{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:10:14Z","timestamp":1766067014871,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,26]]},"DOI":"10.1145\/3339252.3341484","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Securing Ethernet-based Optical Fronthaul for 5G Network"],"prefix":"10.1145","author":[{"given":"Joo Yeon","family":"Cho","sequence":"first","affiliation":[{"name":"ADVA Optical Networking SE, Martinsried, Germany"}]},{"given":"Andrew","family":"Sergeev","sequence":"additional","affiliation":[{"name":"ADVA Optical Networking Israel Ltd., Ra'anana, Israel"}]},{"given":"Jim","family":"Zou","sequence":"additional","affiliation":[{"name":"ADVA Optical Networking SE, Meiningen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"3GPP. 2017. Study on the security aspects of the next generation system (Release 14). TR 33.899 V1.3.0.  3GPP. 2017. Study on the security aspects of the next generation system (Release 14). TR 33.899 V1.3.0."},{"key":"e_1_3_2_1_2_1","unstructured":"3GPP. 2019. 3G security; Network Domain Security (NDS); IP network layer security (Release 16). TS 33.210 V16.1.0.  3GPP. 2019. 3G security; Network Domain Security (NDS); IP network layer security (Release 16). TS 33.210 V16.1.0."},{"volume-title":"European Conference on Networks and Communications (EuCNC","year":"2018","author":"Bj\u00f8rnstad S.","key":"e_1_3_2_1_3_1"},{"volume-title":"{n.d.}. Handling Delay in 5G Ethernet Mobile Fronthaul Networks. EuCNC","year":"2018","author":"Bj\u00f8rnstad S.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"L. Chen S. Jordan Y Liu D. Moody R. Peralta R. Perlner and D. Smith-Tone. 2016. Report on Post-Quantum Cryptography. NISTIR 8105.  L. Chen S. Jordan Y Liu D. Moody R. Peralta R. Perlner and D. Smith-Tone. 2016. Report on Post-Quantum Cryptography. NISTIR 8105.","DOI":"10.6028\/NIST.IR.8105"},{"key":"e_1_3_2_1_6_1","unstructured":"CPRI. 2018. Common Public Radio Interface eCPRI Interface Specification. V1.2.  CPRI. 2018. Common Public Radio Interface eCPRI Interface Specification. V1.2."},{"key":"e_1_3_2_1_7_1","unstructured":"J. Donenfeld. {n.d.}. WireGuard: Next Generation Kernel Network Tunnel. https:\/\/www.wireguard.com\/papers\/wireguard.pdf.  J. Donenfeld. {n.d.}. WireGuard: Next Generation Kernel Network Tunnel. https:\/\/www.wireguard.com\/papers\/wireguard.pdf."},{"key":"e_1_3_2_1_8_1","unstructured":"DPDK. {n.d.}. Data Plane Development Kit. https:\/\/www.dpdk.org.  DPDK. {n.d.}. Data Plane Development Kit. https:\/\/www.dpdk.org."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2017.2782358"},{"key":"e_1_3_2_1_10_1","unstructured":"T. H\u00f8iland-J\u00f8rgensen J. Brouer D. Borkmann J. Fastabend T. Herbert D. Ahern and D. Miller. {n.d.}. The eXpress Data Path: Fast Programmable Packet Processing in the Operating System Kernel. https:\/\/github.com\/xdp-project\/xdp-paper\/blob\/master\/xdp-the-express-data-path.pdf.  T. H\u00f8iland-J\u00f8rgensen J. Brouer D. Borkmann J. Fastabend T. Herbert D. Ahern and D. Miller. {n.d.}. The eXpress Data Path: Fast Programmable Packet Processing in the Operating System Kernel. https:\/\/github.com\/xdp-project\/xdp-paper\/blob\/master\/xdp-the-express-data-path.pdf."},{"volume-title":"Precision clock synchronization protocol for networked measurement & control systems","year":"2008","author":"EE.","key":"e_1_3_2_1_11_1"},{"volume-title":"Standard for local and metropolitan area network -- port-based network access control","year":"2010","author":"EE.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"C. Kaufman P. Hoffman Y. Nir P. Eronen and T. Kivinen. 2014. The Internet Key Exchange Protocol Version 2 (IKEv2). IETF RFC 7296.  