{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T22:20:21Z","timestamp":1775082021005,"version":"3.50.1"},"reference-count":117,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Federal Ministry for Digital and Transport of the Federal Republic of Germany","award":["165GU054B"],"award-info":[{"award-number":["165GU054B"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Commun. Soc."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/ojcoms.2024.3430823","type":"journal-article","created":{"date-parts":[[2024,7,18]],"date-time":"2024-07-18T17:44:44Z","timestamp":1721324684000},"page":"13-28","source":"Crossref","is-referenced-by-count":25,"title":["Open RAN: A Concise Overview"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-4960-7134","authenticated-orcid":false,"given":"Mohamad","family":"Wani","sequence":"first","affiliation":[{"name":"Department of Cooperation Systems, Fraunhofer FIT, Sankt Augustin, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-6992-3550","authenticated-orcid":false,"given":"Mathias","family":"Kretschmer","sequence":"additional","affiliation":[{"name":"Department of Cooperation Systems, Fraunhofer FIT, Sankt Augustin, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6517-7914","authenticated-orcid":false,"given":"Bernd","family":"Schr\u00f6der","sequence":"additional","affiliation":[{"name":"Department of Industrial Communication &#x0026; Data Research, brown-iposs GmbH, Bonn, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-0055-4259","authenticated-orcid":false,"given":"Andreas","family":"Grebe","sequence":"additional","affiliation":[{"name":"Institute on Computer and Communication Technology, Technische Hochschule K&#x00F6;ln, Cologne, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3721-370X","authenticated-orcid":false,"given":"Michael","family":"Rademacher","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Hochschule Bonn-Rhein-Sieg, Sankt Augustin, Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3073272"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900316"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.092810.091092"},{"key":"ref4","article-title":"Artificial intelligence in 3GPP 5G-advanced: A survey","volume-title":"Global Commun.","author":"Lin"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3210254"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2017.2758370"},{"key":"ref7","volume-title":"O-RAN: Towards an Open and Smart RAN, O-Ran Alliance","year":"2018"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2690823"},{"key":"ref9","article-title":"Network functions virtualization\u2014Network operator perspectives on NFV priorities for 5G","volume-title":"ETSI","year":"2017"},{"key":"ref10","article-title":"Open RAN: Evolution of architecture, deployment aspects, and future directions","author":"Thiruvasagam","year":"2023","journal-title":"arXiv:2301.06713"},{"key":"ref11","article-title":"Open\u2019 telecom networks (open RAN): Towards the reconfiguration of international relations","year":"2022"},{"key":"ref12","article-title":"Open or not open: Are conventional radio access networks more secure and trustworthy than open-RAN?","author":"Klement","year":"2022","journal-title":"arXiv:2204.12227"},{"key":"ref13","article-title":"Current state of open RAN","year":"2022"},{"issue":"3","key":"ref14","doi-asserted-by":"crossref","first-page":"1038","DOI":"10.3390\/s24031038","article-title":"A survey on open radio access networks: Challenges, research directions, and open source approaches","volume":"24","author":"Azariah","year":"2024","journal-title":"Sensors"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3239220"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2022.3146618"},{"key":"ref17","volume-title":"Open RAN Risk Analysis","year":"2022"},{"key":"ref18","volume-title":"Open Radio Access Network Security Considerations","year":"2022"},{"key":"ref19","volume-title":"Report on the Cybersecurity of Open RAN","year":"2022"},{"key":"ref20","article-title":"Open RAN Security Report","volume-title":"Quad Crit. Emerg. Technol. Working Group","year":"2023"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2023.103621","article-title":"Open RAN security: Challenges and opportunities","volume":"214","author":"Liyanage","year":"2023","journal-title":"J. Netw. Comput. Appl."},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.108.2100659"},{"key":"ref23","article-title":"Prototyping next-generation O-RAN research testbeds with SDRs","author":"Upadhyaya","year":"2022","journal-title":"arXiv:2205.13178"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/wcnc51071.2022.9771908"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/s21248173"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS54207.2022.9789832"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/iciss55894.2022.9915221"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3477086.3480842"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM52596.2021.9653140"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10001458"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3570361.3615737"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796985"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2024.3399924"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLCN59089.2024.10625184"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2023.09.116"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2023.3336187"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9838678"},{"key":"ref38","article-title":"The