscale viewing, the separation should be interpreted based on the legend and the relative structure of the projected clusters, not on color intensity alone. Attack samples are assigned consistently higher anomaly scores than normal operation samples in the projected space, supporting the feasibility of resource-metric-based detection for roaming control plane attacks. In operational settings, threshold calibration and additional validation can further control false positives while maintaining sensitivity.

5.4.5. Operator Decision Framework: Balancing Security, Performance, and Cost Trade-Offs

Because operator objectives and infrastructure models vary (e.g., cost efficiency, ultra-low latency services, or hosted/shared deployments), no single roaming mitigation or detection strategy fits all cases. To improve readability and keep the main text focused on key experimental findings, the operator-oriented decision matrix, suggested decision steps, and illustrative scenarios are provided in Appendix D.

5.5. Key Findings and Implications

The construction of a realistic roaming testbed improved reproducibility and measurement precision compared to prior studies. By separating the H-PLMN and V-PLMN, the environment more faithfully reproduces inter-operator roaming procedures. This design also enables fine-grained NF-level performance measurement under controlled workloads.
By defining and measuring roaming cost, this study quantifies the performance gap between roaming and non-roaming environments. The introduction of intermediary functions such as SEPP and SCP increases CPU and memory utilization and adds latency. These results confirm that roaming introduces measurable performance overhead in practical deployments.
Our analysis of SUCI-based attacks reveals distinct resource-consumption patterns depending on attack type. Random SUCI generation concentrates load on the AUSF in the H-PLMN. In contrast, replay attacks follow a flow closer to normal procedures and distribute load across both the V-PLMN and H-PLMN. In both cases, AUSF emerges as a bottleneck under elevated signaling load.
These findings highlight the expanded attack surface and the need for countermeasures beyond a single-operator boundary. Because roaming interconnects multiple NFs across PLMNs, defenses confined to one domain are insufficient. A multi-layered security approach supported by inter-operator coordination is required. In particular, AI-based anomaly detection and dynamic NF scaling can strengthen resilience in future 6G roaming security frameworks.

5.6. Limitations

This study primarily focused on CPU and memory usage to reveal resource-consumption patterns. However, it does not sufficiently address additional performance metrics such as latency, registration success rate, or QoS indicators (e.g., packet loss and throughput). As a result, the characterization of roaming cost remains limited to resource-centric indicators.
In real-world international roaming, round-trip time (RTT) is typically higher due to long inter-operator paths and gateway traversal. Our experimental setup uses a single-host virtualized environment and therefore cannot reflect these RTT characteristics. Accordingly, the measured latency impact and the derived attack severity may underestimate effects in geographically distributed deployments.
The scope of attacks is confined to two SUCI-based DoS types (random generation and replay). Other realistic threats, such as SUCI catcher exposure, fake base station disruptions, downgrade attacks, or session-exhaustion attacks, were not evaluated in this study.
The proof-of-concept anomaly detection implementation also has methodological limitations:
  • Dataset scale: The dataset size (565 samples: 444 normal, 121 attack) is relatively small compared to the 56-dimensional feature space. This raises concerns about overfitting and generalization. Larger-scale validation using data collected from production environments would strengthen robustness.
  • Attack intensity coverage: The evaluation focuses on an RPS 100 scenario and does not capture the full spectrum of intensities (e.g., stealthy low-rate attacks or variable-rate attacks). Future work should evaluate multiple rates (e.g., RPS 50, 200, 500) to assess sensitivity and establish rate-dependent thresholds.
  • Algorithmic comparisons: While we justify Isolation Forest via comparative literature analysis (Appendix B), we do not provide direct empirical comparisons with alternatives (e.g., One-Class SVM and autoencoders) on our dataset. Comparative experiments with cross-validation would strengthen evidence for model selection.
  • Deployment variability: The model is trained on data from a controlled testbed. Real networks exhibit greater variability in traffic patterns, hardware configurations, and baseline utilization, which may affect detection accuracy and false positive rates.
Despite these limitations, the proof-of-concept demonstrates the feasibility of unsupervised anomaly detection for roaming security monitoring using NF-level resource metrics. The results provide a foundation for more comprehensive, production-grade implementations and evaluations.

