{"id":"https://openalex.org/W2927212155","doi":"https://doi.org/10.1109/tifs.2019.2908800","title":"vEPC-sec: Securing LTE Network Functions Virtualization on Public Cloud","display_name":"vEPC-sec: Securing LTE Network Functions Virtualization on Public Cloud","publication_year":2019,"publication_date":"2019-04-01","ids":{"openalex":"https://openalex.org/W2927212155","doi":"https://doi.org/10.1109/tifs.2019.2908800","mag":"2927212155"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2019.2908800","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2019.2908800","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081100099","display_name":"Muhammad Taqi Raza","orcid":"https://orcid.org/0000-0003-1245-1151"},"institutions":[{"id":"https://openalex.org/I161318765","display_name":"University of California, Los Angeles","ror":"https://ror.org/046rm7j60","country_code":"US","type":"education","lineage":["https://openalex.org/I161318765"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Muhammad Taqi Raza","raw_affiliation_strings":["Department of Computer Science, University of California at Los Angeles, Los Angeles, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of California at Los Angeles, Los Angeles, CA, USA","institution_ids":["https://openalex.org/I161318765"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020188879","display_name":"Songwu Lu","orcid":"https://orcid.org/0000-0003-3779-0918"},"institutions":[{"id":"https://openalex.org/I161318765","display_name":"University of California, Los Angeles","ror":"https://ror.org/046rm7j60","country_code":"US","type":"education","lineage":["https://openalex.org/I161318765"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Songwu Lu","raw_affiliation_strings":["Department of Computer Science, University of California at Los Angeles, Los Angeles, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of California at Los Angeles, Los Angeles, CA, USA","institution_ids":["https://openalex.org/I161318765"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059529956","display_name":"M\u00e1rio Gerla","orcid":null},"institutions":[{"id":"https://openalex.org/I161318765","display_name":"University of California, Los Angeles","ror":"https://ror.org/046rm7j60","country_code":"US","type":"education","lineage":["https://openalex.org/I161318765"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mario Gerla","raw_affiliation_strings":["Computer Science Department, University of California at Los Angeles, Los Angeles, CA, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, University of California at Los Angeles, Los Angeles, CA, USA","institution_ids":["https://openalex.org/I161318765"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5081100099"],"corresponding_institution_ids":["https://openalex.org/I161318765"],"apc_list":null,"apc_paid":null,"fwci":2.4757,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.89900137,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"14","issue":"12","first_page":"3287","last_page":"3297"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9851999878883362,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8511301279067993},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7007236480712891},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6971568465232849},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6124228239059448},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.49108099937438965},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.4823717176914215},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.44212600588798523},{"id":"https://openalex.org/keywords/core-network","display_name":"Core network","score":0.43711918592453003},{"id":"https://openalex.org/keywords/network-virtualization","display_name":"Network virtualization","score":0.42620614171028137},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.42083272337913513},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29267391562461853},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13859814405441284}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8511301279067993},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7007236480712891},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6971568465232849},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6124228239059448},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.49108099937438965},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.4823717176914215},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.44212600588798523},{"id":"https://openalex.org/C5038329","wikidata":"https://www.wikidata.org/wiki/Q1142907","display_name":"Core