{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:32:04Z","timestamp":1763202724603,"version":"build-2065373602"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"9-10","license":[{"start":{"date-parts":[[2023,1,17]],"date-time":"2023-01-17T00:00:00Z","timestamp":1673913600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,1,17]],"date-time":"2023-01-17T00:00:00Z","timestamp":1673913600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Deutsches Forschungszentrum f\u00fcr K\u00fcnstliche Intelligenz GmbH (DFKI)"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2023,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This manuscript investigates viable Distributed Ledger Technology (DLT) architecture approaches to be used as basis for the distribution of integrity verification data. We discuss what can be a Trust Anchor and how the property of trust can be enabled as a service for mobile communications infrastructures. This follows up on a preceding publication, in the course of which a service was developed that can be utilized to create trust and traceability in transactions between other services. Crucial for the integrity of such an audit trail is proof for which side was committing, in case a tampering was detected. For such verification in the aftermath, mechanisms for the distribution of meta data are necessary. Where our ultimate goal is to develop a versatile framework for Trust as a Service (TaaS), the work at hand contributes the investigation on header distribution. We put a major focus on providing Trust as a Service (TaaS) especially in the mobile communications domain since a reliable concept for trustworthiness is indispensable for the vision of organic infrastructures beyond 5G, which means that such networks are flexible regarding their composition and open for stakeholders.<\/jats:p>","DOI":"10.1007\/s12243-022-00941-8","type":"journal-article","created":{"date-parts":[[2023,1,17]],"date-time":"2023-01-17T05:02:45Z","timestamp":1673931765000},"page":"551-560","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["DLT architectures for trust anchors in 6G"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9799-4870","authenticated-orcid":false,"given":"Dennis","family":"Krummacker","sequence":"first","affiliation":[]},{"given":"Benedikt","family":"Veith","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Lindenschmitt","sequence":"additional","affiliation":[]},{"given":"Hans D.","family":"Schotten","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,17]]},"reference":[{"key":"941_CR1","doi-asserted-by":"crossref","unstructured":"Bless R, Bloessl B, Hollick M, Corici M, Karl H, Krummacker D, Lindenschmitt D, Schotten H, Wimmer L (2022) Dynamic network (re-)configuration across time, scope, and structure. In: 2022 Joint european conference on networks and communications & 6G Summit (euCNC\/6g Summit). IEEE Xplore, IEEE, pp 547\u2013552","DOI":"10.1109\/EuCNC\/6GSummit54941.2022.9815813"},{"key":"941_CR2","unstructured":"Krummacker D, Fischer C, Munoz Y, Schotten H (2022) Organic & dynamic infrastructure: getting ready for 6G. In: Mobile communication-technologies and applications; 26th ITG-symposium. ITG, IEEE Xplore, VDE, vol 304"},{"key":"941_CR3","doi-asserted-by":"publisher","unstructured":"Corici M, Troudt E, Chakraborty P, Magedanz T (2021) An ultra-flexible software architecture concept for 6g core networks. In: 2021 IEEE 4th 5g world forum (5GWF), pp 400\u2013405. https:\/\/doi.org\/10.1109\/5GWF52925.2021.00077","DOI":"10.1109\/5GWF52925.2021.00077"},{"key":"941_CR4","doi-asserted-by":"publisher","unstructured":"Krummacker D, Schotten H (2022) Status-preserving, seamless relocation of processes in orchestrated networks such as organic 6G. In: 2022 IEEE 5th international conference on industrial cyber-physical systems (ICPS), pp 1\u20138. IEEE Xplore, IEEE. https:\/\/doi.org\/10.1109\/ICPS51978.2022.9816860","DOI":"10.1109\/ICPS51978.2022.9816860"},{"key":"941_CR5","doi-asserted-by":"crossref","unstructured":"Corici M, Troudt E, Magedanz T, Schotten H (2022) Organic 6g networks: decomplexification of software-based core networks. In: 2022 Joint european conference on networks and communications & 6G Summit (EuCNC\/6G Summit). IEEE, pp 541\u2013546","DOI":"10.1109\/EuCNC\/6GSummit54941.2022.9815730"},{"key":"941_CR6","unstructured":"Krummacker D, Fischer C, Veith B, Schotten HD (2022) 6G core-architecture \u2013 approaches for enhancing flexibility across control and user plane"},{"key":"941_CR7","doi-asserted-by":"publisher","unstructured":"Krummacker D, Veith B, Lindenschmitt D, Schotten HD (2022) Radio resource sharing in 6G private networks: trustworthy spectrum allocation for coexistence through DLT as core function. In: 2022 1st International conference on 6G