6. Conclusions

This study experimentally verified SUCI-based DoS threats that may arise in 6G roaming environments and presented the resulting performance degradation and security implications. The contributions can be summarized in four aspects:
  • Establishing a realistic roaming testbed that ensures reproducibility and precision in experiments.
  • Defining and quantitatively measuring roaming cost to identify performance degradation factors inherent to roaming compared to non-roaming environments.
  • Reproducing and analyzing SUCI-based attacks to reveal resource consumption patterns at the NF level and highlight the structural vulnerability of the AUSF.
  • Proposing directions for countermeasures against the expanded attack surface, thereby laying the groundwork for future discussions on a secure 6G roaming framework.
In conclusion, This study empirically demonstrated the structural vulnerabilities of 6G roaming through a realistic experimental testbed, providing evidence to support operators and standardization bodies in establishing a 6G security framework. These directions can directly inform 3GPP and GSMA working groups as they refine security baselines for 6G roaming, ensuring that emerging standards incorporate resilience against SUCI-based flooding and replay attacks. In particular, the findings offer practical insights into 3GPP roaming standards, such as the N32 interface and SEPP/SCP interworking procedures defined in 3GPP TS 29.573 [42], as well as authentication and key management aspects specified in 3GPP TS 33.501 [30]. Moreover, these results are aligned with broader industry guidelines, including GSMA FS.40 [43], which emphasizes end-to-end security and inter-PLMN trust models. For example, the load concentration observed at the AUSF indicates the necessity of enhancing resource protection and distribution mechanisms at the standardization level, while SUCI-based attack patterns highlight the need to strengthen identity protection and integrity verification procedures.
Future research may extend in the following directions: (1) verifying amplification effects under multi-V-PLMN distributed attack scenarios; (2) integrating post-quantum cryptography (PQC) with the 6G-AKA protocol to evaluate next-generation authentication and key management structures; (3) applying AI-based anomaly detection to compare and validate the effectiveness of diverse learning algorithms for early threat detection and prediction; and (4) employing blockchain-based distributed ledger structures to enhance transparency and integrity in UDM/UDR key management and logging. By linking these outcomes with ongoing 3GPP and GSMA standardization discussions, this line of research can contribute to the establishment of concrete guidelines for secure 6G roaming frameworks.

Author Contributions

Conceptualization, T.W. and I.Y.; methodology, H.K. and J.K.L.; software, T.W.; validation, T.W., J.K.L. and I.Y.; formal analysis, T.W. and Y.K.; investigation, T.W. and H.K.; resources, Y.K. and J.K.L.; data curation, Y.K. and J.K.L.; writing—original draft preparation, T.W. and Y.K.; writing—review and editing, T.W., Y.K. and I.Y.; visualization, H.K.; supervision, Y.K.; project administration, I.Y.; funding acquisition, I.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by Institute of Information and communications Technology Planning and Evaluation (IITP) grant funded by the Korea government (MSIT) (RS-2024-00441484, Development of open roaming technology for Private 5G network).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The original contributions presented in the study are included in the article, further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
6G6th Generation Mobile Communication
PLMNpublic land mobile network
H-PLMNhome public land mobile network
V-PLMNvisited public land mobile network
UEuser equipment
SUCISubscription Concealed Identifier
DoSdenial-of-service
SEPPSecurity Edge Protection Proxy
SCPService Communication Proxy
AUSFAuthentication Server Function
ITU-RInternational Telecommunication Union Radio Communication Sector
IMT-2030International Mobile Telecommunications-2030
AIArtificial Intelligence
NTNnon-terrestrial network
3GPP3rd Generation Partnership Project
5G5th Generation Mobile Communication
NFnetwork function
gNBRadio Access Network
NASNon-Access Stratum
NAS SMCNAS Security Mode Command
QoSQuality of Service
5G-GUTI5G Globally Unique Temporary Identifier
AKAAuthentication and Key Agreement
NSINetwork Specific Identifier
MCCMobile Country Code
MNCMobile Network Code
RPSRequest per Second
CNFcore network function
DDoSDistributed DoS
k-NNk-Nearest Neighbors
LOFLocal Outlier Factor
SVMSupport Vector Machine
EIFExtended Isolation Forest
RTTRound-Trip Time
PQCPost-Quantum Cryptography

Appendix A. NGINX Configuration for SEPP Rate Limiting

This appendix provides the full NGINX configuration used for the proof-of-concept rate limiter deployed in front of the SEPP N32-f interface.
http {
    # Rate limiting zones
    limit_req_zone $binary_remote_addr zone=ip_limit:10m rate=100r/s;
    limit_conn_zone $binary_remote_addr zone=conn_limit:10m;
    server {
      listen 7779 ssl;
      # Apply rate limits with burst tolerance
      limit_req zone=ip_limit burst=200 nodelay;
      limit_conn conn_limit 50;
      # Return 503 Service Unavailable when exceeded
      limit_req_status 503;
      limit_conn_status 503;
      location / {
        proxy_pass https://sepp_n32f;
      }
   }
}

Appendix B. Comparison of Anomaly Detection Studies

Table A1. Comparison of anomaly detection studies: datasets, models, and key results.
Table A1. Comparison of anomaly detection studies: datasets, models, and key results.
Paper (Year)DatasetModelsBest ResultsKey Findings
Miguel-Diez et al. (2025) [44]NF-UNSW-NB15(-v2)One-Class SVM, Isolation Forest, othersAcc >98%, FPR <3.1%Isolation Forest competitive with One-Class SVM on NetFlow data
Sarhan et al. (2020) [45]NF-UNSW-NB15, NF-CIC-IDS2018Various (dataset study)Strong F1/AUC for tree modelsStandard NetFlow feature benchmarks
Fuhnwi et al. (2023) [46]NSL-KDD subsetsIsolation Forest, One-Class SVMIsolation Forest: F1 = 0.957, DR = 0.963Isolation Forest outperforms One-Class SVM on HTTP traffic
Hindy et al. (2020) [47]CIC-IDS2017, NSL-KDDAutoencoder, One-Class SVMAutoencoder superior to One-Class SVMAutoencoder better for zero-day detection
Rydsund (2024) [48]CIC-IDS2017Autoencoder, Isolation Forest, One-Class SVM, PCAAutoencoder: AUC = 0.978 (best)Autoencoder > One-Class SVM ≈ Isolation Forest performance
Elsaid et al. (2024) [49]IIoT/StreamingIsolation Forest variantsImproved latency/accuracyOptimized Isolation Forest for real-time systems