O-RAN Whitepaper 2023\u2014Energy Efficiency in O-RAN","volume-title":"O-RAN Alliance","author":"Dryja\u0144ski","year":"2023"},{"key":"ref39","article-title":"Accelerating 5G virtual RAN deployment","year":"2020"},{"key":"ref40","article-title":"5G open RAN ecosystem Whitepaper","volume-title":"NTT Docomo","year":"2021"},{"key":"ref41","article-title":"Open RAN security white paper","volume-title":"Deutsche Telekom","year":"2022"},{"key":"ref42","volume-title":"The O-RAN Whitepaper 2021\u2014Rimedo labs","author":"Dryjanski","year":"2021"},{"key":"ref43","volume-title":"Transformation and 5G O-RAN\u2014VMWare","author":"Nolle","year":"2021"},{"key":"ref44","volume-title":"Dell technologies, VMware, and Mavenir 5G O-RAN reference architecture","year":"2021"},{"key":"ref45","volume-title":"O-RAN: An open ecosystem to power 5G applications","year":"2021"},{"key":"ref46","volume-title":"OpenRAN RAN intelligence and automation","year":"2021"},{"key":"ref47","author":"Brown","year":"2020","journal-title":"TIP OpenRAN: Toward disaggregated mobile networking"},{"key":"ref48","volume-title":"Security in open RAN","year":"2021"},{"key":"ref49","article-title":"Security considerations of open RAN","volume-title":"Ericsson","author":"Boswell","year":"2021"},{"key":"ref50","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-58197-8","author":"Lin","year":"2021","journal-title":"5G and Beyond: Fundamentals and Standards"},{"key":"ref51","volume-title":"Everything you need to know about open RAN","year":"2020"},{"key":"ref52","volume-title":"xRAN forum merges with C-RAN alliance to form ORAN alliance","year":"2018"},{"key":"ref53","author":"Weissberger","year":"2020","journal-title":"TIP OpenRAN and O-RAN alliance: Liaison and collaboration for open radio access networks"},{"key":"ref54","article-title":"O-RAN empowering vertical industry: Scenarios, solutions and best practice white paper","volume-title":"O-RAN Alliance e.V.","year":"2023"},{"key":"ref55","article-title":"The O-RAN Whitepaper 2022\u2014RAN intelligent controller","volume-title":"Rimedo Labs","year":"2022"},{"key":"ref56","article-title":"NG-RAN; architecture description","volume-title":"3GPP","year":"2022"},{"key":"ref57","article-title":"5G functional splits","year":"2022","journal-title":"Parallel Wireless"},{"issue":"1","key":"ref58","doi-asserted-by":"crossref","first-page":"408","DOI":"10.3390\/app12010408","article-title":"Open RAN\u2014Radio access network evolution, benefits and market trends","volume":"12","author":"Wypi\u00f3r","year":"2022","journal-title":"Appl. Sci."},{"key":"ref59","article-title":"Technical specification group radio access network\u2014Study on new radio access technology","volume-title":"Radio access architecture and interfaces (release 14)","year":"2017"},{"key":"ref60","year":"2022","journal-title":"O-RAN Software Community: O-RAN architecture"},{"key":"ref61","article-title":"O-RAN control, user and synchronization plane specification 13.0","volume-title":"WG4: Open Fronthaul Interfaces Workgroup","year":"2023"},{"key":"ref62","article-title":"O-RAN architecture description 10.0","volume-title":"O-RAN Alliance","year":"2023"},{"key":"ref63","article-title":"O-RAN cloud architecture and deployment scenarios for O-RAN virtualized RAN 5.0","volume-title":"WG6: Cloudification and Orchestration Workgroup","year":"2023"},{"key":"ref64","article-title":"O-RAN operations and maintenance architecture 10.0","volume-title":"O-RAN Alliance","year":"2023"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.52953\/GJII3746"},{"key":"ref66","article-title":"O-RAN non-RT RIC architecture 4.0","volume-title":"O-RAN Working Group 2, O-RAN Alliance","year":"2023"},{"key":"ref67","article-title":"An intelligent platform: The use of O-RAN\u2019s SMO as the enabler for openness and innovation in the RAN domain","volume-title":"Ericsson","year":"2021"},{"key":"ref68","article-title":"O-RAN near-RT RIC architecture 5.0","volume-title":"WG3: Near-real-time RIC and E2 Interface Workgroup","year":"2023"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2023.3336190"},{"key":"ref70","article-title":"O-RAN control, user and Synchronization plane specification 14.0: WG4: Open Fronthaul interfaces workgroup","year":"2023"},{"key":"ref71","article-title":"O-RAN management plane specification 14.0: WG4: Open fronthaul interfaces workgroup","year":"2024"},{"key":"ref72","volume-title":"NR; Packet Data Convergence Protocol (PDCP)","year":"2021"},{"key":"ref73","volume-title":"IEEE Standard for Local and Metropolitan Area Networks\u2013Port-Based Network Access Control","year":"2020"},{"key":"ref74","volume-title":"Network configuration protocol (NETCONF)","year":"2011"},{"key":"ref75","article-title":"The secure shell (SSH) authentication protocol","author":"Ylonen","year":"2006","journal-title":"IETF"},{"key":"ref76","article-title":"O-RAN working group 2 (non-RT RIC and A1 interface WG) A1 interface: General aspects and principles","volume-title":"WG2: Non-real-time RAN intelligent controller and A1 interface workgroup, O-RAN Alliance","year":"2023"},{"key":"ref77","article-title":"The OAuth 2.0 authorization framework","author":"Hardt","year":"2012","journal-title":"IETF"},{"key":"ref78","article-title":"O-RAN security protocols specifications 7.0","volume-title":"WG11: Security Work Group","year":"2023"},{"key":"ref79","article-title":"O-RAN E2 general aspects and principles (E2GAP) 4.01","volume-title":"WG3: Near-real-time RIC and E2 