networking (6GNet), pp 1\u20138. IEEE Xplore, IEEE. https:\/\/doi.org\/10.1109\/6GNet54646.2022.9830407","DOI":"10.1109\/6GNet54646.2022.9830407"},{"issue":"3","key":"941_CR8","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1109\/MNET.011.2000508","volume":"35","author":"C Benza\u00efd","year":"2021","unstructured":"Benza\u00efd C, Taleb T, Farooqi MZ (2021) Trust in 5g and beyond networks. IEEE Netw 35(3):212\u2013222. https:\/\/doi.org\/10.1109\/MNET.011.2000508","journal-title":"IEEE Netw"},{"key":"941_CR9","doi-asserted-by":"publisher","unstructured":"Jorquera Valero JM, S\u00e1nchez S\u00e1nchez PM, Gil P\u00e9rez M., Huertas Celdr\u00e1n A, Mart\u00ednez P\u00e9rez G (2022) Toward pre-standardization of reputation-based trust models beyond 5g. Comput Standards Inter, vol 81. https:\/\/doi.org\/10.1016\/j.csi.2021.103596","DOI":"10.1016\/j.csi.2021.103596"},{"issue":"3","key":"941_CR10","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1016\/j.dcan.2020.07.003","volume":"6","author":"M Wang","year":"2020","unstructured":"Wang M, Zhu T, Zhang T, Zhang J, Yu S, Zhou W (2020) Security and privacy in 6g networks: new areas and new challenges. Digital Commun Netw 6(3):281\u2013291. https:\/\/doi.org\/10.1016\/j.dcan.2020.07.003","journal-title":"Digital Commun Netw"},{"key":"941_CR11","doi-asserted-by":"publisher","unstructured":"Nguyen T, Tran N, Loven L, Partala J, Kechadi M-T, Pirttikangas S (2020) Privacy-aware blockchain innovation for 6g: challenges and opportunities. In: 2020 2nd 6G wireless summit (6G SUMMIT), pp 1\u20135. https:\/\/doi.org\/10.1109\/6GSUMMIT49458.2020.9083832","DOI":"10.1109\/6GSUMMIT49458.2020.9083832"},{"issue":"6","key":"941_CR12","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/MNET.021.1900629","volume":"34","author":"W Li","year":"2020","unstructured":"Li W, Su Z, Li R, Zhang K, Wang Y (2020) Blockchain-based data security for artificial intelligence applications in 6g networks. IEEE Netw 34(6):31\u201337. https:\/\/doi.org\/10.1109\/MNET.021.1900629","journal-title":"IEEE Netw"},{"key":"941_CR13","doi-asserted-by":"publisher","unstructured":"Kalla A, De Alwis C, Gur G, Gochhayat SP, Liyanage M, Porambage P (2022) Emerging directions for blockchainized 6g. IEEE Consumer Electr Mag. https:\/\/doi.org\/10.1109\/MCE.2022.3164530","DOI":"10.1109\/MCE.2022.3164530"},{"key":"941_CR14","unstructured":"Wood G (2014) Ethereum: a secure decentralised generalised transaction ledger, Berlin version b8ffc51 - 2022-02-21. Accessed 25 Feb 2022"},{"key":"941_CR15","doi-asserted-by":"publisher","unstructured":"Alharby M, Van Moorsel A (2017) Blockchain based smart contracts : a systematic mapping study, pp 125\u2013140. https:\/\/doi.org\/10.5121\/csit.2017.71011","DOI":"10.5121\/csit.2017.71011"},{"key":"941_CR16","doi-asserted-by":"crossref","unstructured":"Al-Zubaidie M, Zhang Z, Zhang J (2019) Efficient and secure ecdsa algorithm and its applications: a survey. Int J Commun Netw Inf Secur, vol 11","DOI":"10.17762\/ijcnis.v11i1.3827"},{"key":"941_CR17","doi-asserted-by":"crossref","unstructured":"Antal C, Cioara T, Anghel I, Antal M, Salomie I (2021) Distributed ledger technology review and decentralized applications development guidelines. Future Internet, vol 13(3). https:\/\/doi.org\/10.3390\/fi13030062","DOI":"10.3390\/fi13030062"},{"key":"941_CR18","doi-asserted-by":"publisher","unstructured":"Zhang M, Xie Z, Yue C, Zhong Z (2020) Spitz, vol 13. https:\/\/doi.org\/10.14778\/3415478.3415567","DOI":"10.14778\/3415478.3415567"},{"key":"941_CR19","unstructured":"Wood G Technology \u2014 Polkadot. Online. https:\/\/polkadot.network\/technology\/. Accessed 18 Aug 2022"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-022-00941-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12243-022-00941-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-022-00941-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T02:09:44Z","timestamp":1695348584000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12243-022-00941-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,17]]},"references-count":19,"journal-issue":{"issue":"9-10","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["941"],"URL":"https:\/\/doi.org\/10.1007\/s12243-022-00941-8","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"type":"print","value":"0003-4347"},{"type":"electronic","value":"1958-9395"}],"subject":[],"published":{"date-parts":[[2023,1,17]]},"assertion":[{"value":"2 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 December 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Consent for publication"}},{"value":"Not applicable","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"The authors declare no competing interests.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Competing interests"}}]}}