Conclusion
TLS hop-by-hop vs PRINS

Conclusion
In the quest for secure 5G SA roaming, this whitepaper examined two primary methods: TLS hop-by-hop and PRINS.
TLS hop-by-hop emerged as the preferred method, resonating with the industry’s push for both security and simplicity. Its strength lies in its established protocol, well-understood by operators and service providers alike, and its adaptability in integrating value-added services which are pivotal in today’s roaming ecosystem.
The real-world application of TLS hop-by-hop by BICS, as demonstrated through the first live 5G SA roaming connection, solidifies its standing as a practical and efficient solution.
It is through these innovations that the trust model within the 5G roaming space is redefined, fostering a landscape where operators can manage relations and security credentials confidently and efficiently.
As the 5G landscape continues to evolve, it will be the responsibility of network architects, engineers, and stakeholders to remain agile and informed. The comparative insights provided here should help them make strategic decisions to drive the industry towards a more interconnected and secure future.

Unrivalled global connectivity with BICS
BICS is at the heart of the communications ecosystem, bridging telecommunications services and the needs of enterprises.