{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T10:28:54Z","timestamp":1770546534754,"version":"3.49.0"},"reference-count":47,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T00:00:00Z","timestamp":1767916800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["25KJ2239"],"award-info":[{"award-number":["25KJ2239"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of High Speed Networks"],"published-print":{"date-parts":[[2026,2]]},"abstract":"<jats:p>Trust evaluation for fifth generation (5G) and beyond 5G (B5G) network slicing has become increasingly critical due to the complexity of multi-tenant orchestration, dynamic resource allocation, and strict quality of service (QoS) requirements. However, conventional trust evaluation methods cannot capture the uncertainty coming from measurement noise, linguistic ambiguity, and dynamic network conditions. In this paper, we propose a fuzzy-based system for slice trust evaluation (FSSTE) designed for 5G\/B5G network slicing environments. We implement two models: FSSTEM1 and FSSTEM2. FSSTEM1 considers three input parameters: QoS, security posture (SP), and isolation integrity (II), while FSSTEM2 extends this framework by incorporating resource reliability (RR) as a fourth parameter. Both models use interval type-2 fuzzy logic system to decide the slice trust (ST) output value. We evaluated the implemented models by simulations and found that when QoS, SP, II, and RR values increase, the ST value increases consistently. For FSSTEM1, when all parameters reach 0.9, the ST value is 0.868, which is suitable for mission-critical applications. For FSSTEM2, the RR provides 21% trust improvement under poor QoS conditions, which is suitable for safety-critical deployments. Parameter sensitivity analysis for FSSTEM1 shows that QoS and II have the same impact on ST (0.251). While SP has a stronger impact (0.257) compared with QoS and II. For FSSTEM2, the higher maximum footprint uncertainty of FSSTEM2 (0.249 vs. 0.190) suggests that four-parameters assessment involves greater uncertainty. FSSTEM2 is more complex than FSSTEM1 but provides better trust evaluation, especially in dynamic multi-tenant environments where RR changes.<\/jats:p>","DOI":"10.1177\/09266801251408613","type":"journal-article","created":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T18:57:31Z","timestamp":1767985051000},"page":"37-59","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["Design and performance comparison of two implemented trust evaluation models for fifth generation (5G) and beyond 5G (B5G) network slicing using an interval type-2 fuzzy logic system"],"prefix":"10.1177","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-3002-9607","authenticated-orcid":false,"given":"Shunya","family":"Higashi","sequence":"first","affiliation":[{"name":"Fukuoka Institute of Technology"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-8965-8024","authenticated-orcid":false,"given":"Paboth","family":"Kraikritayakul","sequence":"additional","affiliation":[{"name":"Fukuoka Institute of Technology"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-3518-9517","authenticated-orcid":false,"given":"Yi","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Fukuoka Institute of Technology, Wajiro-Higashi, Higashi-Ku, Fukuoka 811-0295, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0445-0167","authenticated-orcid":false,"given":"Makoto","family":"Ikeda","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Fukuoka Institute of Technology, Wajiro-Higashi, Higashi-Ku, Fukuoka 811-0295, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0344-3160","authenticated-orcid":false,"given":"Keita","family":"Matsuo","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Fukuoka Institute of Technology, Wajiro-Higashi, Higashi-Ku, Fukuoka 811-0295, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9069-0460","authenticated-orcid":false,"given":"Leonard","family":"Barolli","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Fukuoka Institute of Technology, Wajiro-Higashi, Higashi-Ku, Fukuoka 811-0295, Japan"}]}],"member":"179","published-online":{"date-parts":[[2026,1,9]]},"reference":[{"key":"e_1_3_3_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3410295"},{"key":"e_1_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2022.08.017"},{"key":"e_1_3_3_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600951"},{"key":"e_1_3_3_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2815638"},{"key":"e_1_3_3_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3312349"},{"key":"e_1_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.3390\/s25133940"},{"key":"e_1_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13101860"},{"key":"e_1_3_3_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2997702"},{"key":"e_1_3_3_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000508"},{"key":"e_1_3_3_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/3572717"},{"key":"e_1_3_3_12_2","first-page":"2568","article-title":"SLA-driven trust and reputation management framework for 5G distributed service marketplaces","volume":"21","author":"Theodorou V","year":"2024","unstructured":"Theodorou V, S\u00e1nchez S\u00e1nchez PM, Jorquera Valero JM, et\u00a0al. SLA-driven trust and reputation management framework for 5G distributed service marketplaces. IEEE Trans Dependable Secure Comput 2024; 21: 