{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:37Z","timestamp":1750220257532,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,28]],"date-time":"2021-12-28T00:00:00Z","timestamp":1640649600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government (MSIT)","award":["(No.2021-0-00796, Research on Foundational Technologies for 6G Autonomous Security-by-Design to Guarantee Constant Quality of Security)"],"award-info":[{"award-number":["(No.2021-0-00796, Research on Foundational Technologies for 6G Autonomous Security-by-Design to Guarantee Constant Quality of Security)"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,28]]},"DOI":"10.1145\/3491396.3506556","type":"proceedings-article","created":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T23:54:52Z","timestamp":1641599692000},"page":"10-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Security Use-Cases for Countering Threats of CLA and UAV in 6G"],"prefix":"10.1145","author":[{"given":"Kijung","family":"Bong","sequence":"first","affiliation":[{"name":"ICT, University of Science &amp; Technology, Korea"}]},{"given":"Jonghyun","family":"Kim","sequence":"additional","affiliation":[{"name":"Cyber Security Research Division, Electronics and Telecommunications Research Institute, Korea"}]}],"member":"320","published-online":{"date-parts":[[2022,1,7]]},"reference":[{"volume-title":"Technical Specification Group Services and System Aspects","author":"GPP.","key":"e_1_3_2_1_1_1","unstructured":"3 GPP. 2019. Technical Specification Group Services and System Aspects ; Enhancement for Unmanned Aerial Vehicles; Stage 1. TR 22.829. 3GPP. 2019. Technical Specification Group Services and System Aspects; Enhancement for Unmanned Aerial Vehicles; Stage 1. TR 22.829."},{"key":"e_1_3_2_1_2_1","unstructured":"3GPP. 2021. Study on supporting Unmanned Aerial Systems (UAS) connectivity Identification and tracking. TR 23.754.  3GPP. 2021. Study on supporting Unmanned Aerial Systems (UAS) connectivity Identification and tracking. TR 23.754."},{"key":"e_1_3_2_1_3_1","unstructured":"3GPP. 2021. Study on application layer support for Unmanned Aerial Systems (UAS). TR 23.755.  3GPP. 2021. Study on application layer support for Unmanned Aerial Systems (UAS). TR 23.755."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900273"},{"volume-title":"Zero-touch network and Service Management (ZSM)","author":"ETSI.","key":"e_1_3_2_1_5_1","unstructured":"ETSI. 2021. Zero-touch network and Service Management (ZSM) ; Closed-Loop Automation; Part 1: Enablers. GS ZSM 009-1. ETSI. 2021. Zero-touch network and Service Management (ZSM); Closed-Loop Automation; Part 1: Enablers. GS ZSM 009-1."},{"key":"e_1_3_2_1_6_1","volume-title":"4th Revised baseline text for X.5Gsec-guide: Security guidelines for 5G communication system. Study Period","author":"ITU-T SG","year":"2017","unstructured":"ITU-T SG 17. 2021. 4th Revised baseline text for X.5Gsec-guide: Security guidelines for 5G communication system. Study Period 2017 . Contribution 1133 ITU-T SG 17. 2021. 4th Revised baseline text for X.5Gsec-guide: Security guidelines for 5G communication system. Study Period 2017. Contribution 1133"},{"key":"e_1_3_2_1_7_1","unstructured":"M. Mozaffari X. Lin and S. Hayes. 2021. Towards 6G with connected sky: UAVs and beyond. arXiv:2103.01143. [Online]. https:\/\/arxiv.org\/abs\/2103.01143.  M. Mozaffari X. Lin and S. Hayes. 2021. Towards 6G with connected sky: UAVs and beyond. arXiv:2103.01143. [Online]. https:\/\/arxiv.org\/abs\/2103.01143."},{"key":"e_1_3_2_1_8_1","first-page":"3078081","article-title":"The roadmap to 6G security and privacy, IEEE Open","volume":"2021","author":"Porambage P.","year":"2021","unstructured":"P. Porambage , G. G\u00fcr , D.P.M. Osorio , M. Liyanage , A. Gurtov , M. Ylianttila . 2021 . The roadmap to 6G security and privacy, IEEE Open J. Commun. Soc. https:\/\/doi.org\/10.1109\/OJCOMS. 2021 . 3078081 10.1109\/OJCOMS.2021.3078081 P. Porambage, G. G\u00fcr, D.P.M. Osorio, M. Liyanage, A. Gurtov, M. Ylianttila. 2021. The roadmap to 6G security and privacy, IEEE Open J. Commun. Soc. https:\/\/doi.org\/10.1109\/OJCOMS.2021.3078081","journal-title":"J. Commun. Soc. https:\/\/doi.org\/10.1109\/OJCOMS."},{"key":"e_1_3_2_1_9_1","volume-title":"Security and privacy for 6G: A survey on prospective technologies and challenges","author":"Nguyen V.-L.","year":"2021","unstructured":"V.-L. Nguyen , P.-C. Lin , B.-C. Cheng , R.-H. Hwang and Y.-D. Lin . 2021. Security and privacy for 6G: A survey on prospective technologies and challenges , IEEE Communications Survey &Tutorials. https:\/\/doi.org\/10.1109\/COMST. 2021 .3108618 10.1109\/COMST.2021.3108618 V.-L. Nguyen, P.-C. Lin, B.-C. Cheng, R.-H. Hwang and Y.-D. Lin. 2021. Security and privacy for 6G: A survey on prospective technologies and challenges, IEEE Communications Survey&Tutorials. https:\/\/doi.org\/10.1109\/COMST.2021.3108618"}],"event":{"name":"ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Jinan China","acronym":"ACM ICEA '21"},"container-title":["Proceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491396.3506556","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491396.3506556","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:48Z","timestamp":1750188648000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491396.3506556"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,28]]},"references-count":9,"alternative-id":["10.1145\/3491396.3506556","10.1145\/3491396"],"URL":"https:\/\/doi.org\/10.1145\/3491396.3506556","relation":{},"subject":[],"published":{"date-parts":[[2021,12,28]]},"assertion":[{"value":"2022-01-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}