{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T05:58:09Z","timestamp":1767333489165,"version":"3.48.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T00:00:00Z","timestamp":1765929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T00:00:00Z","timestamp":1765929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,17]]},"DOI":"10.1109\/6gnet68413.2025.11314082","type":"proceedings-article","created":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T18:35:39Z","timestamp":1767292539000},"page":"50-58","source":"Crossref","is-referenced-by-count":0,"title":["TAXI: Threat Analysis on the Xn Interface"],"prefix":"10.1109","author":[{"given":"Amy","family":"Nymalm","sequence":"first","affiliation":[{"name":"Ericsson Research,Finland"}]},{"given":"Sabina","family":"Zaman","sequence":"additional","affiliation":[{"name":"Ericsson Research,Finland"}]},{"given":"Eemeli","family":"V\u00e4h\u00e4passi","sequence":"additional","affiliation":[{"name":"Ericsson Research,Finland"}]},{"given":"Sonika","family":"Ujjwal","sequence":"additional","affiliation":[{"name":"Ericsson Research,Finland"}]},{"given":"Zakaria","family":"Laaroussi","sequence":"additional","affiliation":[{"name":"Ericsson Research,Finland"}]}],"member":"263","reference":[{"journal-title":"3GPP","article-title":"TS 38.423: NG-RAN; Xn Application Protocol (XnAP) (release 18)","year":"2024","key":"ref1"},{"journal-title":"Ericsson","article-title":"6G - Connecting a cyber-physical world","year":"2022","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-207"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS63942.2025.10885674"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT64950.2025.11049094"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC62082.2024.10826685"},{"journal-title":"3GPP","article-title":"TS 38.300: Technical Specification Group Radio Access Network; NR; NR and NG-RAN Overall Description; Stage 2 (Release 18)","year":"2024","key":"ref7"},{"journal-title":"3GPP","article-title":"TS 38.420: Technical Specification Group Radio Access Network; NG-RAN; Xn general aspects and principles (Release 18)","year":"2024","key":"ref8"},{"journal-title":"3GPP","article-title":"TS 23.502: Procedures for the 5G System (Release 18)","year":"2024","key":"ref9"},{"journal-title":"3GPP","article-title":"TS 33.501: Technical Specification Group Services and System Aspects; Security architecture and procedures for 5G system (Release 18)","year":"2024","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-207a.ipd"},{"key":"ref12","article-title":"Zero Trust Architecture for Advancing Mobile Network Security Operations","author":"Bystr\u00f6m","year":"2024","journal-title":"Ericsson"},{"journal-title":"Alliance for Telecommunications Industry Solutions (ATIS)","article-title":"ATIS-I-0000095: Enhanced Zero Trust and 5G","year":"2023","key":"ref13"},{"article-title":"The STRIDE Threat Model","volume-title":"Microsoft","year":"2009","key":"ref14"},{"journal-title":"European Union Agency for Cybersecurity (ENISA)","article-title":"ENISA Threat Landscape for 5G Networks: Threat assessment for the fifth generation of mobile telecommunications networks (5G)","year":"2019","key":"ref15"},{"journal-title":"3GPP","article-title":"TR 33.809: Study on 5G security enhancements against False Base Stations (FBS) (Release 18)","year":"2023","key":"ref16"},{"journal-title":"3GPP","article-title":"TS 33.117: Catalogue of general security assurance requirements (Release 18)","year":"2024","key":"ref17"},{"journal-title":"3GPP","article-title":"TR 33.894: Study on applicability of the zero trust security principles in mobile networks (Release 18)","year":"2023","key":"ref18"},{"journal-title":"3GPP","article-title":"TS 23.288: Architecture enhancements for 5G System (5GS) to support network data analytics services (Release 18)","year":"2024","key":"ref19"},{"journal-title":"3GPP","article-title":"TS 33.511: Security Assurance Specification (SCAS) for the next generation Node B (gNodeB) network product class (Release 18)","year":"2024","key":"ref20"},{"volume-title":"MITRE","year":"2025","key":"ref21"}],"event":{"name":"2025 4th International Conference on 6G Networking (6GNet)","start":{"date-parts":[[2025,12,17]]},"location":"Paris, France","end":{"date-parts":[[2025,12,19]]}},"container-title":["2025 4th International Conference on 6G Networking (6GNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11314084\/11314076\/11314082.pdf?arnumber=11314082","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T05:56:25Z","timestamp":1767333385000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11314082\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,17]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/6gnet68413.2025.11314082","relation":{},"subject":[],"published":{"date-parts":[[2025,12,17]]}}}