{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T17:40:09Z","timestamp":1774719609549,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T00:00:00Z","timestamp":1749081600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T00:00:00Z","timestamp":1749081600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100010418","name":"Institute for Information and Communications Technology Promotion","doi-asserted-by":"publisher","award":["No.2022-00207416"],"award-info":[{"award-number":["No.2022-00207416"]}],"id":[{"id":"10.13039\/501100010418","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s10796-025-10614-1","type":"journal-article","created":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T07:47:04Z","timestamp":1749109624000},"page":"2279-2294","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["5G Native Network Function for False Base Station Detection Using Machine Learning Technique"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0441-270X","authenticated-orcid":false,"given":"Hoonyong","family":"Park","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9611-1036","authenticated-orcid":false,"given":"Philip V. B.","family":"Astillo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6586-2037","authenticated-orcid":false,"given":"Taeguen","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0604-3445","authenticated-orcid":false,"given":"Ilsun","family":"You","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,5]]},"reference":[{"key":"10614_CR1","doi-asserted-by":"publisher","unstructured":"Ali, A., & Fischer, G. (2019). Enabling fake base station detection through sample-based higher order noise statistics. In 2019 42nd International Conference on Telecommunications and Signal Processing (TSP) (pp. 695\u2013700). https:\/\/doi.org\/10.1109\/TSP.2019.8769046","DOI":"10.1109\/TSP.2019.8769046"},{"key":"10614_CR2","unstructured":"Altendorf, P. K. (2022). memory-profiler \u00b7 PyPI. Retrieved from PyPI \u00b7 The Python Package Index:. [Online; Accessed 04 Oct 2023]. https:\/\/pypi.org\/project\/memory-profiler\/"},{"issue":"1","key":"10614_CR3","doi-asserted-by":"publisher","first-page":"59","DOI":"10.13052\/jicts2245-800X.614","volume":"6","author":"B Bertenyi","year":"2018","unstructured":"Bertenyi, B., Burbidge, R., Masini, G., Sirotkin, S., & Gao, Y. (2018). Ng radio access network (ng-ran). Journal of ICT Standardization, 6(1), 59\u201376.","journal-title":"Journal of ICT Standardization"},{"key":"10614_CR4","doi-asserted-by":"crossref","unstructured":"Chen, T., & Guestrin, C. (2016). Xgboost: A scalable tree boosting system. In Proceedings of the 22nd Acm Sigkdd International Conference on Knowledge Discovery and Data Mining (pp. 785\u2013794).","DOI":"10.1145\/2939672.2939785"},{"key":"10614_CR5","doi-asserted-by":"crossref","unstructured":"Cutler, A., Cutler, D. R., & Stevens, J. R. (2012). Random forests. Ensemble machine learning: Methods and applications, 157\u2013175.","DOI":"10.1007\/978-1-4419-9326-7_5"},{"issue":"7","key":"10614_CR6","doi-asserted-by":"publisher","first-page":"149","DOI":"10.3390\/info9070149","volume":"9","author":"SS Dhaliwal","year":"2018","unstructured":"Dhaliwal, S. S., Nahid, A.-A., & Abbas, R. (2018). Effective intrusion detection system using xgboost. Information, 9(7), 149.","journal-title":"Information"},{"key":"10614_CR7","doi-asserted-by":"crossref","unstructured":"Dietterich, T. G. (2000). Ensemble methods in machine learning. In Multiple Classifier Systems (pp. 1\u201315). Springer, Berlin, Heidelberg.","DOI":"10.1007\/3-540-45014-9_1"},{"issue":"1","key":"10614_CR8","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1080\/09540091.2021.2002812","volume":"34","author":"DG Duguma","year":"2022","unstructured":"Duguma, D. G., Kim, J., Lee, S., Jho, N.-S., Sharma, V., & You, I. (2022). A lightweight d2d security protocol with request-forecasting for next-generation mobile networks. Connection Science, 34(1), 362\u2013386.","journal-title":"Connection Science"},{"key":"10614_CR9","unstructured":"G\u00fcng\u00f8r, A. (2022). UERANSIM. [Online; Accessed 05 Nov 2023]. https:\/\/github.com\/aligungr\/UERANSIM"},{"key":"10614_CR10","unstructured":"Haykin, S. (1998). Neural Networks: a Comprehensive Foundation. Prentice Hall PTR."},{"key":"10614_CR11","doi-asserted-by":"crossref","unstructured":"Hussain, S., Echeverria, M., Karim, I., Chowdhury, O., & Bertino, E. (2019). 