Appendix C. Anomaly Detection Mathematics

Appendix C.1. Isolation Forest Anomaly Score

The Isolation Forest computes an anomaly score based on the expected path length required to isolate a data point in an ensemble of isolation trees. The anomaly score is defined as:
S ( x , n ) = 2 E ( h ( x ) ) c ( n )
where E ( h ( x ) ) denotes the average path length of sample x over all trees, and c ( n ) is the average path length of an unsuccessful search in a binary search tree with n samples.

Appendix C.2. Feature Vector Definition

The anomaly detection model operates on a feature vector constructed from network function resource utilization metrics. The feature vector is defined as:
X ( t ) = f raw , μ w ( t ) , σ w ( t ) , max w ( t ) R 56
where f raw represents raw CPU and memory utilization features, and μ w ( t ) , σ w ( t ) , and max w ( t ) denote the mean, standard deviation, and maximum values computed over a sliding window w.

Appendix D. Operator Decision Framework: Balancing Security, Performance, and Cost Trade-offs

The 5G roaming environment is diverse: some operators focus on cost efficiency, others on ultra-low latency services, and still others rely on hosted or shared infrastructure. Because of this diversity, no single mitigation or detection strategy fits all cases. A structured framework can help operators reason about security, performance, and cost trade-offs when selecting controls.
Table A2. Decision matrix: roaming mitigation/detection strategies.
Table A2. Decision matrix: roaming mitigation/detection strategies.
StrategySecurity GainPerformance RiskCost Level
SEPP/Rate LimitingControls signaling floodsLatency; possible false dropsModerate
Dynamic NF ScalingPreserves availabilityScaling lag; overheadHigh
Slice IsolationLimits cross-slice impactComplexity; misconfig riskModerate-High
Anomaly DetectionDetects stealthy attacksTraining effort; false positivesModerate
Hosted/Shared SEPPReduces in-house opsSLA dependenceVariable
  • Decision steps (suggested)
Operators may consider the following when determining which mix of controls is most suitable:
  • Survey current and emerging roaming threats (signaling load, replay, fraud).
  • Define service requirements: latency, availability, acceptable error rates.
  • Assess infrastructural readiness: what functions (SEPP, scaling, detection) are already deployed.
  • Estimate capital and operational costs for each option.
  • Compare strategies using a decision matrix (e.g., Table A2).
  • Pilot selected measures under realistic roaming traffic and refine policies.
  • Illustrative scenarios
Small variations in operator context can shift the balance of decisions:
  • Regional operator with limited budget: adopt SEPP rate limiting and lightweight anomaly detection, scale only during peak seasons.
  • Tier-1 operator supporting critical URLLC services: invest in dynamic NF scaling and slice isolation to guarantee low latency and reliability.
  • Operator using hosted roaming services: rely on shared or outsourced SEPP to reduce overhead, but negotiate strict SLAs to mitigate dependency risks.
The choice of roaming security measures should remain flexible and adaptive. Rather than a single “best” solution, operators can combine controls in layers, adjusting investment levels as threat exposure, service demands, and partnership models evolve.

