{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T02:53:00Z","timestamp":1774407180594,"version":"3.50.1"},"reference-count":84,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100002347","name":"German Federal Ministry for Education and Research (BMBF) through the Project \u00bbOpen6GHub\u00ab","doi-asserted-by":"publisher","award":["16KISK003K"],"award-info":[{"award-number":["16KISK003K"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Commun. Soc."],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/ojcoms.2023.3244274","type":"journal-article","created":{"date-parts":[[2023,2,16]],"date-time":"2023-02-16T21:15:37Z","timestamp":1676582137000},"page":"581-595","source":"Crossref","is-referenced-by-count":26,"title":["The Road to Trustworthy 6G: A Survey on Trust Anchor Technologies"],"prefix":"10.1109","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5344-1964","authenticated-orcid":false,"given":"Benedikt","family":"Veith","sequence":"first","affiliation":[{"name":"Intelligent Networks Research Group, German Research Center for Artificial Intelligence (DFKI GmbH), Kaiserslautern, Germany"}]},{"given":"Dennis","family":"Krummacker","sequence":"additional","affiliation":[{"name":"Intelligent Networks Research Group, German Research Center for Artificial Intelligence (DFKI GmbH), Kaiserslautern, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5005-3635","authenticated-orcid":false,"given":"Hans D.","family":"Schotten","sequence":"additional","affiliation":[{"name":"Intelligent Networks Research Group, German Research Center for Artificial Intelligence (DFKI GmbH), Kaiserslautern, Germany"}]}],"member":"263","reference":[{"key":"ref1","article-title":"6G white paper: Research challenges for trust, security and privacy","author":"Ylianttila","year":"2020","journal-title":"arXiv:2004.11665"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/9781119293071"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500990"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/569905.569910"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2815595"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.214"},{"key":"ref7","first-page":"129","volume":"18","author":"Snijders","year":"2001","journal-title":"Do You Trust? Whom Do You Trust? When Do You Trust?"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2000.5340804"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1111\/puar.12800"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-economics-120213-012609"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2014.2377891"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/6GNet54646.2022.9830407"},{"key":"ref13","first-page":"1","article-title":"Advanced wireless communication for industrial intra-logistics use cases","volume-title":"Proc. Workshop Next Gener. Netw. Appl. (NANA)","author":"Fischer"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3120143"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2019.2947124"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4301\/S1807-17752014000300010"},{"key":"ref17","first-page":"8","article-title":"A secure and privacy-friendly logging scheme","volume-title":"Proc. 2nd Int. Conf. Cloud Comput., GRIDs, Virtualization","author":"A\u00dfmuth"},{"key":"ref18","article-title":"Efficient and secure ECDSA algorithm and its applications: A survey","author":"Al-Zubaidie","year":"2019","journal-title":"arXiv:1902.10313"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISSC.2015.7163785"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3000595"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/sym10080352"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3167996.3167997"},{"issue":"8","key":"ref23","doi-asserted-by":"crossref","first-page":"2810","DOI":"10.3390\/s21082810","article-title":"Lightweight digital certificate management and efficacious symmetric cryptographic mechanism over industrial Internet of Things","volume":"21","author":"Ahmed","year":"2021","journal-title":"Sensors"},{"issue":"21","key":"ref24","doi-asserted-by":"crossref","first-page":"9999","DOI":"10.3390\/app11219999","article-title":"A novel secure blockchain framework for accessing electronic health records using multiple certificate authority","volume":"11","author":"Ali","year":"2021","journal-title":"Appl. Sci."},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.832969"},{"key":"ref26","first-page":"53","article-title":"Enabling dynamic SLA compensation using blockchain-based smart contracts","volume-title":"Proc. IFIP\/IEEE Symp. Integr. Netw. Service Manage. (IM)","author":"Scheid"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2020.106854"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655020"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3214303"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1049\/qtc2.12044"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1364\/AOP.361502"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.021.1900629"},{"key":"ref33","first-page":"1","article-title":"The beta reputation system","volume-title":"Proc. 15th Bled Electron. Commerce Conf.","author":"Josang"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.154"},{"key":"ref35","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2020.113385","article-title":"A survey of blockchain consensus algorithms performance evaluation criteria","volume":"154","author":"Bamakan","year":"2020","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"ref36","first-page":"101","article-title":"A survey about consensus algorithms used in blockchain","volume":"14","author":"Nguyen","year":"2018","journal-title":"J. Inf. Process. Syst."