{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T12:44:08Z","timestamp":1768394648032,"version":"3.49.0"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100020950","name":"National Science and Technology Council (NSTC), Taiwan","doi-asserted-by":"publisher","award":["113-2221-E-011-156-MY3"],"award-info":[{"award-number":["113-2221-E-011-156-MY3"]}],"id":[{"id":"10.13039\/501100020950","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100020950","name":"National Science and Technology Council (NSTC), Taiwan","doi-asserted-by":"publisher","award":["113-2221-E-011-157-MY3"],"award-info":[{"award-number":["113-2221-E-011-157-MY3"]}],"id":[{"id":"10.13039\/501100020950","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Commun. Soc."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/ojcoms.2025.3649885","type":"journal-article","created":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T18:46:44Z","timestamp":1767206804000},"page":"407-420","source":"Crossref","is-referenced-by-count":0,"title":["Conformance Testing of F1AP Protocol in 5G O-RAN"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1771-2261","authenticated-orcid":false,"given":"Cheng-Feng","family":"Hung","sequence":"first","affiliation":[{"name":"Cybersecurity Research Institute, National Institute of Information and Communications Technology, Koganei, Tokyo, Japan"}]},{"given":"Shih-Hsiung","family":"Chang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology, Taipei City, Taiwan"}]},{"given":"Tsung-Yen","family":"Hsieh","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology, Taipei City, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9796-0643","authenticated-orcid":false,"given":"Shin-Ming","family":"Cheng","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology, Taipei City, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9616-3212","authenticated-orcid":false,"given":"Tao","family":"Ban","sequence":"additional","affiliation":[{"name":"Cybersecurity Research Institute, National Institute of Information and Communications Technology, Koganei, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6477-7770","authenticated-orcid":false,"given":"Takeshi","family":"Takahashi","sequence":"additional","affiliation":[{"name":"Cybersecurity Research Institute, National Institute of Information and Communications Technology, Koganei, Tokyo, Japan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2016.2532458"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2023.3239220"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.108.2100659"},{"key":"ref4","volume-title":"O-RAN security threat modeling and risk assessment 3.0","year":"2024"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM61039.2024.10773685"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2023.3336180"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/candarw57323.2022.00070"},{"key":"ref8","volume-title":"NG-RAN; F1 signalling transport","year":"2024"},{"key":"ref9","volume-title":"Security architecture and procedures for 5G System","year":"2024"},{"key":"ref10","volume-title":"NG-RAN; F1 application protocol (F1AP)","year":"2024"},{"key":"ref11","volume-title":"O-RAN architecture description 12.0","year":"2024"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/fnwf58287.2023.10520642"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2023.3320933"},{"key":"ref14","volume-title":"NG-RAN; F1 general aspects and principles","year":"2024"},{"key":"ref15","volume-title":"NG-RAN; F1 layer 1","year":"2024"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3105396"},{"key":"ref17","volume-title":"O-RAN study on certificate management framework 2.0","year":"2024"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/icsc56524.2022.10009237"},{"key":"ref19","volume-title":"O-RAN deployment scenarios and base station classes 4.0","year":"2022"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102890"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103621"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2024.3434419"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/lwc.2022.3227676"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24527"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2024.3359998"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2018.8422227"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2024.3393430"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/secpri.1988.8094"},{"key":"ref29","volume-title":"O-RAN end-to-end test specification 6.0","year":"2024"},{"key":"ref30","volume-title":"NR; radio resource control (RRC); protocol specification","year":"2024"},{"key":"ref31","volume-title":"Non-access-stratum (NAS) protocol for 5G system (5GS); stage 3","year":"2024"},{"key":"ref32","volume-title":"NG-RAN; architecture description","year":"2024"},{"key":"ref33","volume-title":"Security assurance specification (SCAS) for the next generation Node B (gNodeB) network product class","year":"2024"},{"key":"ref34","volume-title":"5G security assurance specification (SCAS); split gNB product classes","year":"2024"},{"key":"ref35","volume-title":"Study on security aspects of the disaggregated gNB architecture","year":"2020"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ojcoms.2024.3364840"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3643833.3656118"},{"key":"ref38","volume-title":"5G security assurance specification (SCAS)","year":"2025"},{"key":"ref39","volume-title":"Catalogue of general security assurance requirements","year":"2025"}],"container-title":["IEEE Open Journal of the Communications Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8782661\/11343983\/11320446.pdf?arnumber=11320446","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T07:31:50Z","timestamp":1768375910000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11320446\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/ojcoms.2025.3649885","relation":{},"ISSN":["2644-125X"],"issn-type":[{"value":"2644-125X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}