{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,15]],"date-time":"2026-05-15T13:46:07Z","timestamp":1778852767787,"version":"3.51.4"},"reference-count":121,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["101096504"],"award-info":[{"award-number":["101096504"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3316605","type":"journal-article","created":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T18:05:59Z","timestamp":1695060359000},"page":"106898-106923","source":"Crossref","is-referenced-by-count":58,"title":["Toward Deterministic Communications in 6G Networks: State of the Art, Open Challenges and the Way Forward"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6328-0113","authenticated-orcid":false,"given":"Gourav Prateek","family":"Sharma","sequence":"first","affiliation":[{"name":"EECS School, KTH Royal Institute of Technology, Stockholm, Sweden"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dhruvin","family":"Patel","sequence":"additional","affiliation":[{"name":"Ericsson Research, Aachen, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8398-7741","authenticated-orcid":false,"given":"Joachim","family":"Sachs","sequence":"additional","affiliation":[{"name":"Ericsson Research, Stockholm, Sweden"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marilet","family":"De Andrade","sequence":"additional","affiliation":[{"name":"Ericsson Research, Stockholm, Sweden"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5277-8402","authenticated-orcid":false,"given":"J\u00e1nos","family":"Farkas","sequence":"additional","affiliation":[{"name":"Ericsson Research, Budapest, Hungary"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Janos","family":"Harmatos","sequence":"additional","affiliation":[{"name":"Ericsson Research, Budapest, Hungary"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8574-330X","authenticated-orcid":false,"given":"Balazs","family":"Varga","sequence":"additional","affiliation":[{"name":"Ericsson Research, Budapest, Hungary"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4953-1964","authenticated-orcid":false,"given":"Hans-Peter","family":"Bernhard","sequence":"additional","affiliation":[{"name":"Silicon Austria Laboratories, Linz, Austria"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4000-7242","authenticated-orcid":false,"given":"Raheeb","family":"Muzaffar","sequence":"additional","affiliation":[{"name":"Silicon Austria Laboratories, Linz, Austria"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2403-2176","authenticated-orcid":false,"given":"Mahin","family":"Ahmed","sequence":"additional","affiliation":[{"name":"Silicon Austria Laboratories, Linz, Austria"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3470-7712","authenticated-orcid":false,"given":"Frank","family":"D\u00fcrr","sequence":"additional","affiliation":[{"name":"Institute for Parallel and Distributed Systems, University of Stuttgart, Stuttgart, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7978-6998","authenticated-orcid":false,"given":"Dietmar","family":"Bruckner","sequence":"additional","affiliation":[{"name":"B&#x0026;R Industrial Automation, Eggelsberg, Austria"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6771-0689","authenticated-orcid":false,"given":"Edgardo Montes","family":"De Oca","sequence":"additional","affiliation":[{"name":"Montimage, Paris, France"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Drissa","family":"Houatra","sequence":"additional","affiliation":[{"name":"Orange Innovation, Ch&#x00E2;tillon, France"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5247-6164","authenticated-orcid":false,"given":"Hongwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Iowa State University, Ames, IA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6682-6559","authenticated-orcid":false,"given":"James","family":"Gross","sequence":"additional","affiliation":[{"name":"EECS School, KTH Royal Institute of Technology, Stockholm, Sweden"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2043769"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11030412"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2360675"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2537298"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2018.8449807"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2741485"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2017.8269130"},{"key":"ref54","first-page":"1","article-title":"EchoRing: A low-latency, reliable token-passing MAC protocol for wireless industrial networks","author":"dombrowski","year":"2015","journal-title":"Proc 21st Eur Wireless Conf"},{"key":"ref51","year":"2022","journal-title":"P802 1Qdj&#x2014;Configuration Enhancements for Time-Sensitive Networking"},{"key":"ref50","year":"2022","journal-title":"IEC\/IEEE TSN Profile for Industrial Automation"},{"key":"ref46","year":"2023","journal-title":"Exposure of 5G Capabilities for Connected Industries and Automation Applications"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.23919\/ETR.2022.9934828"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.108960"},{"key":"ref47","year":"2023","journal-title":"5G-Smart Deliverable 5 5 Report Describing the Framework for 5G System and Network Management Functions"},{"key":"ref42","author":"malis","year":"2022","journal-title":"Deterministic Networking (DetNet) Controller Plane Framework"},{"key":"ref41","first-page":"1","year":"2016"},{"key":"ref44","year":"2023","journal-title":"5G-Smart Deliverable 5 2 First Report on 5G Network Architecture Options and Assessments"},{"key":"ref43","year":"2019","journal-title":"5G Non-Public Networks for Industrial Scenarios"},{"key":"ref49","year":"2023","journal-title":"UAFX Part 80 Overview and Concepts"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.050"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.17487\/RFC9330"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3199481"},{"key":"ref4","first-page":"1","year":"2018"},{"key":"ref3","year":"2010"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8655"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2017.8091139"},{"key":"ref100","article-title":"Towards 6G wireless communication networks: Vision, enabling technologies, and new paradigm shifts","volume":"64","year":"2021","journal-title":"Sci China Inf Sci"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.211.2100164"},{"key":"ref40","year":"2022","journal-title":"Integration of 5G with Time-Sensitive Networking for Industrial Communications&#x2014;5G-ACIA"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2017.8538916"},{"key":"ref34","year":"2023","journal-title":"5G-SMART D1 5 Evaluation of Radio Network Deployment Options"},{"key":"ref37","author":"gnad","year":"2017","journal-title":"Aspects of dependability assessment in ZDKI"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2016.7553415"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7497764"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110457"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.23919\/ETR.2020.9905508"},{"key":"ref32","author":"liberg","year":"2019","journal-title":"Cellular Internet of Things From Massive Deployments to Critical 5G Application"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.001.2000035"},{"key":"ref38","year":"2021","journal-title":"Service Requirements for the 5G System"},{"key":"ref24","first-page":"1","year":"2020"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2018.2888703"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.001.2000010"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5706322"},{"key":"ref20","year":"2023","journal-title":"Determinism"},{"key":"ref22","year":"0"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/BF01995673"},{"key":"ref28","year":"2023","journal-title":"Precision