{"id":"https://openalex.org/W7126086728","doi":"https://doi.org/10.1109/nfv-sdn66355.2025.11349361","title":"Leveraging DPUs for Beyond 5G Protocol Security","display_name":"Leveraging DPUs for Beyond 5G Protocol Security","publication_year":2025,"publication_date":"2025-11-10","ids":{"openalex":"https://openalex.org/W7126086728","doi":"https://doi.org/10.1109/nfv-sdn66355.2025.11349361"},"language":null,"primary_location":{"id":"doi:10.1109/nfv-sdn66355.2025.11349361","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nfv-sdn66355.2025.11349361","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Conference on Network Function Virtualization and Software-Defined Networking (NFV-SDN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Ayushman Singh","orcid":null},"institutions":[{"id":"https://openalex.org/I27674431","display_name":"Indian Institute of Technology Gandhinagar","ror":"https://ror.org/0036p5w23","country_code":"IN","type":"education","lineage":["https://openalex.org/I27674431"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Ayushman Singh","raw_affiliation_strings":["Indian Institute of Technology,Gandhinagar,India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology,Gandhinagar,India","institution_ids":["https://openalex.org/I27674431"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081037214","display_name":"Sameer G. Kulkarni","orcid":"https://orcid.org/0000-0003-4727-6875"},"institutions":[{"id":"https://openalex.org/I27674431","display_name":"Indian Institute of Technology Gandhinagar","ror":"https://ror.org/0036p5w23","country_code":"IN","type":"education","lineage":["https://openalex.org/I27674431"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sameer G. Kulkarni","raw_affiliation_strings":["Indian Institute of Technology,Gandhinagar,India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology,Gandhinagar,India","institution_ids":["https://openalex.org/I27674431"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I27674431"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.8344228,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"239","last_page":"242"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.42320001125335693,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.42320001125335693,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.16089999675750732,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.05959999933838844,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6913999915122986},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6144000291824341},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.573199987411499},{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.5361999869346619},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.48100000619888306},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.44200000166893005},{"id":"https://openalex.org/keywords/communications-protocol","display_name":"Communications protocol","score":0.3926999866962433},{"id":"https://openalex.org/keywords/observability","display_name":"Observability","score":0.3357999920845032}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.816100001335144},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6913999915122986},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6144000291824341},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.573199987411499},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.5361999869346619},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.48100000619888306},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.44200000166893005},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.436599999666214},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.3926999866962433},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3391999900341034},{"id":"https://openalex.org/C36299963","wikidata":"https://www.wikidata.org/wiki/Q1369844","display_name":"Observability","level":2,"score":0.3357999920845032},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.31949999928474426},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.3179999887943268},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.31610000133514404},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.30379998683929443},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.30300000309944153},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.29809999465942383},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.287200003862381},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2816999852657318},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2782999873161316},{"id":"https://openalex.org/C41878487","wikidata":"https://www.wikidata.org/wiki/Q191018","display_name":"Session Initiation Protocol","level":3,"score":0.2687999904155731},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.266400009393692}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/nfv-sdn66355.2025.11349361","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nfv-sdn66355.2025.11349361","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Conference on Network Function Virtualization and Software-Defined Networking (NFV-SDN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W4220945180","https://openalex.org/W4294672401","https://openalex.org/W4386533823","https://openalex.org/W4389981618","https://openalex.org/W4392745102","https://openalex.org/W4404479770","https://openalex.org/W4411337761"],"related_works":[],"abstract_inverted_index":{"Cloud-native":[0],"5G":[1,119,172],"architectures":[2],"enhance":[3],"scalability":[4],"and":[5,11,22,34,65,86,96,121,131,142,156,169],"flexibility":[6],"to":[7,38,61,152,162],"enable":[8],"more":[9],"dynamic":[10],"efficient":[12],"communication":[13],"networks.":[14],"However,":[15],"they":[16],"also":[17],"introduce":[18],"greater":[19],"protocol":[20,58],"complexity":[21],"expand":[23],"the":[24,56,75],"potential":[25],"attack":[26],"surface.":[27],"Protocols":[28],"such":[29],"as":[30],"PFCP,":[31],"GTP-U,":[32],"NGAP,":[33],"F1AP":[35],"are":[36],"prone":[37],"attacks":[39,50],"like":[40],"session":[41],"hijacking,":[42],"malformed":[43],"signaling,":[44],"tunnel":[45],"spoofing,":[46],"etc..":[47],"Detecting":[48],"these":[49],"is":[51],"becoming":[52],"increasingly":[53],"difficult":[54],"with":[55,104,149],"CPU-based":[57],"analyzers":[59],"due":[60],"their":[62],"limited":[63],"observability":[64],"high":[66],"processing":[67],"overheads.":[68],"Hence,":[69],"in":[70],"this":[71],"work":[72,109],"we":[73],"investigate":[74],"use":[76],"of":[77],"Data":[78],"Processing":[79],"Units":[80],"(DPUs)":[81],"for":[82,118,167],"inline,":[83],"protocol-aware":[84],"inspection":[85],"anomaly":[87],"detection":[88],"at":[89],"line":[90],"rate.":[91],"By":[92],"integrating":[93],"programmable":[94],"parsers":[95],"telemetry-driven":[97],"detection,":[98],"DPUs":[99],"can":[100],"enforce":[101],"security":[102,129],"policies":[103],"minimal":[105],"performance":[106],"degradation.":[107],"The":[108,159],"focuses":[110],"on":[111],"(i)":[112],"defining":[113],"a":[114,126,134,164],"protocol-layer":[115],"threat":[116],"model":[117],"Core":[120],"RAN":[122],"interfaces,":[123],"(ii)":[124],"designing":[125],"host-attached":[127],"DPU":[128],"architecture,":[130],"(iii)":[132],"developing":[133],"reproducible":[135],"evaluation":[136],"methodology":[137],"using":[138],"open-source":[139],"testbeds":[140],"(Free5GC/Open5GS":[141],"OAI/srsRAN).":[143],"Ongoing":[144],"implementation":[145],"targets":[146],"NVIDIA":[147],"BlueField,":[148],"planned":[150],"experiments":[151],"analyze":[153],"security,":[154],"performance,":[155],"energy":[157],"trade-offs.":[158],"research":[160],"aims":[161],"establish":[163],"hardware-assisted":[165],"foundation":[166],"secure":[168],"scalable":[170],"Beyond":[171],"deployments.":[173]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2026-01-30T00:00:00"}
