{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T05:10:11Z","timestamp":1756789811364,"version":"3.44.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T00:00:00Z","timestamp":1751846400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T00:00:00Z","timestamp":1751846400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,7]]},"DOI":"10.1109\/meditcom64437.2025.11104431","type":"proceedings-article","created":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T19:13:17Z","timestamp":1756753997000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["PKI-Based Security for Industrial Automation Systems Using 5G Campus Networks"],"prefix":"10.1109","author":[{"given":"Adian","family":"Shubbar","sequence":"first","affiliation":[{"name":"Institute of Reliable Embedded Systems and Communication Electronics (ivESK), Offenburg University,Offenburg,Germany,77652"}]},{"given":"Julian","family":"G\u00f6ppert","sequence":"additional","affiliation":[{"name":"Institute of Reliable Embedded Systems and Communication Electronics (ivESK), Offenburg University,Offenburg,Germany,77652"}]},{"given":"Kedar","family":"Naik","sequence":"additional","affiliation":[{"name":"Institute of Reliable Embedded Systems and Communication Electronics (ivESK), Offenburg University,Offenburg,Germany,77652"}]},{"given":"Axel","family":"Sikora","sequence":"additional","affiliation":[{"name":"Institute of Reliable Embedded Systems and Communication Electronics (ivESK), Offenburg University,Offenburg,Germany,77652"}]}],"member":"263","reference":[{"volume-title":"Tech. Rep.","year":"2023","article-title":"Private 5G-Netze in Unternehmen: Schnell, Sicher, Zuverl\u00e4ssig","key":"ref1"},{"volume-title":"Attacks From 4G\/5G Core Networks:Risks of the Industrial IoT in Compromised Campus Networks.,\u201d Tech. Rep.","year":"2021","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TELFOR59449.2023.10372633"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1049\/icp.2023.0931"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1007\/978-981-16-6723-7_16"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/IWCMC.2017.7986606"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/CTMCD53128.2021.00070"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/IDAACS58523.2023.10348771"},{"volume-title":"5G for Industrial Internet of Things (IIoT),\u201d Tech. Rep.","year":"2021","key":"ref9"},{"volume-title":"The Need for Digital Certificates in 5G Network,\u201d Tech. Rep.","year":"2022","key":"ref10"},{"volume-title":"5G Scenarios and Security Design,\u201d Tech. Rep.","year":"2016","key":"ref11"},{"journal-title":"FieldPKI:Prozesse und Kommunikationsprotokolle f\u00fcr ein Security Lifecycle Management in Industriellen Feldbusger\u00e4ten und -Systemen (FieldPKI)","key":"ref12"},{"volume-title":"Towards a Generic Credential Management Model in Industrial Automation Systems","year":"2024","author":"G\u00f6ppert","key":"ref13"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/ACCESS.2021.3108423"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/6GNet58894.2023.10317752"},{"volume-title":"5G; Security Architecture and Procedures for 5G System (3GPP TS 33.501 version 16.3.0 Release 16),\u201d Tech. Rep.","year":"2020","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/CTMCD53128.2021.00070"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.13052\/jicts2245-800X.921"},{"issue":"20","key":"ref19","doi-asserted-by":"crossref","DOI":"10.3390\/app11209393","article-title":"Analysis of Security Issues and Countermeasures for the Industrial Internet of Things","volume":"11","author":"Pal","year":"2021","journal-title":"Applied Sciences"},{"volume-title":"Security Aspects of 5G for Industrial Networks,\u201d Tech. Rep.","year":"2021","key":"ref20"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/INDIN58382.2024.10774305"},{"key":"ref22","first-page":"1","article-title":"ISO\/IEC\/IEEE International Standard for Telecommunications and exchange between information technology systems-Requirements for local and metropolitan area networks-Part 1AR:Secure device identity","year":"2020","journal-title":"ISO\/IEC\/IEEE 8802-1AR:2020(E)"},{"volume-title":"Security for 5G,\u201d Tech. Rep.","year":"2022","key":"ref23"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/ICCSNT.2011.6182336"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/CCST.2010.5678694"},{"journal-title":"NET.3.4 Network Access Control","key":"ref26"},{"year":"2025","author":"Grubbs","journal-title":"EAP-TLS Explained: How It Works and Why It\u2019s Secure","key":"ref27"},{"volume-title":"TPM 2.0 Keys for Device Identity and Attestation,\u201d Tech. Rep.","year":"2021","key":"ref28"},{"journal-title":"Open5Gs","key":"ref29"},{"author":"Jost","journal-title":"Security features for Non-Public Networks","key":"ref30"},{"journal-title":"Proxmox Virtual Environment - Official Website","key":"ref31"},{"journal-title":"PacketFence","key":"ref32"},{"journal-title":"OpenSSL Engine for TPM2 devices","key":"ref33"},{"year":"2014","journal-title":"cisco\/libest","first-page":"T15:59:52Z","key":"ref34"}],"event":{"name":"2025 IEEE International Mediterranean Conference on Communications and Networking (MeditCom)","start":{"date-parts":[[2025,7,7]]},"location":"Nice, France","end":{"date-parts":[[2025,7,10]]}},"container-title":["2025 IEEE International Mediterranean Conference on Communications and Networking (MeditCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11104271\/11104263\/11104431.pdf?arnumber=11104431","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T04:44:09Z","timestamp":1756788249000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11104431\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,7]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/meditcom64437.2025.11104431","relation":{},"subject":[],"published":{"date-parts":[[2025,7,7]]}}}