References

  1. International Telecommunication Union Radiocommunication Sector (ITU-R). Framework and Overall Objectives of the Future Development of IMT for 2030 and Beyond (IMT-2030). Recommendation M.2160-0, ITU-R, 2023. Available online: https://www.itu.int/rec/R-REC-M.2160-0-202311-I/en (accessed on 17 September 2025).
  2. 3rd Generation Partnership Project (3GPP). Release 20 Overview. Highlights 6G Roadmap with Release 20 (Study Phase) and Release 21 (Normative Work). 2025. Available online: https://www.3gpp.org/specifications-technologies/releases/release-20 (accessed on 17 September 2025).
  3. 3rd Generation Partnership Project (3GPP). The SA1 Road to 6G. Outlines Study Approach for 6G and Transition from Release 20 to Release 21. 2025. Available online: https://www.3gpp.org/news-events/3gpp-news/sa1-6g-road (accessed on 17 September 2025).
  4. Chlosta, M.; Rupprecht, D.; Pöpper, C.; Holz, T. 5G SUCI-Catchers: Still catching them all? In Proceedings of the 16th ACM Symposium on Security and Privacy in Wireless and Mobile Networks (WiSec ’21), New York, NY, USA, 28 June–1 July 2021. [Google Scholar] [CrossRef]
  5. Barraud, L.; Caccavale, F.; Peyrat, J.B.; Malouli, W.; Capdevielle, V.; Khalife, H.; Cavalli, A.R. 5G SUCI Catcher: Attack and Detection. In Proceedings of the 2023 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Naples, Italy, 4–6 December 2023; pp. 285–290. [Google Scholar] [CrossRef]
  6. Chiejina, A.; Kim, B.; Chowdhury, K.; Shah, V.K. System-level Analysis of Adversarial Attacks and Defenses on Intelligence in O-RAN based Cellular Networks. arXiv 2024, arXiv:2402.06846. [Google Scholar]
  7. Preuß Mattsson, J.; Nakarmi, P.K. Nori: Concealing the Concealed Identifier in 5G. In Proceedings of the 16th International Conference on Availability, Reliability and Security, New York, NY, USA, 17–20 August 2021. ARES ’21. [Google Scholar] [CrossRef]
  8. Lange, S.; Gringoli, F.; Hollick, M.; Classen, J. Wherever I May Roam: Stealthy Interception and Injection Attacks Through Roaming Agreements. In European Symposium on Research in Computer Security–ESORICS 2024; Garcia-Alfaro, J., Kozik, R., Choraś, M., Katsikas, S., Eds.; Springer Nature: Cham, Switzerland, 2024; pp. 208–228. [Google Scholar]
  9. Chang, C.H.; Chang, R.L.; Chen, H.Y.; Lin, T.N. 6G Security: The Vulnerability of Roaming Technology via DoS Exploit of Signaling Control Plane. In Proceedings of the 2024 IEEE International Conference on Communications Workshops (ICC Workshops), Denver, CO, USA, 9–13 June 2024; pp. 1413–1418. [Google Scholar] [CrossRef]
  10. Wehbe, N.; Alameddine, H.A.; Pourzandi, M.; Bou-Harb, E.; Assi, C. A Security Assessment of HTTP/2 Usage in 5G Service-Based Architecture. IEEE Commun. Mag. 2023, 61, 48–54. [Google Scholar] [CrossRef]
  11. Fezeu, R.A.K.; Fiandrino, C.; Ramadan, E.; Carpenter, J.; Chen, D.; Tan, Y.; Qian, F.; Widmer, J.; Zhang, Z.L. Roaming across the European Union in the 5G Era: Performance, Challenges, and Opportunities. In Proceedings of the IEEE Infocom 2024-IEEE Conference on Computer Communications, Vancouver, BC, Canada, 20–23 May 2024; pp. 2378–2387. [Google Scholar] [CrossRef]
  12. Keller, R.; Castellanos, D.; Sander, A.; Robison, A.; Abtin, A. Roaming in the 5G System: The 5GS Roaming Architecture. Ericsson Technol. Rev. 2021, 2021, 2–11. [Google Scholar] [CrossRef]
  13. Corici, M.; Chakraborty, P.; Magedanz, T.; Gomes, A.S.; Cordeiro, L.; Mahmood, K. 5G Non-Public-Networks (NPN) Roaming Architecture. In Proceedings of the 2021 12th International Conference on Network of the Future (NoF), Coimbra, Portugal, 6–8 October 2021; pp. 1–5. [Google Scholar] [CrossRef]
  14. 3rd Generation Partnership Project (3GPP). System Architecture for the 5G System (5GS). Version 18.11.0, Release 18, September 2025. Available online: https://www.3gpp.org/dynareport/23501.htm (accessed on 23 October 2025).
  15. GSMA. 5GS Roaming Guidelines, Version 11.0. Permanent Reference Document: Ng.113, GSMA, 2024. Available online: https://www.gsma.com/newsroom/wp-content/uploads//NG.113.v.11.0.pdf (accessed on 17 September 2025).
  16. Ahmad, I.; Suomalainen, J.; Huusko, J. 5G-Core Network Security. In The Wiley 5G REF: Security; John Wiley & Sons: Hoboken, NJ, USA, 2021. [Google Scholar]
  17. Parkin, J.; Tripunitara, M. Countering Subscription Concealed Identifier (SUCI)-Catchers in Cellular Communications. In International Conference on Information Systems Security and Privacy (ICISSP 2024); Springer: Berlin/Heidelberg, Germany, 2024. [Google Scholar]