time Protocol Telecom Profile for Phase\/Time Synchronization With Partial Timing Support From the Network"},{"key":"ref27","year":"2023","journal-title":"Precision Time Protocol Telecom Profile for Phase\/Time Synchronization With Full Timing Support From the Network"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ISPCS49990.2021.9615318"},{"key":"ref13","year":"2022","journal-title":"5G Service requirements for cyber-physical control applications in vertical domains"},{"key":"ref12","year":"2023","journal-title":"DETERMINISTIC6G Deliverable 1 1 Use Cases and Architecture Principles"},{"key":"ref15","author":"yeh","year":"2021","journal-title":"Perspectives on 6G Wireless Communications"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900488"},{"key":"ref97","article-title":"Data-driven latency probability prediction for wireless networks: Focusing on tail probabilities","author":"mostafavi","year":"2023","journal-title":"arXiv 2307 10648"},{"key":"ref96","article-title":"Data-driven predictive latency for 5G: A theoretical and experimental analysis using network measurements","author":"skocaj","year":"2023","journal-title":"arXiv 2307 02329"},{"key":"ref11","year":"2022","journal-title":"Future Network Trends Driving Universal Metaverse Mobility"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2981745"},{"key":"ref10","year":"2022","journal-title":"6G&#x2014;Connecting a Cyber-Physical World"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3188571"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1038\/s41928-019-0355-6"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900287"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3130030"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2021.3071496"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2019.1800601"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2017.2784180"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.01.1900525"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2021.12.002"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3005495"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2018.2866382"},{"key":"ref89","first-page":"416","article-title":"Data-driven end-to-end delay violation probability prediction with extreme value mixture models","author":"mostafavi","year":"2021","journal-title":"Proc IEEE\/ACM Symp Edge Comput (SEC)"},{"key":"ref86","year":"2022","journal-title":"P802 1Qci&#x2014;Per-Stream Filtering and Policing"},{"key":"ref85","year":"2021","journal-title":"Security Aspects of 5G for Industrial Networks"},{"key":"ref88","article-title":"Extreme URLLC: Vision, challenges, and key enablers","author":"park","year":"2022","journal-title":"arXiv 2001 09683"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.17487\/RFC9055"},{"key":"ref82","first-page":"1","author":"barton","year":"2023","journal-title":"Management of IEEE 802 1Qci Security Policies for Time Sensitive Networks (TSN)"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6902138"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAIS48893.2020.9096742"},{"key":"ref83","first-page":"1","author":"seewald","year":"2019","journal-title":"Integrated security-tagging for deterministic Ethernet"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/3487330"},{"key":"ref79","article-title":"DoS protection through credit based metering&#x2014;Simulation-based evaluation for time-sensitive networking in cars","author":"meyer","year":"2019","journal-title":"arXiv 1908 09646"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3007211"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps56602.2022.10008585"},{"key":"ref109","year":"2023","journal-title":"Hexa-X Deliverable 1 3 Targets and Requirements for 6G&#x2014;Initial E2E Architecture"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2968591"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9838709"},{"key":"ref75","first-page":"1","article-title":"INSPIRE-5Gplus: Intelligent security and pervasive trust for 5G and beyond networks","year":"2020","journal-title":"Proc 15th Int Conf Availability Rel Secur"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2719686"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102871"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/ICII.2018.00022"},{"key":"ref77","year":"2023","journal-title":"Hexa-X -Deliverable D1 1 6G Vision use cases and key societal values"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC49053.2021.9417452"},{"key":"ref76","author":"benzaid","year":"2020","journal-title":"Intelligent security architecture for 5G and beyond networks"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP55476.2022.10039118"},{"key":"ref2","year":"2016"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2020.9121845"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2015.74"},{"key":"ref111","year":"2023","journal-title":"5G-Smart Deliverable 5 3 Second Report on New Technological Features to Be Supported by 5G Standardization and Their Implementation Impact"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10243085"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3059488"},{"key":"ref73","author":"kleineberg","year":"2017","journal-title":"Cyber security for time-sensitive networking (TSN) in modern automation networks"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2017.8075934"},{"key":"ref110","author":"andersson y","year":"2023","journal-title":"Joint communication and sensing in 6G networks"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3141728"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2018.2835772"},{"key":"ref67","article-title":"5G-TSN integration meets networking requirements for industrial 2026 automation","year":"2019","journal-title":"Ericsson Review Technology"},{"key":"ref117","year":"2020","journal-title":"System architecture for the 5G System (5GS)"},{"key":"ref69","year":"2023","journal-title":"5G Smart Deliverable 5 4 Second Report on 5G Network Architecture Options and Assessments"},{"key":"ref118","year":"2023","journal-title":"Draft Standard for Local and Metropolitan Area Networks Timing and Synchronization for Time-Sensitive Applications&#x2014;Amendment Hot Standby"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2795567"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/2997465.2997494"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737474"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1145\/2997465.2997470"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2018.2867029"},{"key":"ref113","year":"2023","journal-title":"Hexa-X Deliverable 3 1 Localisation and Sensing Use Cases and Gap Analysis"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.2968209"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3053486"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2860000"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.3027877"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.912327"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195689"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS48256.2020.9027357"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10254227.pdf?arnumber=10254227","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T18:18:12Z","timestamp":1698085092000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10254227\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":121,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3316605","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}