C. Kaufman P. Hoffman Y. Nir P. Eronen and T. Kivinen. 2014. The Internet Key Exchange Protocol Version 2 (IKEv2). IETF RFC 7296.","DOI":"10.17487\/rfc7296"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/3242181.3242279"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"A. Langley M. Hamburg and S. Turner. 2016. Elliptic Curves for Security. IETF RFC 7748.  A. Langley M. Hamburg and S. Turner. 2016. Elliptic Curves for Security. IETF RFC 7748.","DOI":"10.17487\/RFC7748"},{"volume-title":"IEEE European Symposium on Security and Privacy (EuroS&P'19)","author":"Lipp B.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","unstructured":"A. Luykx and K. Paterson. 2017. Limits on Authenticated Encryption Use in TLS - Information Security. http:\/\/www.isg.rhul.ac.uk\/~kp\/TLS-AEbounds.pdf.  A. Luykx and K. Paterson. 2017. Limits on Authenticated Encryption Use in TLS - Information Security. http:\/\/www.isg.rhul.ac.uk\/~kp\/TLS-AEbounds.pdf."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Y. Nir and A. Langley. 2018. ChaCha20 and Poly1305 for IETF Protocols. https:\/\/tools.ietf.org\/html\/rfc8439.  Y. Nir and A. Langley. 2018. ChaCha20 and Poly1305 for IETF Protocols. https:\/\/tools.ietf.org\/html\/rfc8439.","DOI":"10.17487\/RFC8439"},{"key":"e_1_3_2_1_19_1","unstructured":"IO Visor Project. {n.d.}. XDP: eXpress Data Path. https:\/\/www.iovisor.org\/technology\/xdp.  IO Visor Project. {n.d.}. XDP: eXpress Data Path. https:\/\/www.iovisor.org\/technology\/xdp."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"S. Santesson M. Myers R. Ankney A. Malpani S. Galperin and C. Adams. 2013. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP. https:\/\/tools.ietf.org\/html\/rfc6960.  S. Santesson M. Myers R. Ankney A. Malpani S. Galperin and C. Adams. 2013. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP. https:\/\/tools.ietf.org\/html\/rfc6960.","DOI":"10.17487\/rfc6960"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2004.1494884"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"e_1_3_2_1_23_1","unstructured":"H. J. Son and S.M. Shin. {n.d.}. Fronthaul Size: Calculation of maximum distance between RRH and BBU. https:\/\/www.netmanias.com\/en\/post\/blog\/6276\/c-ran-fronthaul-lte\/fronthaul-size-calculation-of-maximum-distance-between-rrh-and-bbu.  H. J. Son and S.M. Shin. {n.d.}. Fronthaul Size: Calculation of maximum distance between RRH and BBU. https:\/\/www.netmanias.com\/en\/post\/blog\/6276\/c-ran-fronthaul-lte\/fronthaul-size-calculation-of-maximum-distance-between-rrh-and-bbu."},{"key":"e_1_3_2_1_24_1","unstructured":"C. Wood T. Enghardt T. Pauly C. Perkins and K. Rose. 2019. A Survey of Transport Security Protocols. draft-ietf-taps-transport-security.  C. Wood T. Enghardt T. Pauly C. Perkins and K. Rose. 2019. A Survey of Transport Security Protocols. draft-ietf-taps-transport-security."}],"event":{"name":"ARES '19: 14th International Conference on Availability, Reliability and Security","acronym":"ARES '19","location":"Canterbury CA United Kingdom"},"container-title":["Proceedings of the 14th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3341484","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3339252.3341484","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:29Z","timestamp":1750204469000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3341484"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":24,"alternative-id":["10.1145\/3339252.3341484","10.1145\/3339252"],"URL":"https:\/\/doi.org\/10.1145\/3339252.3341484","relation":{},"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"2019-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}