  18. 3GPP TR 33.926: Security Assurance Specification (SCAS)—Threat: Compromised/Misbehaving User Equipments. Technical Report, 3GPP, 2022. Section 5.3.7.1 “Compromised/Misbehaving User Equipments”: “A Large Number of Compromised or Misbehaving User Equipments (UE) Can Cause a Fault on the GNP with a Consequent Denial of Service.”. Available online: https://www.3gpp.org/dynareport/33926.htm (accessed on 17 September 2025).
  19. Patel, S.K.; Verma, S.B.; Gupta, B.K.; Singh, S.; Naresh, E.; Pareek, P.K. Advances in authentication and security protocols for 5G networks: A comprehensive survey. Discov. Appl. Sci. 2025, 7, 743. [Google Scholar] [CrossRef]
  20. Heijligenberg, T.; Knips, G.; Böhm, C.; Rupprecht, D.; Kohls, K. BigMac: Performance Overhead of User Plane Integrity Protection in 5G Networks. In Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, New York, NY, USA, 29 May–1 June 2023; WiSec ’23. pp. 145–150. [Google Scholar] [CrossRef]
  21. Køien, G.M. On Threats to the 5G Service Based Architecture. Wirel. Pers. Commun. 2021, 119, 97–116. [Google Scholar] [CrossRef]
  22. Scalise, P.; Boeding, M.; Hempel, M.; Sharif, H.; Delloiacovo, J.; Reed, J. A Systematic Survey on 5G and 6G Security Considerations, Challenges, Trends, and Research Areas. Future Internet 2024, 16, 67. [Google Scholar] [CrossRef]
  23. Aldas, S.; Babakian, A. Cloud-Native Service Mesh Readiness for 5G and Beyond. IEEE Access 2023, 11, 116789–116799. [Google Scholar] [CrossRef]
  24. Dolente, F.; Garroppo, R.G.; Pagano, M. A vulnerability assessment of open-source implementations of fifth-generation core network functions. Future Internet 2023, 16, 1. [Google Scholar] [CrossRef]
  25. Sattar, D.; Matrawy, A. Towards secure slicing: Using slice isolation to mitigate DDoS attacks on 5G core network slices. In Proceedings of the 2019 IEEE Conference on Communications and Network Security (CNS), Washington, DC, USA, 10–12 June 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 82–90. [Google Scholar]
  26. Sharma, S.K.; Wang, X. Toward massive machine type communications in ultra-dense cellular IoT networks: Current issues and machine learning-assisted solutions. IEEE Commun. Surv. Tutorials 2019, 22, 426–471. [Google Scholar] [CrossRef]
  27. Othman, W.M.; Ateya, A.A.; Nasr, M.E.; Muthanna, A.; ElAffendi, M.; Koucheryavy, A.; Hamdi, A.A. Key enabling technologies for 6G: The role of UAVs, terahertz communication, and intelligent reconfigurable surfaces in shaping the future of wireless networks. J. Sens. Actuator Netw. 2025, 14, 30. [Google Scholar] [CrossRef]
  28. Hoang, V.T.; Ergu, Y.A.; Nguyen, V.L.; Chang, R.G. Security risks and countermeasures of adversarial attacks on AI-driven applications in 6G networks: A survey. J. Netw. Comput. Appl. 2024, 232, 104031. [Google Scholar] [CrossRef]
  29. Ahmed, S.; Anisi, M.H. A Post-Quantum Secure Federated Learning Framework for Cross-Domain V2G Authentication. IEEE Trans. Consum. Electron. 2025, 71, 8433–8440. [Google Scholar] [CrossRef]
  30. 3rd Generation Partnership Project (3GPP). 5G; Security Architecture and Procedures for 5G System. Version 18.10.0, Release 18, July 2025. 2025. Available online: https://www.3gpp.org/dynareport/33501.htm (accessed on 17 September 2025).
  31. Oracle Communications. Oracle Communications Security Edge Protection Proxy (SEPP) for 5G: Mitigating Signaling Floods via Rate Limiting. Data Sheet, Oracle, 2024. Describes Ingress and Egress Rate Limiting to Protect Against Signaling Storms in 5G Roaming Scenarios. Available online: https://www.oracle.com/a/ocom/docs/industries/communications/comm-security-edge-protection-proxy-ds.pdf (accessed on 17 September 2025).
  32. Gao, S.; Quan, S.; Wu, J. Cloud-Native Plinth: A Platform to Support Containerized 5G Core Networks. In Proceedings of the 2024 IEEE 21st International Conference on Mobile Ad-Hoc and Smart Systems (MASS), Seoul, Republic of Korea, 23–25 September 2024; pp. 508–513. [Google Scholar] [CrossRef]
  33. Koksal, S.; Catak, F.O.; Dalveren, Y. Flexible and Lightweight Mitigation Framework for Distributed Denial-of-Service Attacks in Container-Based Edge Networks Using Kubernetes. IEEE Access 2024, 12, 172980–172991. [Google Scholar] [CrossRef]
  34. Chow, M.C.; Ma, M. A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks. Sensors 2022, 22, 4525. [Google Scholar] [CrossRef]