network","level":2,"score":0.43711918592453003},{"id":"https://openalex.org/C2779898492","wikidata":"https://www.wikidata.org/wiki/Q4112081","display_name":"Network virtualization","level":4,"score":0.42620614171028137},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.42083272337913513},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29267391562461853},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13859814405441284}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2019.2908800","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2019.2908800","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3579255590","display_name":null,"funder_award_id":"1423576","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7506495051","display_name":null,"funder_award_id":"1526985","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W1467126665","https://openalex.org/W1486426806","https://openalex.org/W1587130936","https://openalex.org/W1983341549","https://openalex.org/W2010579408","https://openalex.org/W2030438500","https://openalex.org/W2031427758","https://openalex.org/W2035091681","https://openalex.org/W2037912195","https://openalex.org/W2061036215","https://openalex.org/W2070670160","https://openalex.org/W2129636357","https://openalex.org/W2150464992","https://openalex.org/W2159342279","https://openalex.org/W2163404313","https://openalex.org/W2197093989","https://openalex.org/W2200264815","https://openalex.org/W2260783129","https://openalex.org/W2286049567","https://openalex.org/W2312902414","https://openalex.org/W2505209768","https://openalex.org/W2507380230","https://openalex.org/W2532356980","https://openalex.org/W2744954493","https://openalex.org/W2768479872","https://openalex.org/W2789205184","https://openalex.org/W2792548049","https://openalex.org/W2792636363","https://openalex.org/W2794045175","https://openalex.org/W2798162299","https://openalex.org/W2799154389","https://openalex.org/W2963061006","https://openalex.org/W2966910544","https://openalex.org/W3102783107","https://openalex.org/W4230379769","https://openalex.org/W4236617610","https://openalex.org/W4238493245","https://openalex.org/W6628656099","https://openalex.org/W6628906117","https://openalex.org/W6641026274","https://openalex.org/W6687973968","https://openalex.org/W6748053867","https://openalex.org/W6750401696","https://openalex.org/W6751063601"],"related_works":["https://openalex.org/W2461440407","https://openalex.org/W2317094215","https://openalex.org/W2947277503","https://openalex.org/W112648010","https://openalex.org/W2038957884","https://openalex.org/W206565998","https://openalex.org/W2122873612","https://openalex.org/W2802062002","https://openalex.org/W4249955145","https://openalex.org/W1661390099"],"abstract_inverted_index":{"Public":[0],"cloud":[1],"offers":[2],"economy":[3],"of":[4,17,51],"scale":[5],"to":[6,30,75,113,133],"adapt":[7],"workload":[8],"changes":[9],"in":[10,101],"an":[11],"autonomic":[12],"manner,":[13],"maximizing":[14],"the":[15,31,56,102,119,134,159],"use":[16],"resources.":[18],"Through":[19],"network":[20,24,40,124],"function":[21],"virtualization":[22],"(NFV),":[23],"operators":[25],"can":[26],"move":[27],"LTE":[28,39,52,67,83,97,153,160],"core":[29],"cloud;":[32],"hence":[33],"removing":[34],"their":[35],"dependency":[36],"on":[37],"carrier-grade":[38],"functions.":[41,125],"Recent":[42],"research":[43],"efforts":[44],"discuss":[45],"performance,":[46],"latency,":[47],"and":[48,85,109,130,141],"fault":[49],"tolerance":[50],"NFV,":[53],"largely":[54],"ignoring":[55],"security":[57],"aspects.":[58],"In":[59],"this":[60],"paper,":[61],"we":[62,91],"discover":[63],"new":[64],"vulnerabilities":[65,79,149],"that":[66,94,152],"NFV":[68],"face":[69],"today":[70],"with":[71],"no":[72],"standard":[73],"solutions":[74],"address":[76,89],"them.":[77],"These":[78],"span":[80],"at":[81],"both":[82],"control":[84],"user":[86],"planes.":[87],"To":[88],"them,":[90],"propose":[92],"vEPC-sec":[93,145],"cryptographically":[95],"secures":[96],"control-plane":[98],"signaling":[99],"messages":[100,135],"cloud.":[103],"It":[104],"provides":[105,128],"distributed":[106],"key":[107,110],"management":[108],"derivation":[111],"schemes":[112],"derive":[114],"shared-symmetric":[115],"keys":[116],"for":[117],"securing":[118],"communication":[120],"between":[121],"any":[122],"two":[123],"Our":[126],"approach":[127],"encryption":[129],"integrity":[131],"protection":[132],"even":[136],"during":[137],"virtual":[138],"machines":[139],"scalability":[140],"failure":[142],"recovery":[143],"scenarios.":[144],"also":[146],"prevents":[147],"user-plane":[148],"by":[150],"ensuring":[151],"routing":[154],"modules":[155],"should":[156],"faithfully":[157],"forward":[158],"subscriber":[161],"packets.":[162]},"counts_by_year":[{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