5greasoner: A property-directed security and privacy analysis framework for 5g cellular network protocol. (pp. 669\u2013684).","DOI":"10.1145\/3319535.3354263"},{"key":"10614_CR12","unstructured":"IBM (2024) What is supervised learning? [Online; Accessed 04 Oct 2023]. https:\/\/www.ibm.com\/topics\/supervised-learning"},{"key":"10614_CR13","doi-asserted-by":"crossref","unstructured":"Jin, J., Lian, C., & Xu, M. (2019). Rogue base station detection using a machine learning approach. In 2019 28th Wireless and Optical Communications Conference (WOCC) (pp. 1\u20135). IEEE.","DOI":"10.1109\/WOCC.2019.8770554"},{"key":"10614_CR14","first-page":"3146","volume":"30","author":"G Ke","year":"2017","unstructured":"Ke, G., Meng, Q., Finley, T., Wang, T., Chen, W., Ma, W., Ye, Q., & Liu, T.-Y. (2017). Lightgbm: A highly efficient gradient boosting decision tree. Advances in neural information processing systems, 30, 3146\u20133154.","journal-title":"Advances in neural information processing systems"},{"key":"10614_CR15","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s10462-011-9272-4","volume":"39","author":"SB Kotsiantis","year":"2013","unstructured":"Kotsiantis, S. B. (2013). Decision trees: a recent overview. Artificial Intelligence Review, 39, 261\u2013283.","journal-title":"Artificial Intelligence Review"},{"key":"10614_CR16","doi-asserted-by":"crossref","unstructured":"Li, Z., Wang, W., Wilson, C., Chen, J., Qian, C., Jung, T., Zhang, L., Liu, K., Li, X., & Liu, Y. (2017). Fbs-radar: Uncovering fake base stations at scale in the wild. In NDSS.","DOI":"10.14722\/ndss.2017.23098"},{"issue":"2","key":"10614_CR17","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1353-4858(17)30014-4","volume":"2017","author":"A Lilly","year":"2017","unstructured":"Lilly, A. (2017). Imsi catchers: hacking mobile communications. Network Security, 2017(2), 5\u20137. https:\/\/doi.org\/10.1016\/S1353-4858(17)30014-4","journal-title":"Network Security"},{"key":"10614_CR18","doi-asserted-by":"publisher","unstructured":"Lopez, P. A., Behrisch, M., Bieker-Walz, L., Erdmann, J., Fl\u00f6tter\u00f6d, Y. -P., Hilbrich, R., L\u00fccken, L., Rummel, J., Wagner, P., & Wiessner, E. (2018) Microscopic traffic simulation using sumo. In 2018 21st International Conference on Intelligent Transportation Systems (ITSC) (pp. 2575\u20132582). https:\/\/doi.org\/10.1109\/ITSC.2018.8569938","DOI":"10.1109\/ITSC.2018.8569938"},{"key":"10614_CR19","unstructured":"Marojevic, V. (2018). C-v2x security requirements and procedures: Survey and research directions. arXiv. arXiv:1807.09338. [eess.SP]"},{"key":"10614_CR20","doi-asserted-by":"crossref","unstructured":"Masini, G. (2021). A guide to ng-ran architecture. 5G and Beyond: Fundamentals and Standards, 233\u2013258.","DOI":"10.1007\/978-3-030-58197-8_8"},{"issue":"5","key":"10614_CR21","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1504\/IJCSE.2022.126259","volume":"25","author":"S Mishra","year":"2022","unstructured":"Mishra, S. (2022). Cyber-security threats and vulnerabilities in 4g\/5g network enabled systems. International Journal of Computational Science and Engineering, 25(5), 548\u2013561.","journal-title":"International Journal of Computational Science and Engineering"},{"key":"10614_CR22","doi-asserted-by":"crossref","unstructured":"Mucherino, A., Papajorgji, P. J., Pardalos, P. M., Mucherino, A., Papajorgji, P. J., & Pardalos, P. M. (2009). K-nearest neighbor classification. Data mining in agriculture, 83\u2013106.","DOI":"10.1007\/978-0-387-88615-2_4"},{"key":"10614_CR23","unstructured":"Nakarmi, P. K., Ersoy, M. A., Soykan, E. U., & Norrman, K. (2021). Murat: Multi-rat false base station detector. arXiv preprint. arXiv:2102.08780"},{"key":"10614_CR24","doi-asserted-by":"crossref","unstructured":"Nakarmi, P. K., Sternby, J., & Ullah, I. (2022). Applying machine learning on rsrp-based features for false base station detection. In Proceedings of the 17th International Conference on Availability, Reliability and Security (pp. 1\u20137).","DOI":"10.1145\/3538969.3543787"},{"issue":"12","key":"10614_CR25","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.1038\/nbt1206-1565","volume":"24","author":"WS Noble","year":"2006","unstructured":"Noble, W. S. (2006). What is a support vector machine? Nature biotechnology, 24(12), 1565\u20131567.","journal-title":"Nature biotechnology"},{"key":"10614_CR26","unstructured":"Park, H. (2023). UERANSIM-LITE. [Online; Accessed 05 Nov 2023]. https:\/\/github.com\/rjaeka456\/UERANSIM-LITE"},{"key":"10614_CR27","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., et al. (2011). Scikit-learn: Machine learning in python. The Journal of machine Learning research, 12, 2825\u20132830.","journal-title":"The Journal of machine Learning research"},{"key":"10614_CR28","doi-asserted-by":"crossref","unstructured":"Pisner, D.A., & Schnyer, D. M. (2020). Support vector machine. In Machine Learning (pp. 101\u2013121). Elsevier.","DOI":"10.1016\/B978-0-12-815739-8.00006-7"},{"key":"10614_CR29","doi-asserted-by":"crossref","unstructured":"Primartha, R., & Tama, B. A. (2017). Anomaly detection using random forest: A performance revisited. In 2017 International Conference on Data and Software Engineering (ICoDSE) (pp. 1\u20136). IEEE.","DOI":"10.1109\/ICODSE.2017.8285847"},{"key":"10614_CR30","doi-asserted-by":"crossref","unstructured":"Quinlan, J. R. (1986). Induction of decision trees. Machine Learning,1, 81\u2013106. Springer","DOI":"10.1023\/A:1022643204877"},{"key":"10614_CR31","unstructured":"RAN1 (2022). Study on channel model for frequencies from 0.5 to 100 ghz. Technical Report 33.901, 3rd Generation Partnership Project."