  35. Enhancing Real-Time Data Quality Using Continuous Z-Score-Based Error Detection, Vol. OMC Med Energy Conference and Exhibition, Offshore Mediterranean Conference and Exhibition. 2025. Available online: https://onepetro.org/OMCONF/proceedings-pdf/OMC25/OMC25/OMC-2025-553/4840285/omc-2025-553.pdf (accessed on 17 September 2025).
  36. Zhang, K.; Hutter, M.; Jin, H. A New Local Distance-Based Outlier Detection Approach for Scattered Real-World Data. In Advances in Knowledge Discovery and Data Mining; Theeramunkong, T., Kijsirikul, B., Cercone, N., Ho, T.B., Eds.; Springer: Berlin/Heidelberg, Germany, 2009; pp. 813–822. [Google Scholar]
  37. Liu, F.T.; Ting, K.M.; Zhou, Z.H. Isolation-Based Anomaly Detection. ACM Trans. Knowl. Discov. Data 2012, 6, 1–39. [Google Scholar] [CrossRef]
  38. Shon, T.; Moon, J. A hybrid machine learning approach to network anomaly detection. Inf. Sci. 2007, 177, 3799–3821. [Google Scholar] [CrossRef]
  39. Hariri, S.; Carrasco Kind, M.; Brunner, R.J. Extended isolation forest. IEEE Trans. Knowl. Data Eng. 2019, 33, 1479–1489. [Google Scholar] [CrossRef]
  40. Xu, H.; Pang, G.; Wang, Y.; Wang, Y. Deep isolation forest for anomaly detection. IEEE Trans. Knowl. Data Eng. 2023, 35, 12591–12604. [Google Scholar] [CrossRef]
  41. Yang, J.; Yang, X.; Zhang, Z. A High-dimensional Anomaly Detection Algorithm Based on IForest with Autoencoder. In Proceedings of the 2022 4th International Conference on Data-driven Optimization of Complex Systems (DOCS), Chengdu, China, 28–30 October 2022; pp. 1–5. [Google Scholar] [CrossRef]
  42. 3rd Generation Partnership Project (3GPP). 5G; 5G System; Public Land Mobile Network (PLMN) Interconnection; Stage 3. Version 18.10.0, Release 18, March 2025. Available online: https://www.3gpp.org/dynareport/29573.htm (accessed on 17 September 2025).
  43. GSMA. 5G Security Guide, Version 3.0. Permanent Reference Document: Fs.40, GSMA, 2024. Available online: https://www.gsma.com/solutions-and-impact/technologies/security/gsma_resources/5g-security-guide-version-3-0/ (accessed on 17 September 2025).
  44. Miguel-Diez, A.; Campazas-Vega, A.; Álvarez-Aparicio, C.; Matellán-Olivera, V. Anomaly Detection in Network Flows Using Unsupervised Online Machine Learning. arXiv 2025, arXiv:2509.01375. [Google Scholar] [CrossRef]
  45. Sarhan, M.; Layeghy, S.; Moustafa, N.; Portmann, M. NetFlow Datasets for Machine Learning-based Network Intrusion Detection Systems. arXiv 2020, arXiv:2011.09144. [Google Scholar]
  46. Fuhnwi, G.S.; Adedoyin, V.; Agbaje, J.O. An Empirical Internet Protocol Network Intrusion Detection using Isolation Forest and One-Class Support Vector Machines. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 2023, 14, 1–6. [Google Scholar] [CrossRef]
  47. Hindy, H.; Atkinson, R.; Tachtatzis, C.; Colin, J.N.; Bayne, E.; Bellekens, X. Utilising Deep Learning Techniques for Effective Zero-Day Attack Detection. Electronics 2020, 9, 1684. [Google Scholar] [CrossRef]
  48. Rydsund, V. NIDS. Master’s Thesis, Malmö Universitet, Malmö, Sweden, 2024. [Google Scholar]
  49. Elsaid, S.A.; Binbusayyis, A. An optimized isolation forest based intrusion detection system for heterogeneous and streaming data in the industrial Internet of Things (IIoT) networks. Discov. Appl. Sci. 2024, 6, 483. [Google Scholar] [CrossRef]
Figure 1. Usage scenarios of IMT-2030.
Figure 1. Usage scenarios of IMT-2030.
Applsci 16 00508 g001
Figure 2. Fifth generation roaming flow.
Figure 2. Fifth generation roaming flow.
Applsci 16 00508 g002
Figure 3. Attack Scenario 1: random SUCI registration request—overview.
Figure 3. Attack Scenario 1: random SUCI registration request—overview.
Applsci 16 00508 g003
Figure 4. Attack Scenario 2: SUCI replay attack—overview. Note: RES* and HRES* are standard 3GPP terms.
Figure 4. Attack Scenario 2: SUCI replay attack—overview. Note: RES* and HRES* are standard 3GPP terms.
Applsci 16 00508 g004
Figure 5. Error count by burst workload (roaming vs. non-roaming).
Figure 5. Error count by burst workload (roaming vs. non-roaming).
Applsci 16 00508 g005
Figure 6. Error count by RPS workload (roaming vs. non-roaming).
Figure 6. Error count by RPS workload (roaming vs. non-roaming).
Applsci 16 00508 g006
Figure 7. Burst workload (1000–4000 UEs): CPU usage comparison between roaming and non-roaming baseline (averaged over three runs).