interface workgroup","year":"2023"},{"key":"ref80","article-title":"O-RAN E2 service model (E2SM) 4.0","volume-title":"WG3: Near-real-time RIC and E2 interface workgroup3","year":"2023"},{"key":"ref81","article-title":"WG3: Near-real-time RIC and E2 interface workgroup","volume-title":"O-RAN E2 service model (E2SM) KPM 4.0","year":"2023"},{"key":"ref82","article-title":"O-RAN E2 service model (E2SM), RAN control 4.0","volume-title":"WG3: Near-real-time RIC and E2 Interface Workgroup","year":"2023"},{"key":"ref83","article-title":"O-RAN E2 service model (E2SM) cell configuration and control 2.0","volume-title":"WG3: Near-real-time RIC and E2 Interface Workgroup","year":"2023"},{"key":"ref84","author":"Seo","year":"2005","journal-title":"Security architecture for the internet protocol"},{"key":"ref85","article-title":"O-RAN operations and maintenance interface specification 11.0","volume-title":"O-RAN Alliance","year":"2023"},{"key":"ref86","volume-title":"Network configuration access control model","year":"2018"},{"key":"ref87","article-title":"O-RAN O2 interface general aspects and principles 5.0","volume-title":"O-RAN Working Group 6","year":"2023"},{"key":"ref88","article-title":"O-RAN R1 interface: General aspects and principles 7.0","volume-title":"O-RAN Working Group 2","year":"2023"},{"key":"ref89","volume-title":"O-RAN use cases analysis report 13.0: WG1: Use cases and overall architecture workgroup","year":"2024"},{"key":"ref90","article-title":"O-RAN use cases detailed specification 13.0: WG1: Use cases and overall architecture workgroup","volume-title":"O-RAN Alliance","year":"2024"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3367289"},{"key":"ref92","volume-title":"O-RAN Security Threat Modeling and Remediation Analysis 6.0, O-RAN Alliance","year":"2023"},{"key":"ref93","volume-title":"O-RAN security test specifications 5.0: WG11: Security work group","year":"2023"},{"key":"ref94","volume-title":"O-RAN security requirements and controls specification 7.0: WG11: Security work group","year":"2023"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3274487"},{"key":"ref96","article-title":"Zero trust architecture for evolving radio access networks","volume-title":"Ericsson","year":"2023"},{"key":"ref97","volume-title":"Security considerations of open RAN","year":"2020"},{"key":"ref98","article-title":"Threat Analysis of Container-as-a-Service for Network Function Virtualization","volume-title":"Fraunhofer Institute for Applied and Integrated Security (AISEC)","year":"2024"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-190"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-52683-2_2"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179304"},{"key":"ref102","volume-title":"Study on 5G Security Enhancement Against False Base Stations (FBS)","year":"2021"},{"issue":"1","key":"ref103","doi-asserted-by":"crossref","first-page":"23","DOI":"10.3390\/jcp4010002","article-title":"Security vulnerabilities in 5G non-stand-alone networks: A systematic analysis and attack taxonomy","volume":"4","author":"Wani","year":"2024","journal-title":"J. Cybersecurity Privacy"},{"key":"ref104","first-page":"55","article-title":"Hiding in plain signal: Physical signal overshadowing attack on LTE","volume-title":"Proc. 28th USENIX Security Symp. (USENIX Security)","author":"Yang"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/3495243.3560525"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1145\/3558482.3581774"},{"key":"ref107","first-page":"1","article-title":"LTEInspector: A systematic approach for adversarial testing of 4G LTE","volume-title":"Netw. Distrib. System Security Symp","author":"Hussain"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326082"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00006"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3319728"},{"key":"ref111","article-title":"LTE monitoring","volume-title":"M.S. thesis, ETH Z\u00fcrich","author":"Kotuliak","year":"2020"},{"key":"ref112","first-page":"73","article-title":"Call me maybe: Eavesdropping encrypted LTE calls with ReVoLTE","volume-title":"Proc. USENIX Security Symp","author":"Rupprecht"},{"key":"ref113","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1016\/j.patcog.2018.07.023","article-title":"Wild patterns: Ten years after the rise of adversarial machine learning","volume":"84","author":"Biggio","year":"2018","journal-title":"Pattern Recognit."},{"key":"ref114","article-title":"Adversarial machine learning: A taxonomy and terminology of attacks and mitigations","year":"2023"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM54140.2023.10437125"},{"key":"ref116","article-title":"Adversarial machine learning threat analysis and Remediation in open radio access network (O-RAN)","author":"Habler","year":"2023","journal-title":"arXiv:2201.06093"},{"key":"ref117","article-title":"Study on security for near real time RIC and xApps","volume-title":"WG11: Security Work Group","year":"2023"}],"container-title":["IEEE Open Journal of the Communications Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8782661\/10829557\/10601697.pdf?arnumber=10601697","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T17:44:23Z","timestamp":1744911863000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10601697\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":117,"URL":"https:\/\/doi.org\/10.1109\/ojcoms.2024.3430823","relation":{},"ISSN":["2644-125X"],"issn-type":[{"value":"2644-125X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}