},{"key":"ref37","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto","year":"2008"},{"key":"ref38","article-title":"Proof-of-stake (POS)","year":"2022","journal-title":"Ethereum"},{"key":"ref39","first-page":"11","article-title":"PBFT vs proof-of-authority: Applying the CAP theorem to permissioned blockchain","volume-title":"Proc. Ital. Conf. Cyber Security)","author":"Angelis"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"ref41","article-title":"The tangle | IOTA Wiki","year":"2022"},{"key":"ref42","article-title":"Gossip about gossip","year":"2022","journal-title":"Hedera"},{"issue":"4","key":"ref43","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1016\/j.dcan.2019.12.001","article-title":"Performance analysis and comparison of PoW, PoS and DAG based blockchains","volume":"6","author":"Cao","year":"2020","journal-title":"Digit. Commun. Netw."},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58820-8_6"},{"key":"ref45","volume-title":"Ethereum: A secure decentralised generalised transaction ledger, Berlin version 7251f10","author":"Wood","year":"2022"},{"key":"ref46","article-title":"Runtime development | substrate_docs","year":"2022"},{"key":"ref47","article-title":"Hyperledger sawtooth","year":"2022"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICCBB.2018.8756390"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48184-2_32"},{"key":"ref50","article-title":"Immudb\u2014The lightweight, high-speed immutable database","year":"2022"},{"key":"ref51","article-title":"Google\/trillian: A transparent, highly scalable and cryptographically verifiable data store","year":"2022"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/321479.321481"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1080\/23270012.2019.1570365"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000195"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s12525-021-00475-2"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.5465\/annals.2018.0057"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/932"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC48522.2020.9200928"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99740-7_21"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2019.12.012"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00345"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77287-1_11"},{"key":"ref63","article-title":"A marketplace for trading AI models based on blockchain and incentives for IoT data","author":"Nguyen","year":"2021","journal-title":"arXiv:2112.02870"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.3390\/app9050909"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2021.3127753"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2933020"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.021.1900614"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-020-00733-2"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking52078.2021.9472783"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/6GNet54646.2022.9830163"},{"issue":"3","key":"ref71","doi-asserted-by":"crossref","first-page":"440","DOI":"10.3390\/network2030027","article-title":"Analysis of 5G channel access for collaboration with TSN concluding at a 5G scheduling mechanism","volume":"2","author":"Krummacker","year":"2022","journal-title":"Network"},{"key":"ref72","first-page":"1","article-title":"InDeCo\u2014Detach communication from the interconnection via an automatic zero-configuration, service-oriented network handling","volume-title":"Proc. 25th ITG-Symp. Mobile Commun. Technol. Appl.","volume":"299","author":"Krummacker"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900488"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops49005.2020.9145055"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000508"},{"key":"ref76","first-page":"1","article-title":"Organic & dynamic infrastructure: Getting ready for 6G","volume-title":"Proc. 26th ITG-Symp. Mobile Commun. Technol. Appl.","volume":"304","author":"Krummacker"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICPS51978.2022.9816860"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.111.2100258"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3223447"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.21143"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/6GSUMMIT49458.2020.9083885"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4233"},{"key":"ref83","article-title":"Toward pre-standardization of reputation-based trust models beyond 5G","volume":"81","author":"Valero","year":"2022","journal-title":"Comput. Stand. Interfaces"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-83944-4_4"}],"container-title":["IEEE Open Journal of the Communications Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8782661\/10008219\/10042484.pdf?arnumber=10042484","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T13:15:35Z","timestamp":1707830135000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10042484\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":84,"URL":"https:\/\/doi.org\/10.1109\/ojcoms.2023.3244274","relation":{},"ISSN":["2644-125X"],"issn-type":[{"value":"2644-125X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}