},{"key":"10614_CR32","unstructured":"RAN2 (2022). Radio resource control (rrc) protocol specification. Technical Report 38.331, 3rd Generation Partnership Project."},{"key":"10614_CR33","doi-asserted-by":"crossref","unstructured":"Reus-Muns, G., Jaisinghani, D., Sankhe, K., & Chowdhury, K. R. (2020). Trust in 5g open rans through machine learning: Rf fingerprinting on the powder pawr platform. In GLOBECOM 2020-2020 IEEE Global Communications Conference (pp. 1\u20136). IEEE.","DOI":"10.1109\/GLOBECOM42002.2020.9348261"},{"key":"10614_CR34","doi-asserted-by":"crossref","unstructured":"Rupprecht, D., Kohls, K., Holz, T., & P\u00f6pper, C. (2019). Breaking lte on layer two. In 2019 IEEE Symposium on Security and Privacy (SP) (pp. 1121\u20131136). IEEE.","DOI":"10.1109\/SP.2019.00006"},{"key":"10614_CR35","unstructured":"SA3 (2023a). Authentication and key management for applications (akma) based on 3gpp credentials in the 5g system (5gs) ts 33.535 (release 18). Technical report, The 3rd Generation Partnership Project."},{"key":"10614_CR36","unstructured":"SA3 (2023b). Study on 5G Security Enhancements Against False Base Stations(FBS)(Release 17), document 3GPP TS 33.809, Version 0.13.0, 3GPP, Jan 2021. [Online; Accessed 26 Jan 2023]. https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=3539"},{"key":"10614_CR37","doi-asserted-by":"crossref","unstructured":"Singh, R., Khurana, V., Reddy, M. S., Yadav, R., Jangir, R., & Kapila, D. (2022). Wireless communication design using neural networks and deep learning. In 2022 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES) (pp. 1\u20136). IEEE","DOI":"10.1109\/ICSES55317.2022.9914069"},{"key":"10614_CR38","unstructured":"Tan, L. (2015). Code comment analysis for improving software quality. In The Art and Science of Analyzing Software Data (pp. 493\u2013517). Elsevier."},{"key":"10614_CR39","doi-asserted-by":"crossref","unstructured":"Termanini, R. (2023). Chapter 8 - how to select a dna bio attack. how to plan it, assess its damage, and its vulnerability. In Biomedical Defense Principles to Counter DNA Deep Hacking (pp. 155\u2013176). Academic Press.","DOI":"10.1016\/B978-0-323-99914-4.00003-5"},{"key":"10614_CR40","unstructured":"Today, C.V. (2019). Connecting vehicles today and in the 5g era with c-v2x (cellular vehicle-to-everything). the 5G Era With C-V2X (Cellular Vehicle-to-Everything), London, UK."},{"key":"10614_CR41","doi-asserted-by":"crossref","unstructured":"Zhou, B., Xu, K., & Gerla, M. (2004). Group and swarm mobility models for ad hoc network scenarios using virtual tracks. In IEEE MILCOM 2004. Military Communications Conference (vol. 1, pp. 289\u2013294). IEEE.","DOI":"10.1109\/MILCOM.2004.1493283"},{"key":"10614_CR42","doi-asserted-by":"crossref","unstructured":"Zhuang, Z., Ji, X., Zhang, T., Zhang, J., Xu, W., Li, Z., & Liu, Y. (2018). Fbsleuth: Fake base station forensics via radio frequency fingerprinting. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security (pp. 261\u2013272).","DOI":"10.1145\/3196494.3196521"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-025-10614-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10796-025-10614-1","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-025-10614-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T09:15:10Z","timestamp":1769850910000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10796-025-10614-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,5]]},"references-count":42,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["10614"],"URL":"https:\/\/doi.org\/10.1007\/s10796-025-10614-1","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,5]]},"assertion":[{"value":"5 May 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 June 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Informed consent was obtained from all individual participants.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"All authors consent to publication.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}