2568\u20132583.","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"e_1_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13153013"},{"key":"e_1_3_3_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2006.879986"},{"key":"e_1_3_3_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3019286"},{"key":"e_1_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/2815595"},{"key":"e_1_3_3_17_2","doi-asserted-by":"publisher","DOI":"10.3390\/s25113335"},{"key":"e_1_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2019.2901402"},{"key":"e_1_3_3_19_2","doi-asserted-by":"crossref","unstructured":"Vittal S Dixit U Sovitkar SP et al. Preventing cross network slice disruptions in a zero-trust and multi-tenant future 5G networks. In: IEEE 9th international conference on network softwarization (NetSoft) Madrid Spain 19\u201323 June 2023 pp.227\u2013231. IEEE. DOI: https:\/\/doi.org\/10.1109\/NetSoft57336.2023.10175424.","DOI":"10.1109\/NetSoft57336.2023.10175424"},{"key":"e_1_3_3_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2023.09.010"},{"key":"e_1_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3328950"},{"key":"e_1_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/s43926-025-00161-1"},{"key":"e_1_3_3_23_2","doi-asserted-by":"publisher","DOI":"10.3390\/s22083031"},{"key":"e_1_3_3_24_2","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-021-02037-8"},{"key":"e_1_3_3_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2019.2915117"},{"key":"e_1_3_3_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000112"},{"key":"e_1_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.3390\/s22166068"},{"key":"e_1_3_3_28_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13050974"},{"key":"e_1_3_3_29_2","doi-asserted-by":"publisher","DOI":"10.3390\/math13091501"},{"key":"e_1_3_3_30_2","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-024-00212-0"},{"key":"e_1_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.3390\/s24041328"},{"key":"e_1_3_3_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2025.101528"},{"key":"e_1_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.3390\/s22010009"},{"key":"e_1_3_3_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.003.2100672"},{"key":"e_1_3_3_35_2","first-page":"808","article-title":"Interval type-2 fuzzy logic systems: theory and design","volume":"8","author":"Liang Q","year":"2000","unstructured":"Liang Q, Mendel JM. Interval type-2 fuzzy logic systems: theory and design. IEEE Trans Fuzzy Syst 2000; 8: 808\u2013821.","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"e_1_3_3_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2740219"},{"key":"e_1_3_3_37_2","doi-asserted-by":"publisher","DOI":"10.3390\/network2010011"},{"key":"e_1_3_3_38_2","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-018-0072-0"},{"key":"e_1_3_3_39_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-025-09958-5"},{"key":"e_1_3_3_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2008.924329"},{"key":"e_1_3_3_41_2","doi-asserted-by":"crossref","unstructured":"Inaba T Sakamoto S Oda T et al. A new FACS for cellular wireless networks considering QoS: a comparison study of FuzzyC with Matlab. In: 2015 18th international conference on network-based information systems Tamkang University Taipei Taiwan 2\u20134 September 2015 pp.338\u2013344. IEEE. DOI: https:\/\/doi.org\/10.1109\/NBiS.2015.52.","DOI":"10.1109\/NBiS.2015.52"},{"key":"e_1_3_3_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2023.3244274"},{"key":"e_1_3_3_43_2","doi-asserted-by":"crossref","unstructured":"Higashi S Ampririt P Qafzezi E et al. Performance evaluation of a fuzzy trust system for network slicing in 5G\/B5G wireless networks. In: International conference on complex intelligent and software intensive systems (CISIS-2025) Fukuoka Institute of Technology Fukuoka Japan 2\u20134 July 2025 pp.231\u2013242.Springer. DOI: https:\/\/doi.org\/10.1007\/978-3-031-96099-4_22.","DOI":"10.1007\/978-3-031-96099-4_22"},{"key":"e_1_3_3_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2024.3387429"},{"key":"e_1_3_3_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2020.3018379"},{"key":"e_1_3_3_46_2","doi-asserted-by":"crossref","unstructured":"Niu B You W Tang H et al. 5G network slice security trust degree calculation model. In: Proceedings of the third IEEE international conference on computer and communications (ICCC) Nagoya Japan 27\u201330 April 2018 pp. 1150\u20131157. IEEE. DOI: https:\/\/doi.org\/10.1109\/CompComm.2017.8322724.","DOI":"10.1109\/CompComm.2017.8322724"},{"key":"e_1_3_3_47_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-75414-0"},{"key":"e_1_3_3_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2006.889763"}],"container-title":["Journal of High Speed Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/09266801251408613","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/09266801251408613","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/09266801251408613","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T10:16:21Z","timestamp":1770459381000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/09266801251408613"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,9]]},"references-count":47,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["10.1177\/09266801251408613"],"URL":"https:\/\/doi.org\/10.1177\/09266801251408613","relation":{},"ISSN":["0926-6801","1875-8940"],"issn-type":[{"value":"0926-6801","type":"print"},{"value":"1875-8940","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,9]]}}}