{"id":"https://openalex.org/W7133313030","doi":"https://doi.org/10.1109/tps-isa67132.2025.00053","title":"TPM-Based Continuous Remote Attestation and Integrity Verification for 5G VNFs on Kubernetes","display_name":"TPM-Based Continuous Remote Attestation and Integrity Verification for 5G VNFs on Kubernetes","publication_year":2025,"publication_date":"2025-11-12","ids":{"openalex":"https://openalex.org/W7133313030","doi":"https://doi.org/10.1109/tps-isa67132.2025.00053"},"language":null,"primary_location":{"id":"doi:10.1109/tps-isa67132.2025.00053","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tps-isa67132.2025.00053","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 7th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124546475","display_name":"Al Nahian Bin Emran","orcid":null},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Al Nahian Bin Emran","raw_affiliation_strings":["George Mason University,Mason Innovation Labs,Arlington,VA,USA,22201"],"affiliations":[{"raw_affiliation_string":"George Mason University,Mason Innovation Labs,Arlington,VA,USA,22201","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119959786","display_name":"Rajendra Upadhyay","orcid":null},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rajendra Upadhyay","raw_affiliation_strings":["George Mason University,Mason Innovation Labs,Arlington,VA,USA,22201"],"affiliations":[{"raw_affiliation_string":"George Mason University,Mason Innovation Labs,Arlington,VA,USA,22201","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013451271","display_name":"Rajendra Paudyal","orcid":"https://orcid.org/0009-0002-4239-993X"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rajendra Paudyal","raw_affiliation_strings":["George Mason University,Mason Innovation Labs,Arlington,VA,USA,22201"],"affiliations":[{"raw_affiliation_string":"George Mason University,Mason Innovation Labs,Arlington,VA,USA,22201","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120506640","display_name":"Lisa Donnan","orcid":null},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lisa Donnan","raw_affiliation_strings":["George Mason University,Mason Innovation Labs,Arlington,VA,USA,22201"],"affiliations":[{"raw_affiliation_string":"George Mason University,Mason Innovation Labs,Arlington,VA,USA,22201","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071866219","display_name":"Duminda Wijesekera","orcid":"https://orcid.org/0000-0002-7122-3055"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Duminda Wijesekera","raw_affiliation_strings":["George Mason University,Mason Innovation Labs,Arlington,VA,USA,22201"],"affiliations":[{"raw_affiliation_string":"George Mason University,Mason Innovation Labs,Arlington,VA,USA,22201","institution_ids":["https://openalex.org/I162714631"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5124546475"],"corresponding_institution_ids":["https://openalex.org/I162714631"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.81918623,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"435","last_page":"444"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.40059998631477356,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.40059998631477356,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.26579999923706055,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.08489999920129776,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.4927999973297119},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.4542999863624573},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.435699999332428},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4156999886035919},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.3953999876976013},{"id":"https://openalex.org/keywords/failover","display_name":"Failover","score":0.39480000734329224},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.38519999384880066},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.37770000100135803}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7092999815940857},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.4927999973297119},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.4542999863624573},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.435699999332428},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4156999886035919},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39809998869895935},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.3953999876976013},{"id":"https://openalex.org/C109751979","wikidata":"https://www.wikidata.org/wiki/Q998767","display_name":"Failover","level":2,"score":0.39480000734329224},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.38519999384880066},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.37770000100135803},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.33820000290870667},{"id":"https://openalex.org/C202775310","wikidata":"https://www.wikidata.org/wiki/Q1140366","display_name":"Trusted Platform Module","level":2,"score":0.33239999413490295},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.3296999931335449},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.3176000118255615},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.3093000054359436},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.30079999566078186},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.299699991941452},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.29010000824928284},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.27090001106262207},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2685999870300293},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.2685000002384186},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.2619999945163727},{"id":"https://openalex.org/C12590798","wikidata":"https://www.wikidata.org/wiki/Q3933199","display_name":"Replication (statistics)","level":2,"score":0.2578999996185303},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2526000142097473},{"id":"https://openalex.org/C2777499013","wikidata":"https://www.wikidata.org/wiki/Q7663719","display_name":"System integrity","level":2,"score":0.25200000405311584},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.2517000138759613}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tps-isa67132.2025.00053","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tps-isa67132.2025.00053","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 7th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1543208993","https://openalex.org/W1922719749","https://openalex.org/W2099613071","https://openalex.org/W2157549033","https://openalex.org/W2559755452","https://openalex.org/W2969442765","https://openalex.org/W3042975022","https://openalex.org/W3167632022","https://openalex.org/W3217228995","https://openalex.org/W4376602827","https://openalex.org/W4387870373","https://openalex.org/W4393146115","https://openalex.org/W4393218154","https://openalex.org/W4401751550","https://openalex.org/W4411675357","https://openalex.org/W4412346149","https://openalex.org/W4416233931"],"related_works":[],"abstract_inverted_index":{"In":[0],"the":[1,8,14,32,73,109,153,172,231,262],"rapidly":[2],"evolving":[3],"landscape":[4],"of":[5,10,16,77,111,126,208,264,277],"5G":[6,17,28,81],"technology,":[7],"adoption":[9],"cloud-based":[11],"infrastructure":[12,271],"for":[13,140,255],"deployment":[15],"services":[18],"has":[19],"become":[20],"increasingly":[21],"common.":[22],"Using":[23],"a":[24,133,160,182,198],"servicebased":[25],"architecture,":[26],"critical":[27,270],"components,":[29],"such":[30],"as":[31,50,269],"Access":[33],"and":[34,43,62,75,94,119,159,224,244,258,274],"Mobility":[35],"Management":[36,40],"Function":[37,41,46],"(AMF),":[38],"Session":[39],"(SMF),":[42],"User":[44],"Plane":[45],"(UPF),":[47],"now":[48],"run":[49],"containerized":[51],"pods":[52],"on":[53,91,148,197],"Kubernetes":[54,205],"clusters.":[55],"Although":[56],"this":[57,117],"approach":[58,151],"improves":[59],"scalability,":[60],"flexibility,":[61],"resilience,":[63],"it":[64],"also":[65],"introduces":[66],"new":[67],"security":[68,82,93],"challenges,":[69],"particularly":[70],"to":[71,106,120,165,216,218],"ensure":[72],"integrity":[74,110,192],"trustworthiness":[76],"these":[78],"components.":[79],"Current":[80],"specifications":[83],"(for":[84],"example,":[85],"3GPP":[86],"TS":[87],"33.501":[88],"[1])":[89],"focus":[90],"communication":[92],"assume":[95],"that":[96,186,230],"network":[97],"functions":[98],"remain":[99],"trustworthy":[100],"after":[101],"authentication,":[102],"consequently":[103],"lacking":[104],"mechanisms":[105],"continuously":[107],"validate":[108],"NVFs":[112],"at":[113],"runtime.":[114],"To":[115],"close":[116],"gap,":[118],"align":[121],"with":[122,181],"Zero":[123],"Trust":[124],"principles":[125],"\u201cnever":[127],"trust,":[128],"always":[129],"verify\u201d,":[130],"we":[131],"present":[132],"TPM":[134],"2.0-based":[135],"continuous":[136,253],"remote":[137],"attestation":[138,254],"solution":[139],"core":[141,219],"<tex":[142,265,278],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[143,266,279],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$\\mathbf{5":[144,267,280],"G}$</tex>":[145,268],"components":[146],"deployed":[147],"Kubernetes.":[149],"Our":[150],"uses":[152],"Linux":[154],"Integrity":[155],"Measurement":[156],"Architecture":[157],"(IMA)":[158],"Trusted":[161],"Platform":[162],"Module":[163],"(TPM)":[164],"provide":[166],"hardware-based":[167,252],"runtime":[168],"validation.":[169],"We":[170],"integrate":[171],"open-source":[173],"Keylime":[174],"framework":[175],"(which":[176],"natively":[177],"provides":[178,251],"node-level":[179],"attestation)":[180],"custom":[183],"IMA":[184],"template":[185],"isolates":[187],"pod-level":[188],"measurements,":[189],"allowing":[190],"per-pod":[191],"verification":[193],"[2].":[194],"A":[195],"prototype":[196],"k3s":[199],"cluster":[200],"[3]":[201],"(a":[202],"lightweight":[203],"CNCF-certified":[204],"distribution":[206],"consisting":[207],"1":[209],"master,":[210],"2":[211],"worker":[212],"nodes)":[213],"was":[214],"implemented":[215],"attest":[217],"functions,":[220],"including":[221],"AMF,":[222],"SMF":[223],"UPF.":[225],"The":[226],"experimental":[227],"results":[228],"show":[229],"system":[232],"detects":[233],"unauthorized":[234],"modifications":[235],"in":[236,272],"real":[237],"time,":[238],"labels":[239],"each":[240],"pod's":[241],"trust":[242],"state,":[243],"generates":[245],"detailed":[246],"audit":[247],"logs.":[248],"This":[249],"work":[250],"cloud":[256],"native":[257],"edge":[259],"deployments,":[260],"strengthening":[261],"resilience":[263],"multi-vendor":[273],"missioncritical":[275],"scenarios":[276],"G}$</tex>.":[281]},"counts_by_year":[],"updated_date":"2026-03-05T07:30:30.508283","created_date":"2026-03-04T00:00:00"}
