Tolga O. Atalay (A2 Labs LLC), Tianyuan Yu (UCLA), Lixia Zhang (UCLA), Angelos Stavrou (A2 Labs LLC)

Cellular core networks are deployed as a set of Virtual Network Functions (VNFs) to dynamically provide customized connectivity for specific use cases. These VNFs are software-based applications whose trust management and security rely on well-established network domain solutions and certificate-based trust mechanisms. As VNFs are frequently redeployed, migrated, and scaled across a diverse ecosystem, the reliance on static trust solutions introduces bottlenecks and operational complexities. This approach to trust undermines the ability to ensure seamless, secure, and efficient interactions in a rapidly evolving cellular ecosystem. Addressing these challenges necessitates a fundamental shift toward an architectural foundation that inherently embeds security and trust into the communication fabric. Named Data Networking (NDN) offers such a foundation by focusing on data-centric security, where trust is embedded within the data itself rather than being dependent on external entities or channels. Leveraging named entities, NDN makes it possible to construct fine-grained trust relationships across cellular domains, tenants, and network slices. This paradigm shift enables the cellular core to move beyond static security solutions, providing a cohesive and scalable framework for managing trust in next-generation cellular networks. In this paper, we propose the adoption of the NDN network model to address the limitations of traditional approaches and achieve seamless security that evolves with the dynamic demands of 5G and beyond networks.

View More Papers

LeakLess: Selective Data Protection against Memory Leakage Attacks for...

Maryam Rostamipoor (Stony Brook University), Seyedhamed Ghavamnia (University of Connecticut), Michalis Polychronakis (Stony Brook University)

Read More

Revisiting Concept Drift in Windows Malware Detection: Adaptation to...

Adrian Shuai Li (Purdue University), Arun Iyengar (Intelligent Data Management and Analytics, LLC), Ashish Kundu (Cisco Research), Elisa Bertino (Purdue University)

Read More

Mysticeti: Reaching the Latency Limits with Uncertified DAGs

Kushal Babel (Cornell Tech & IC3), Andrey Chursin (Mysten Labs), George Danezis (Mysten Labs & University College London (UCL)), Anastasios Kichidis (Mysten Labs), Lefteris Kokoris-Kogias (Mysten Labs & IST Austria), Arun Koshy (Mysten Labs), Alberto Sonnino (Mysten Labs & University College London (UCL)), Mingwei Tian (Mysten Labs)

Read More

Security Signals: Making Web Security Posture Measurable at Scale

Michele Spagnuolo (Google), David Dworken (Google), Artur Janc (Google), Santiago Díaz (Google), Lukas Weichselbaum (Google)

Read More