Tolga O. Atalay (A2 Labs LLC), Tianyuan Yu (UCLA), Lixia Zhang (UCLA), Angelos Stavrou (A2 Labs LLC)

Cellular core networks are deployed as a set of Virtual Network Functions (VNFs) to dynamically provide customized connectivity for specific use cases. These VNFs are software-based applications whose trust management and security rely on well-established network domain solutions and certificate-based trust mechanisms. As VNFs are frequently redeployed, migrated, and scaled across a diverse ecosystem, the reliance on static trust solutions introduces bottlenecks and operational complexities. This approach to trust undermines the ability to ensure seamless, secure, and efficient interactions in a rapidly evolving cellular ecosystem. Addressing these challenges necessitates a fundamental shift toward an architectural foundation that inherently embeds security and trust into the communication fabric. Named Data Networking (NDN) offers such a foundation by focusing on data-centric security, where trust is embedded within the data itself rather than being dependent on external entities or channels. Leveraging named entities, NDN makes it possible to construct fine-grained trust relationships across cellular domains, tenants, and network slices. This paradigm shift enables the cellular core to move beyond static security solutions, providing a cohesive and scalable framework for managing trust in next-generation cellular networks. In this paper, we propose the adoption of the NDN network model to address the limitations of traditional approaches and achieve seamless security that evolves with the dynamic demands of 5G and beyond networks.

View More Papers

Starshields for iOS: Navigating the Security Cosmos in Satellite...

Jiska Classen (Hasso Plattner Institute, University of Potsdam), Alexander Heinrich (TU Darmstadt, Germany), Fabian Portner (TU Darmstadt, Germany), Felix Rohrbach (TU Darmstadt, Germany), Matthias Hollick (TU Darmstadt, Germany)

Read More

DUMPLING: Fine-grained Differential JavaScript Engine Fuzzing

Liam Wachter (EPFL), Julian Gremminger (EPFL), Christian Wressnegger (Karlsruhe Institute of Technology (KIT)), Mathias Payer (EPFL), Flavio Toffalini (EPFL)

Read More

Cross-Origin Web Attacks via HTTP/2 Server Push and Signed...

Pinji Chen (Tsinghua University), Jianjun Chen (Tsinghua University & Zhongguancun Laboratory), Mingming Zhang (Zhongguancun Laboratory), Qi Wang (Tsinghua University), Yiming Zhang (Tsinghua University), Mingwei Xu (Tsinghua University), Haixin Duan (Tsinghua University)

Read More

SNITCH: Leveraging IP Geolocation for Active VPN Detection

Tomer Schwartz (Data and Security Laboratory Fujitsu Research of Europe Ltd), Ofir Manor (Data and Security Laboratory Fujitsu Research of Europe Ltd), Andikan Otung (Data and Security Laboratory Fujitsu Research of Europe Ltd)

Read More