Tolga O. Atalay (A2 Labs LLC), Tianyuan Yu (UCLA), Lixia Zhang (UCLA), Angelos Stavrou (A2 Labs LLC)

Cellular core networks are deployed as a set of Virtual Network Functions (VNFs) to dynamically provide customized connectivity for specific use cases. These VNFs are software-based applications whose trust management and security rely on well-established network domain solutions and certificate-based trust mechanisms. As VNFs are frequently redeployed, migrated, and scaled across a diverse ecosystem, the reliance on static trust solutions introduces bottlenecks and operational complexities. This approach to trust undermines the ability to ensure seamless, secure, and efficient interactions in a rapidly evolving cellular ecosystem. Addressing these challenges necessitates a fundamental shift toward an architectural foundation that inherently embeds security and trust into the communication fabric. Named Data Networking (NDN) offers such a foundation by focusing on data-centric security, where trust is embedded within the data itself rather than being dependent on external entities or channels. Leveraging named entities, NDN makes it possible to construct fine-grained trust relationships across cellular domains, tenants, and network slices. This paradigm shift enables the cellular core to move beyond static security solutions, providing a cohesive and scalable framework for managing trust in next-generation cellular networks. In this paper, we propose the adoption of the NDN network model to address the limitations of traditional approaches and achieve seamless security that evolves with the dynamic demands of 5G and beyond networks.

View More Papers

How Different Tokenization Algorithms Impact LLMs and Transformer Models...

Ahmed Mostafa, Raisul Arefin Nahid, Samuel Mulder (Auburn University)

Read More

The Midas Touch: Triggering the Capability of LLMs for...

Yi Yang (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, China), Jinghua Liu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, China), Kai Chen (Institute of Information Engineering, Chinese Academy of…

Read More

Evaluating the Strength and Availability of Multilingual Passphrase Authentication

Chi-en Amy Tai (University of Waterloo), Urs Hengartner (University of Waterloo), Alexander Wong (University of Waterloo)

Read More

What Makes Phishing Simulation Campaigns (Un)Acceptable? A Vignette Experiment

Jasmin Schwab (German Aerospace Center (DLR)), Alexander Nussbaum (University of the Bundeswehr Munich), Anastasia Sergeeva (University of Luxembourg), Florian Alt (University of the Bundeswehr Munich and Ludwig Maximilian University of Munich), and Verena Distler (Aalto University)

Read More