{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:04Z","timestamp":1750219804759,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T00:00:00Z","timestamp":1698624000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1827940"],"award-info":[{"award-number":["1827940"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Science Foundation","award":["2232464"],"award-info":[{"award-number":["2232464"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,30]]},"DOI":"10.1145\/3616391.3623427","type":"proceedings-article","created":{"date-parts":[[2023,10,29]],"date-time":"2023-10-29T05:59:26Z","timestamp":1698559166000},"page":"15-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["dNextG: A Zero-Trust Decentralized Mobile Network User Plane"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1806-4294","authenticated-orcid":false,"given":"Ryan W.","family":"West","sequence":"first","affiliation":[{"name":"University of Utah, Salt Lake City, UT, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5148-8278","authenticated-orcid":false,"given":"Jacobus (Kobus)","family":"Van der Merwe","sequence":"additional","affiliation":[{"name":"University of Utah, Salt Lake City, UT, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3498361.3538942"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","unstructured":"Jere Backman Seppo Yrj\u00f6l\u00e4 Kristiina Valtanen and Olli M\u00e4mmel\u00e4. 2017. Blockchain network slice broker in 5G: Slice leasing in factory of the future use case. In 2017 Internet of Things Business Models Users and Networks. 1--8. https:\/\/doi.org\/10.1109\/CTTE.2017.8260929","DOI":"10.1109\/CTTE.2017.8260929"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3390\/computers9010009"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","unstructured":"Joe Breen Andrew Buffmire Jonathon Duerig Kevin Dutt Eric Eide Anneswa Ghosh Mike Hibler David Johnson Sneha Kumar Kasera Earl Lewis Dustin Maas Caleb Martin Alex Orange Neal Patwari Daniel Reading Robert Ricci David Schurig Leigh Stoller Allison Todd Jacobus (Kobus) Van der Merwe Naren Viswanathan Kirk Webb and Gary Wong. 2021. POWDER: Platform for Open Wireless Data-driven Experimental Research. (2021). https:\/\/doi.org\/10.1016\/j.comnet.2021.108281","DOI":"10.1016\/j.comnet.2021.108281"},{"key":"e_1_3_2_1_5_1","first-page":"173","article-title":"Practical byzantine fault tolerance","volume":"99","author":"Castro Miguel","year":"1999","unstructured":"Miguel Castro, Barbara Liskov, et al. 1999. Practical byzantine fault tolerance. In OsDI, Vol. 99. 173--186.","journal-title":"OsDI"},{"key":"e_1_3_2_1_6_1","unstructured":"Federal Communications Commission. 2018. Promoting Investment in the 3550--3700 MHz Band - GN Docket No. 17--258. https:\/\/docs.fcc.gov\/public\/attachments\/FCC-18--149A1.pdf"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800376"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3171984"},{"volume-title":"Zero Trust Networks","author":"Gilman Evan","key":"e_1_3_2_1_9_1","unstructured":"Evan Gilman and Doug Barth. 2017. Zero Trust Networks. O'Reilly Media, Sebastopol, CA."},{"key":"e_1_3_2_1_10_1","unstructured":"Linley Gwennap. 2008. Single-chip control\/data-plane processors. https:\/\/www.linleygroup.com\/uploads\/WP_SCDP.pdf"},{"key":"e_1_3_2_1_11_1","volume-title":"Helium: A Decentralized Wireless Network.","author":"Haleem Amir","year":"2018","unstructured":"Amir Haleem, Andrew Allen, Andrew Thompson, Marc Nijdam, and Rahul Garg. 2018. Helium: A Decentralized Wireless Network. (2018). http:\/\/whitepaper.helium.com\/"},{"key":"e_1_3_2_1_12_1","unstructured":"John Kindervag. 2010. No More Chewy Centers : Introducing The Zero Trust Model Of Information Security. (2010)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2668152.2668154"},{"key":"e_1_3_2_1_14_1","unstructured":"Jinyuan Li and David Mazieres. 2007. Beyond One-third Faulty Replicas in Byzantine Fault Tolerant Systems. (2007)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN.2019.8685867"},{"volume-title":"WSA 2021; 25th International ITG Workshop on Smart Antennas.","author":"Nakkina Sai Shruthi","key":"e_1_3_2_1_16_1","unstructured":"Sai Shruthi Nakkina, Sudhakar Balijepalli, and Chandra R. Murthy. 2021. Performance Benchmarking of the 5G NR PHY on the OAI Codebase and USRP Hardware. In WSA 2021; 25th International ITG Workshop on Smart Antennas."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102693"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.23919\/ETR.2021.9904691"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761664"},{"key":"e_1_3_2_1_20_1","unstructured":"Kapil Raina. 2022. What is Zero Trust Security Principles of the Zero Trust Model. https:\/\/www.crowdstrike.com\/cybersecurity-101\/zero-trust-security\/"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","unstructured":"Scott Rose Oliver Borchert Stu Mitchell and Sean Connelly. [n. d.]. Zero Trust Architecture. https:\/\/doi.org\/10.6028\/NIST.SP.800--207","DOI":"10.6028\/NIST.SP.800--207"},{"key":"e_1_3_2_1_22_1","volume-title":"DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks","author":"Sharma Pradip","year":"2017","unstructured":"Pradip Sharma, Saurabh Singh, Young-Sik Jeong, and Jong Park. 2017. DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks. IEEE Communications Magazine , Vol. 55 (Jan 2017), 78--85."},{"key":"e_1_3_2_1_23_1","first-page":"11","article-title":"Improved PBFT algorithm for high-frequency trading scenarios of alliance blockchain","volume":"12","author":"Tang Song","year":"2022","unstructured":"Song Tang, Zhiqiang Wang, Jian Jiang, Suli Ge, and GaiFang Tan. 2022. Improved PBFT algorithm for high-frequency trading scenarios of alliance blockchain. Scientific Reports, Vol. 12, 11 (Mar 2022), 4426.","journal-title":"Scientific Reports"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1093\/nsr"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOCN.2017.8121598"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2894727"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3115797"}],"event":{"name":"MSWiM '23: Int'l ACM Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Montreal Quebec Canada","acronym":"MSWiM '23"},"container-title":["Proceedings of the 19th ACM International Symposium on QoS and Security for Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3616391.3623427","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3616391.3623427","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3616391.3623427","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3616391.3623427","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:45:31Z","timestamp":1750178731000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3616391.3623427"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,30]]},"references-count":27,"alternative-id":["10.1145\/3616391.3623427","10.1145\/3616391"],"URL":"https:\/\/doi.org\/10.1145\/3616391.3623427","relation":{},"subject":[],"published":{"date-parts":[[2023,10,30]]},"assertion":[{"value":"2023-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}