Figure 7. Burst workload (1000–4000 UEs): CPU usage comparison between roaming and non-roaming baseline (averaged over three runs).
Applsci 16 00508 g007
Figure 8. Burst workload (1000–4000 UEs): estimated roaming cost based on incremental CPU overhead relative to the non-roaming baseline.
Figure 8. Burst workload (1000–4000 UEs): estimated roaming cost based on incremental CPU overhead relative to the non-roaming baseline.
Applsci 16 00508 g008
Figure 9. RPS workload (25–400 RPS): CPU usage comparison between roaming and non-roaming baseline (10,000 registrations per setting).
Figure 9. RPS workload (25–400 RPS): CPU usage comparison between roaming and non-roaming baseline (10,000 registrations per setting).
Applsci 16 00508 g009
Figure 10. RPS workload (25–400 RPS): estimated roaming cost based on incremental CPU overhead relative to the non-roaming baseline.
Figure 10. RPS workload (25–400 RPS): estimated roaming cost based on incremental CPU overhead relative to the non-roaming baseline.
Applsci 16 00508 g010
Figure 11. Resource utilization of home and visited network functions under RPS 100 DoS attack.
Figure 11. Resource utilization of home and visited network functions under RPS 100 DoS attack.
Applsci 16 00508 g011
Figure 12. Oracle SEPP rate limiter.
Figure 12. Oracle SEPP rate limiter.
Applsci 16 00508 g012
Figure 13. HTTP flood workload: receive throughput time series for no rate limit (Apache Bench) and rate-limited cases (Apache Bench and WRK) at the SEPP N32-f interface.
Figure 13. HTTP flood workload: receive throughput time series for no rate limit (Apache Bench) and rate-limited cases (Apache Bench and WRK) at the SEPP N32-f interface.
Applsci 16 00508 g013
Figure 14. HTTP flood workload: throughput distribution and summary statistics for no rate limit (Apache Bench) and rate-limited cases (Apache Bench and WRK).
Figure 14. HTTP flood workload: throughput distribution and summary statistics for no rate limit (Apache Bench) and rate-limited cases (Apache Bench and WRK).
Applsci 16 00508 g014
Figure 15. RPS workload (100 RPS): distribution of standardized resource features for normal operation samples and SUCI-based DoS attack samples.
Figure 15. RPS workload (100 RPS): distribution of standardized resource features for normal operation samples and SUCI-based DoS attack samples.
Applsci 16 00508 g015
Figure 16. RPS workload (100 RPS): dimensionality reduction visualization of Isolation Forest separation between normal operation and SUCI-based DoS attack samples.
Figure 16. RPS workload (100 RPS): dimensionality reduction visualization of Isolation Forest separation between normal operation and SUCI-based DoS attack samples.
Applsci 16 00508 g016
Table 1. Virtual machine configuration for experiments.
Table 1. Virtual machine configuration for experiments.
VMRoleIP (/24)vCPURAMOSSoftware
1UE/gNB10.10.1.0/24816 GiBUbuntu 24.04.1 LTSPacketRusher
2V-PLMN10.10.2.0/2448 GiBUbuntu 24.04.1 LTSOpen5GS 2.7.5
3H-PLMN10.10.3.0/24816 GiBUbuntu 24.04.1 LTSOpen5GS 2.7.5
Table 2. Memory usage comparison in burst mode.
Table 2. Memory usage comparison in burst mode.
UE CountNon-Roaming (MiB)Roaming (MiB)Roaming Cost (MiB)
100055.161.96.8
200056.870.413.6
300059.477.918.5
400062.584.021.5
Table 3. Memory usage comparison in RPS mode.
Table 3. Memory usage comparison in RPS mode.
RPSNon-Roaming (MiB)Roaming (MiB)Roaming Cost (MiB)
2537.261.824.6
5037.465.227.8
10038.168.130.0
20039.370.931.6
40041.172.831.7
Table 4. CPU utilization of core network functions under burst workload with 1000 and 4000 UEs (mean ± SD over ten runs). Note: Blue indicates decreased CPU utilization, orange indicates a moderate increase, and red indicates a significant increase.
Table 4. CPU utilization of core network functions under burst workload with 1000 and 4000 UEs (mean ± SD over ten runs). Note: Blue indicates decreased CPU utilization, orange indicates a moderate increase, and red indicates a significant increase.
UEsNFV-NormalV-AttackH-NormalH-Attack
1000AMF 27.55 ± 1.246.31 ± 0.23
SEPP 16.03 ± 0.811.88 ± 0.05 2.41 ± 0.0817.44 ± 0.86
SCP 30.77 ± 1.523.45 ± 0.07 4.02 ± 0.0923.88 ± 2.31
AUSF 2.61 ± 0.066.49 ± 0.21
UDM 2.57 ± 0.076.78 ± 0.23
4000AMF 36.42 ± 1.8218.67 ± 1.01
SEPP 22.68 ± 0.676.78 ± 0.18 8.58 ± 0.2226.19 ± 0.89
SCP 33.51 ± 1.779.85 ± 0.51 12.96 ± 0.7838.01 ± 2.06
AUSF 9.11 ± 0.6119.04 ± 0.58
UDM 9.32 ± 0.6430.78 ± 1.78
Table 5. CPU utilization of core network functions under RPS workload for 25 and 400 RPS (mean ± SD over ten runs). Note: Blue indicates decreased CPU utilization, orange indicates a moderate increase, and red indicates a significant increase.
Table 5. CPU utilization of core network functions under RPS workload for 25 and 400 RPS (mean ± SD over ten runs). Note: Blue indicates decreased CPU utilization, orange indicates a moderate increase, and red indicates a significant increase.
RPSNFV-NormalV-AttackH-NormalH-Attack
25AMF 8.55 ± 0.321.91 ± 0.09
SEPP 5.78 ± 0.270.46 ± 0.03 0.47 ± 0.025.21 ± 0.56
SCP 11.12 ± 1.211.02 ± 0.07 1.21 ± 0.068.96 ± 0.41
AUSF 0.52 ± 0.031.36 ± 0.07
UDM 0.51 ± 0.034.91 ± 0.51
400AMF 51.26 ± 2.9124.51 ± 1.86
SEPP 33.12 ± 1.895.69 ± 0.25 5.38 ± 0.3135.10 ± 1.67
SCP 64.68±3.7812.06 ± 0.96 15.56 ± 1.0256.24 ± 3.08
AUSF 6.24 ± 0.3311.12 ± 0.79
UDM 6.93 ± 0.3537.27 ± 1.92
Table 6. CPU utilization of core network functions under burst workload for 1000 and 4000 UEs (Attack1 vs. Attack2, mean ± SD over ten runs). Note: Orange indicates a moderate increase, and red indicates a significant increase.
Table 6. CPU utilization of core network functions under burst workload for 1000 and 4000 UEs (Attack1 vs. Attack2, mean ± SD over ten runs). Note: Orange indicates a moderate increase, and red indicates a significant increase.
UEsNFV-Attack1V-Attack2H-Attack1H-Attack2
1000AMF 6.25 ± 0.3228.11 ± 1.74
SEPP 1.88 ± 0.1113.51 ± 0.86 17.62 ± 0.9319.51 ± 1.21
SCP 3.49 ± 0.1825.82 ± 1.62 25.02 ± 1.5425.91 ± 1.68
AUSF 6.45 ± 0.3416.12 ± 0.98
UDM 6.72 ± 0.377.06 ± 0.42
4000AMF 18.61 ± 1.2162.11 ± 3.92
SEPP 7.12 ± 0.4626.45 ± 1.83 26.90 ± 1.6928.01 ± 1.74
SCP 9.87 ± 0.7139.10 ± 2.54 36.53 ± 2.3639.01 ± 2.41
AUSF 18.42 ± 1.0727.12 ± 1.86
UDM 30.73 ± 1.9131.05 ± 2.03
Table 7. CPU utilization of core network functions under RPS workload for 25 and 400 RPS (Attack1 vs. Attack2, mean ± SD over ten runs). Note: Orange indicates a moderate increase, and red indicates a significant increase.
Table 7. CPU utilization of core network functions under RPS workload for 25 and 400 RPS (Attack1 vs. Attack2, mean ± SD over ten runs). Note: Orange indicates a moderate increase, and red indicates a significant increase.
RPSNFV-Attack1V-Attack2H-Attack1H-Attack2
25AMF 1.90 ± 0.1110.15 ± 0.72
SEPP 0.43 ± 0.034.98 ± 0.36 5.36 ± 0.415.59 ± 0.43
SCP 0.92 ± 0.0610.46 ± 0.81 8.81 ± 0.639.04 ± 0.68
AUSF 1.32 ± 0.095.31 ± 0.38
UDM 4.71 ± 0.377.56 ± 0.52
400AMF 26.21 ± 1.7167.56 ± 4.56
SEPP 5.51 ± 0.4226.13 ± 1.89 36.05 ± 2.1135.78 ± 2.18
SCP 12.16 ± 0.8340.76 ± 2.97 56.16 ± 3.4156.82 ± 3.48
AUSF 11.02 ± 0.7236.84 ± 2.64
UDM 35.81 ± 2.3136.42 ± 2.35
Table 8. Technical components and technologies used in the rate limiter proof-of-concept.
Table 8. Technical components and technologies used in the rate limiter proof-of-concept.
ComponentTechnologyDescription
InfrastructureMicroK8sKubernetes cluster running on an Ubuntu VM
5G CoreOpen5GSRoaming scenario with VPLMN and HPLMN configuration
Rate LimiterNGINXReverse proxy protecting the N32-f interface (SEPP-to-SEPP communication channel)
Attack ToolsApache Bench, WRKApache Bench (ab) for HTTP flood attacks; WRK for high-performance load generation (used to overcome Apache Bench’s 50,000 request limitation)
Table 9. Isolation Forest performance metrics for 5G roaming attack detection.
Table 9. Isolation Forest performance metrics for 5G roaming attack detection.
MetricValue
Precision92.1%
Recall85.3%
F1 score88.6%
False positive rate7.3%
ROC-AUC0.962
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Won, T.; Kwon, H.; Ko, Y.; Lastre, J.K.; You, I. Towards 6G Roaming Security: Experimental Analysis of SUCI-Based DoS, Cost, and NF Stress. Appl. Sci. 2026, 16, 508. https://doi.org/10.3390/app16010508

AMA Style

Won T, Kwon H, Ko Y, Lastre JK, You I. Towards 6G Roaming Security: Experimental Analysis of SUCI-Based DoS, Cost, and NF Stress. Applied Sciences. 2026; 16(1):508. https://doi.org/10.3390/app16010508

Chicago/Turabian Style

Won, Taeho, Hoseok Kwon, Yongho Ko, Jhury Kevin Lastre, and Ilsun You. 2026. "Towards 6G Roaming Security: Experimental Analysis of SUCI-Based DoS, Cost, and NF Stress" Applied Sciences 16, no. 1: 508. https://doi.org/10.3390/app16010508

APA Style

Won, T., Kwon, H., Ko, Y., Lastre, J. K., & You, I. (2026). Towards 6G Roaming Security: Experimental Analysis of SUCI-Based DoS, Cost, and NF Stress. Applied Sciences, 16(1), 508. https://doi.org/10.3390/app16010508

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop