{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T10:27:35Z","timestamp":1777285655140,"version":"3.51.4"},"reference-count":147,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T00:00:00Z","timestamp":1708387200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"University of Nebraska-Lincoln\u2019s Advanced Telecommunications Engineering Laboratory (TEL) and Belcan Government Solutions (BGS)","award":["#TEL-Belcan-5G23"],"award-info":[{"award-number":["#TEL-Belcan-5G23"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>With the rapid rollout and growing adoption of 3GPP 5thGeneration (5G) cellular services, including in critical infrastructure sectors, it is important to review security mechanisms, risks, and potential vulnerabilities within this vital technology. Numerous security capabilities need to work together to ensure and maintain a sufficiently secure 5G environment that places user privacy and security at the forefront. Confidentiality, integrity, and availability are all pillars of a privacy and security framework that define major aspects of 5G operations. They are incorporated and considered in the design of the 5G standard by the 3rd Generation Partnership Project (3GPP) with the goal of providing a highly reliable network operation for all. Through a comprehensive review, we aim to analyze the ever-evolving landscape of 5G, including any potential attack vectors and proposed measures to mitigate or prevent these threats. This paper presents a comprehensive survey of the state-of-the-art research that has been conducted in recent years regarding 5G systems, focusing on the main components in a systematic approach: the Core Network (CN), Radio Access Network (RAN), and User Equipment (UE). Additionally, we investigate the utilization of 5G in time-dependent, ultra-confidential, and private communications built around a Zero Trust approach. In today\u2019s world, where everything is more connected than ever, Zero Trust policies and architectures can be highly valuable in operations containing sensitive data. Realizing a Zero Trust Architecture entails continuous verification of all devices, users, and requests, regardless of their location within the network, and grants permission only to authorized entities. Finally, developments and proposed methods of new 5G and future 6G security approaches, such as Blockchain technology, post-quantum cryptography (PQC), and Artificial Intelligence (AI) schemes, are also discussed to understand better the full landscape of current and future research within this telecommunications domain.<\/jats:p>","DOI":"10.3390\/fi16030067","type":"journal-article","created":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T07:50:26Z","timestamp":1708415426000},"page":"67","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":59,"title":["A Systematic Survey on 5G and 6G Security Considerations, Challenges, Trends, and Research Areas"],"prefix":"10.3390","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-4145-7318","authenticated-orcid":false,"given":"Paul","family":"Scalise","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Nebraska-Lincoln, Lincoln, NE 68588, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4510-8280","authenticated-orcid":false,"given":"Matthew","family":"Boeding","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Nebraska-Lincoln, Lincoln, NE 68588, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7091-8349","authenticated-orcid":false,"given":"Michael","family":"Hempel","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Nebraska-Lincoln, Lincoln, NE 68588, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6229-2043","authenticated-orcid":false,"given":"Hamid","family":"Sharif","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Nebraska-Lincoln, Lincoln, NE 68588, USA"}]},{"given":"Joseph","family":"Delloiacovo","sequence":"additional","affiliation":[{"name":"Belcan Government Solutions (BGS), Bellevue, NE 68123, USA"}]},{"given":"John","family":"Reed","sequence":"additional","affiliation":[{"name":"Belcan Government Solutions (BGS), Bellevue, NE 68123, USA"}]}],"member":"1968","published-online":{"date-parts":[[2024,2,20]]},"reference":[{"key":"ref_1","unstructured":"Vintil\u0103, C.E., Patriciu, V.V., and Bica, I. (2011, January 9\u201313). Security analysis of LTE access network. Proceedings of the 10th International Conference on Network, Valencia, Spain."},{"key":"ref_2","unstructured":"(2023). Security Architecture and Procedures for 5G System (Standard No. TS 33.501). Available online: https:\/\/www.3gpp.org\/ftp\/Specs\/archive\/33_series\/33.501\/."},{"key":"ref_3","unstructured":"(2023). Technical Specification Group Services and System Aspects; 3GPP System Architecture Evoltuion (SAE); Security Architecture, Release 17, V17.4.0 (Standard No. TS 33.401)."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Dutta, A., and Hammad, E. (2020, January 10\u201312). 5G Security Challenges and Opportunities: A System Approach. Proceedings of the 2020 IEEE 3rd 5G World Forum (5GWF), Bangalore, India.","DOI":"10.1109\/5GWF49715.2020.9221122"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1109\/COMST.2019.2951818","article-title":"A Survey on Security Aspects for 3GPP 5G Networks","volume":"22","author":"Cao","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_6","unstructured":"de Castro Nunes Borges, V.O., and Rosa, R.L. (2024, February 16). General Aspects of Information Security in 5G Networks: Survey. Available online: https:\/\/infocomp.dcc.ufla.br\/index.php\/infocomp\/article\/view\/3072."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Sachdeva, T., Kumar, S., Diwakar, M., Singh, P., Pandey, N.K., and Choudhary, S. (2023, January 3\u20134). Comparative Analysis of 5G Security Mechanisms. Proceedings of the 2023 6th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India.","DOI":"10.1109\/ISCON57294.2023.10111963"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"106871","DOI":"10.1016\/j.comnet.2019.106871","article-title":"Towards secure 5G networks: A Survey","volume":"162","author":"Zhang","year":"2019","journal-title":"Comput. Netw."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"15501329221126609","DOI":"10.1177\/15501329221126609","article-title":"Survey on authentication and security protocols and schemes over 5G networks","volume":"18","author":"Tashtoush","year":"2022","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"042","DOI":"10.30574\/gjeta.2023.14.3.0047","article-title":"A taxonomical survey of 5G and 6G security and privacy issues","volume":"14","author":"Ounza","year":"2023","journal-title":"Glob. J. Eng. Technol. Adv."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"109515","DOI":"10.1016\/j.comnet.2022.109515","article-title":"Security and privacy vulnerabilities of 5G\/6G and WiFi 6: Survey and research directions from a coexistence perspective","volume":"221","author":"Ramezanpour","year":"2023","journal-title":"Comput. Netw."},{"key":"ref_12","unstructured":"Park, J.H., Rathore, S., Singh, S.K., Salim, M.M., Azzaoui, A., Kim, T.W., Pan, Y., and Park, J.H. (2021). A comprehensive survey on core technologies and services for 5G security: Taxonomies, issues, and solutions. Hum.-Centric Comput. Inf. Sci., 11."},{"key":"ref_13","first-page":"207","article-title":"Zero trust architecture","volume":"800","author":"Stafford","year":"2020","journal-title":"Nist Spec. Publ."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"109358","DOI":"10.1016\/j.comnet.2022.109358","article-title":"Intelligent zero trust architecture for 5G\/6G networks: Principles, challenges, and the role of machine learning in the context of O-RAN","volume":"217","author":"Ramezanpour","year":"2022","journal-title":"Comput. Netw."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"2665","DOI":"10.1016\/j.procs.2020.04.289","article-title":"5G for Military Communications","volume":"171","author":"Bhardwaj","year":"2020","journal-title":"Procedia Comput. Sci."},{"key":"ref_16","unstructured":"Marsh, S.P. (2024, February 16). Formalising Trust as a Computational Concept. Available online: https:\/\/www.cs.stir.ac.uk\/~kjt\/techreps\/pdf\/TR133.pdf."},{"key":"ref_17","unstructured":"Sultan, A. (2022). 5G System Overview, 3GPP."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1109\/COMST.2019.2933899","article-title":"A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions","volume":"22","author":"Khan","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Prasad, A.R., Zugenmaier, A., Escott, A., and Soveri, M.C. (2018). 3GPP 5G Security, 3GPP.","DOI":"10.13052\/jicts2245-800X.619"},{"key":"ref_20","unstructured":"Ben Henda, N., Wifvesson, M., and Jost, C. (2024, February 16). An Overview of the 3GPP 5G Security Standard-Ericsson. Available online: https:\/\/www.ericsson.com\/en\/blog\/2019\/7\/3gpp-5g-security-overview."},{"key":"ref_21","unstructured":"(2023). Technical Specification Group Services and System Aspects; Security Architecture and Procedures for 5G System Release 18, V18.2.0 (Standard No. TS 33.501)."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"108373","DOI":"10.1016\/j.comnet.2021.108373","article-title":"An enhanced symmetric-key based 5G-AKA protocol","volume":"198","author":"Munilla","year":"2021","journal-title":"Comput. Netw."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Koutsos, A. (2019, January 17\u201319). The 5G-AKA authentication protocol privacy. Proceedings of the 2019 IEEE European Symposium on Security and Privacy (EuroS&P), Stockholm, Sweden.","DOI":"10.1109\/EuroSP.2019.00041"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Basin, D., Dreier, J., Hirschi, L., Radomirovic, S., Sasse, R., and Stettler, V. (2018, January 15\u201319). A Formal Analysis of 5G Authentication. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security CCS \u201918, New York, NY, USA.","DOI":"10.1145\/3243734.3243846"},{"key":"ref_25","first-page":"102537","article-title":"A survey of subscription privacy on the 5G radio interface-the past, present and future","volume":"53","author":"Khan","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Edris, E.K.K., Aiash, M., and Loo, J.K.K. (2020, January 20\u201323). Formal verification and analysis of primary authentication based on 5G-AKA protocol. Proceedings of the 2020 Seventh International Conference on Software Defined Systems (SDS), Paris, France.","DOI":"10.1109\/SDS49854.2020.9143899"},{"key":"ref_27","unstructured":"Nair, S. (2022). Authentication and Key Management for Applications (AKMA) in 5G, 3GPP."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Vidhani, S.M., and Vidhate, A.V. (2022, January 2\u20133). Security Challenges in 5G Network: A technical features survey and analysis. Proceedings of the 2022 5th International Conference on Advances in Science and Technology (ICAST), Mumbai, India.","DOI":"10.1109\/ICAST55766.2022.10039654"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"081301","DOI":"10.1007\/s11432-017-9426-4","article-title":"Overview of 5G security technology","volume":"61","author":"Ji","year":"2018","journal-title":"Sci. China Inf. Sci."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Scott-Hayward, S., O\u2019Callaghan, G., and Sezer, S. (2013, January 11\u201313). SDN security: A survey. Proceedings of the 2013 IEEE SDN For Future Networks and Services (SDN4FNS), Trento, Italy.","DOI":"10.1109\/SDN4FNS.2013.6702553"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Kloeti, R., Kotronis, V., and Smith, P. (2013, January 7\u201310). OpenFlow: A Security Analysis. April 2013. Proceedings of the 2013 21st IEEE International Conference on Network Protocols (ICNP), Goettingen, Germany.","DOI":"10.1109\/ICNP.2013.6733671"},{"key":"ref_32","unstructured":"Shin, S.W., Porras, P., Yegneswara, V., Fong, M., Gu, G., and Tyson, M. (2013, January 24\u201327). Fresco: Modular composable security services for software-defined networks. Proceedings of the 20th Annual Network & Distributed System Security Symposium, San Diego, CA, USA."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"e271","DOI":"10.1002\/spy2.271","article-title":"Security in 5G and beyond recent advances and future challenges","volume":"6","author":"Salahdine","year":"2023","journal-title":"Secur. Priv."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"2753","DOI":"10.1007\/s11277-023-10402-7","article-title":"Survey on Joint Paradigm of 5G and SDN Emerging Mobile Technologies: Architecture, Security, Challenges and Research Directions","volume":"130","author":"Kazmi","year":"2023","journal-title":"Wirel. Pers. Commun."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"18298","DOI":"10.1109\/ACCESS.2022.3151000","article-title":"A Systematic Analysis of 5G Networks with a Focus on 5G Core Security","volume":"10","author":"Tang","year":"2022","journal-title":"IEEE Access"},{"key":"ref_36","unstructured":"Sahni, I., and Kaur, A. (2022). A Systematic Literature Review on 5G Security. arXiv."},{"key":"ref_37","unstructured":"Choudhary, G., Kim, J., and Sharma, V. (2019). Security of 5G-mobile backhaul networks: A survey. arXiv."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1876","DOI":"10.1109\/TNSM.2022.3157248","article-title":"On Sustained Zero Trust Conceptualization Security for Mobile Core Networks in 5G and Beyond","volume":"19","author":"Bello","year":"2022","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"108668","DOI":"10.1016\/j.comnet.2021.108668","article-title":"Deep data plane programming and AI for zero-trust self-driven networking in beyond 5G","volume":"203","author":"Hireche","year":"2022","journal-title":"Comput. Netw."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/3229316.3229322","article-title":"Security Requirement and Standards for 4G and 5G Wireless Systems","volume":"22","author":"Fang","year":"2018","journal-title":"Getmobile Mob. Comp. Comm."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Moreira, C.M., Kaddoum, G., and Bou-Harb, E. (2018, January 20\u201324). Cross-layer authentication protocol design for ultra-dense 5G HetNets. Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA.","DOI":"10.1109\/ICC.2018.8422404"},{"key":"ref_42","unstructured":"Samonas, S., and Coss, D. (2014). The CIA strikes back: Redefining confidentiality, integrity and availability in security. J. Inf. Syst. Secur., 10."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1109\/MM.2018.053631143","article-title":"Hardware-assisted security in electronic control units: Secure automotive communications by utilizing one-time-programmable network on chip and firewalls","volume":"38","author":"Kornaros","year":"2018","journal-title":"IEEE Micro"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Salazar, Z., Nguyen, H.N., Mallouli, W., Cavalli, A.R., and Montes de Oca, E. (2021, January 17\u201320). 5Greplay: A 5G Network Traffic Fuzzer-Application to Attack Injection. Proceedings of the 16th International Conference on Availability, Reliability and Security, ARES \u201921, New York, NY, USA.","DOI":"10.1145\/3465481.3470079"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Park, S., You, I., Park, H., and Kim, D. (2022, January 23\u201326). Analyzing RRC Replay Attack and Securing Base Station with Practical Method. Proceedings of the 17th International Conference on Availability, Reliability and Security, ARES \u201922, New York, NY, USA.","DOI":"10.1145\/3538969.3544448"},{"key":"ref_46","first-page":"40","article-title":"Physical Unclonable Functions based on silicon micro-ring resonators for secure signature delegation in Wireless Sensor Networks","volume":"8","year":"2018","journal-title":"J. Internet Serv. Inf. Secur."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Yousef Alshunaifi, S., Mishra, S., and Alshehri, M. (2022). Cyber-Attack Detection and Mitigation Using SVM for 5G Network. Intell. Autom. Soft Comput., 31.","DOI":"10.32604\/iasc.2022.019121"},{"key":"ref_48","unstructured":"Kim, D. (2022). Non-Public Networks (NPN), 3GPP."},{"key":"ref_49","unstructured":"(2023). Service Requirements for the 5G System, Release 19, V19.4.0 (Standard No. TS 22.261)."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Jerichow, A., Covell, B., Chandramouli, D., Rezaki, A., Lansisalmi, A., and Merkel, J. (2020). 3GPP non-public network security. J. ICT Stand., 57\u201376.","DOI":"10.13052\/jicts2245-800X.815"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"153893","DOI":"10.1109\/ACCESS.2021.3127482","article-title":"5G non-public networks: Standardization, architectures and challenges","volume":"9","author":"Ameigeiras","year":"2021","journal-title":"IEEE Access"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Trakadas, P., Sarakis, L., Giannopoulos, A., Spantideas, S., Capsalis, N., Gkonis, P., Karkazis, P., Rigazzi, G., Antonopoulos, A., and Cambeiro, M.A. (2021). A cost-efficient 5G non-public network architectural approach: Key concepts and enablers, building blocks and potential use cases. Sensors, 21.","DOI":"10.3390\/s21165578"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"1065","DOI":"10.1109\/JSAC.2014.2328098","article-title":"What will 5G be?","volume":"32","author":"Andrews","year":"2014","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_54","unstructured":"Ericsson (2023). Ericsson Mobility Report, Mobile Subscriptions Q2 2023, Ericsson. Technical report."},{"key":"ref_55","unstructured":"(2023). Technical Specification Group Services and System Aspects; Procedures for the 5G System; Release 18, V18.2.0 (Standard No. TS 23.502)."},{"key":"ref_56","unstructured":"(2006). Location Services (LCS) Architecture for 3GPP System-Wireless Local Area Network (WLAN) Interworking; Release 7 (Standard No. TS 23.837)."},{"key":"ref_57","unstructured":"(2023). NR; NR and NG-RAN Overall Description; Stage-2 Release 17 (Standard No. TS 38.300)."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"12855","DOI":"10.1109\/JIOT.2021.3068463","article-title":"Is 5G Handover Secure and Private? A Survey","volume":"8","author":"Zhao","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_59","unstructured":"Reddy Chavva, A.K., and Rao, V.R.R. (2024, February 16). Reconfigurable Intelligent Surface (RIS) and Factors Influencing Its Role in Future Networks. Available online: https:\/\/research.samsung.com\/blog\/Reconfigurable-Intelligent-Surface-RIS-and-Factors-Influencing-it-s-Role-in-Future-Networks."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"3350","DOI":"10.1109\/TWC.2021.3049312","article-title":"Reconfigurable intelligent surface: Reflection design against passive eavesdropping","volume":"20","author":"Luo","year":"2021","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"2181","DOI":"10.1109\/TVT.2021.3135498","article-title":"Active Reconfigurable Intelligent Surface Aided Secure Transmission","volume":"71","author":"Dong","year":"2022","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"3480","DOI":"10.1109\/TIFS.2021.3083409","article-title":"Physical Layer Security Enhancement with Reconfigurable Intelligent Surface-Aided Networks","volume":"16","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"1196","DOI":"10.1109\/OJCOMS.2023.3273507","article-title":"Security and Privacy for Reconfigurable Intelligent Surface in 6G: A Review of Prospective Applications and Challenges","volume":"4","author":"Naeem","year":"2023","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"1663","DOI":"10.1109\/LWC.2020.3000892","article-title":"IRS-based wireless jamming attacks: When jammers can attack without power","volume":"9","author":"Lyu","year":"2020","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_65","unstructured":"Networks, G. (2023, December 27). OpenRAN (O-ran) for 5G Explained. Available online: https:\/\/www.5g-networks.net\/5g-technology\/openran-o-ran-for-5g-explained\/."},{"key":"ref_66","unstructured":"Hanselman, E. (2023, December 27). Security Benefits of Open Virtualized RAN. Available online: https:\/\/www.cisco.com\/c\/dam\/en\/us\/solutions\/service-provider\/pdfs\/5g-network-architecture\/white-paper-sp-open-vran-security-benefits.pdf."},{"key":"ref_67","unstructured":"Nokia (2024, February 07). 5G Managed Security Survey 2022. Available online: https:\/\/onestore.nokia.com\/asset\/212741?_ga=2.218954462.611512529.1668533812-1895305122.1668533812."},{"key":"ref_68","unstructured":"GSMA (2024, February 07). 5G Security Issues. Available online: https:\/\/www.gsma.com\/get-involved\/gsma-membership\/wp-content\/uploads\/2019\/11\/5G-Research_A4.pdf."},{"key":"ref_69","unstructured":"TrendMicro (2024, February 07). Attacks on 5G Infrastructure from User Devices. Available online: https:\/\/www.trendmicro.com\/en_us\/research\/23\/i\/attacks-on-5g-infrastructure-from-users-devices.html."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/2.989921","article-title":"Open source security: Opportunity or oxymoron?","volume":"35","author":"Lawton","year":"2002","journal-title":"Computer"},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Tung, Y.C., Liou, E.C., Cheng, C.H., Lin, T.H., and Chuang, S.M. (2023, January 19\u201322). Closed-Loop Security Management for Developing O-RAN Infrastructure and B5G RIC Applications. Proceedings of the 2023 26th International Symposium on Wireless Personal Multimedia Communications (WPMC), Tampa, FL, USA.","DOI":"10.1109\/WPMC59531.2023.10338980"},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1109\/MCOM.2017.1600940","article-title":"Network Slicing Based 5G and Future Mobile Networks: Mobility, Resource Management, and Challenges","volume":"55","author":"Zhang","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MWC.2017.1600408","article-title":"5G Network Slicing for Vehicle-to-Everything Services","volume":"24","author":"Campolo","year":"2017","journal-title":"IEEE Wirel. Commun."},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Dangi, R., Jadhav, A., Choudhary, G., Dragoni, N., Mishra, M.K., and Lalwani, P. (2022). ML-Based 5G Network Slicing Security: A Comprehensive Survey. Future Internet, 14.","DOI":"10.3390\/fi14040116"},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MCOM.2017.1600935","article-title":"Network Slicing for 5G with SDN\/NFV: Concepts, Architectures, and Challenges","volume":"55","author":"Ameigeiras","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_76","unstructured":"Cano, M. (2023). Technologies, 3GPP."},{"key":"ref_77","unstructured":"OAuth (2024, February 16). OAuth 2.0, an Industry-Standard Protocol for Authorization. Available online: https:\/\/oauth.net\/2\/."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"36009","DOI":"10.1109\/ACCESS.2020.2975072","article-title":"Network Slicing: Recent Advances, Taxonomy, Requirements, and Open Research Challenges","volume":"8","author":"Khan","year":"2020","journal-title":"IEEE Access"},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1109\/COMST.2022.3205184","article-title":"Adversarial machine learning in wireless communications using RF data: A review","volume":"25","author":"Adesina","year":"2022","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Gr\u00f8nsund, P., Gonzalez, A., Mahmood, K., Nomeland, K., Pitter, J., Dimitriadis, A., Berg, T.K., and Gelardi, S. (2020, January 7\u201311). 5g service and slice implementation for a military use case. Proceedings of the 2020 IEEE International Conference on Communications Workshops (ICC Workshops), Dublin, Ireland.","DOI":"10.1109\/ICCWorkshops49005.2020.9145236"},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MCOM.2014.6815890","article-title":"Scenarios for 5G mobile and wireless communications: The vision of the METIS project","volume":"52","author":"Osseiran","year":"2014","journal-title":"IEEE Commun. Mag."},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MCOM.2014.6736746","article-title":"Five disruptive technology directions for 5G","volume":"52","author":"Boccardi","year":"2014","journal-title":"IEEE Commun. Mag."},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/MCOM.2014.6736752","article-title":"Cellular architecture and key technologies for 5G wireless communication networks","volume":"52","author":"Wang","year":"2014","journal-title":"IEEE Commun. Mag."},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MCOM.2014.6736745","article-title":"Toward green and soft: A 5G perspective","volume":"52","author":"Rowell","year":"2014","journal-title":"IEEE Commun. Mag."},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MNET.2014.6963798","article-title":"5G wireless backhaul networks: Challenges and research advances","volume":"28","author":"Ge","year":"2014","journal-title":"IEEE Netw."},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.future.2019.03.036","article-title":"Security situation assessment for massive MIMO systems for 5G communications","volume":"98","author":"Yang","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Schaefer, R.F., Amarasuriya, G., and Poor, H.V. (November, January 29). Physical layer security in massive MIMO systems. Proceedings of the 2017 51st Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, USA.","DOI":"10.1109\/ACSSC.2017.8335124"},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/MCOM.2015.7120012","article-title":"Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks","volume":"53","author":"Kapetanovic","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/MCOM.2018.1700671","article-title":"Opportunistic multicast NOMA with security concerns in a 5G massive MIMO system","volume":"56","author":"Xiao","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"26350","DOI":"10.1109\/ACCESS.2018.2832839","article-title":"Physical Layer Security in 5G Based Large Scale Social Networks: Opportunities and Challenges","volume":"6","author":"Gao","year":"2018","journal-title":"IEEE Access"},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"3060","DOI":"10.1109\/COMST.2018.2843719","article-title":"A Survey on Hybrid Beamforming Techniques in 5G: Architecture and System Model Perspectives","volume":"20","author":"Ahmed","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/CC.2017.8246328","article-title":"Physical layer security with its applications in 5G networks: A review","volume":"14","author":"Sun","year":"2017","journal-title":"China Commun."},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"8767","DOI":"10.1109\/TVT.2015.2505715","article-title":"Two birds with one stone: Towards secure and interference-free D2D transmissions via constellation rotation","volume":"65","author":"Sun","year":"2015","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_94","doi-asserted-by":"crossref","unstructured":"Du, Q., Sun, L., Ren, P., and Wang, Y. (2015, January 15\u201317). Statistical security model and power adaptation over wireless fading channels. Proceedings of the 2015 International Conference on Wireless Communications & Signal Processing (WCSP), Nanjing, China.","DOI":"10.1109\/WCSP.2015.7341246"},{"key":"ref_95","doi-asserted-by":"crossref","unstructured":"Li, W., Du, Q., Sun, L., Ren, P., and Wang, Y. (2016, January 3\u20136). Security enhanced via dynamic fountain code design for wireless delivery. Proceedings of the 2016 IEEE Wireless Communications and Networking Conference, Doha, Qatar.","DOI":"10.1109\/WCNC.2016.7565065"},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"1062","DOI":"10.1049\/ip-com:20050237","article-title":"Fountain codes","volume":"152","author":"MacKay","year":"2005","journal-title":"IEE Proc.-Commun."},{"key":"ref_97","doi-asserted-by":"crossref","unstructured":"Seok, B., Sicato, J.C.S., Erzhena, T., Xuan, C., Pan, Y., and Park, J.H. (2019). Secure D2D communication for 5G IoT network based on lightweight cryptography. Appl. Sci., 10.","DOI":"10.3390\/app10010217"},{"key":"ref_98","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/MNET.2017.1600290","article-title":"Security-aware and privacy-preserving D2D communications in 5G","volume":"31","author":"Zhang","year":"2017","journal-title":"IEEE Netw."},{"key":"ref_99","doi-asserted-by":"crossref","unstructured":"Wang, M., and Yan, Z. (2015, January 20\u201322). Security in D2D communications: A review. Proceedings of the 2015 IEEE Trustcom\/BigDataSE\/ISPA, Washington, DC, USA.","DOI":"10.1109\/Trustcom.2015.505"},{"key":"ref_100","doi-asserted-by":"crossref","unstructured":"Sun, Y., Cao, J., Ma, M., Li, H., Niu, B., and Li, F. (2019, January 18\u201321). Privacy-preserving device discovery and authentication scheme for D2D communication in 3GPP 5G HetNet. Proceedings of the 2019 International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA.","DOI":"10.1109\/ICCNC.2019.8685499"},{"key":"ref_101","doi-asserted-by":"crossref","unstructured":"Mars, A., Abadleh, A., and Adi, W. (May, January 29). Operator and manufacturer independent D2D private link for future 5G networks. Proceedings of the IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Paris, France.","DOI":"10.1109\/INFOCOMWKSHPS47286.2019.9093775"},{"key":"ref_102","doi-asserted-by":"crossref","unstructured":"Howell, G., Boeckl, K., Grayson, N.R., Lefkovitz, N., Ajmo, J., Craft, R.E., McGinnis, M., Sandlin, K., Slivina, O., and Snyder, J. (2023). Mobile Device Security: Bring Your Own Device (BYOD), National Institute of Standards and Technology.","DOI":"10.6028\/NIST.SP.1800-22"},{"key":"ref_103","doi-asserted-by":"crossref","unstructured":"Kholidy, H.A., Karam, A., Sidoran, J., Rahman, M.A., Mahmoud, M., Badr, M., Mahmud, M., and Sayed, A.F. (December, January 28). Toward Zero Trust Security IN 5G Open Architecture Network Slices. Proceedings of the MILCOM 2022\u20142022 IEEE Military Communications Conference (MILCOM), Rockville, MD, USA.","DOI":"10.1109\/MILCOM55135.2022.10017474"},{"key":"ref_104","doi-asserted-by":"crossref","unstructured":"Manan, A., Min, Z., Mahmoudi, C., and Formicola, V. (2022, January 5\u20138). Extending 5G services with Zero Trust security pillars: A modular approach. Proceedings of the 2022 IEEE\/ACS 19th International Conference on Computer Systems and Applications (AICCSA), Abu Dhabi, United Arab Emirates.","DOI":"10.1109\/AICCSA56895.2022.10017774"},{"key":"ref_105","doi-asserted-by":"crossref","unstructured":"Li, S., Iqbal, M., and Saxena, N. (2022). Future industry internet of things with zero-trust security. Inf. Syst. Front., 1\u201314.","DOI":"10.1007\/s10796-021-10199-5"},{"key":"ref_106","doi-asserted-by":"crossref","unstructured":"Bhushan, B., Sharma, S.K., Kumar, R., and Priyadarshini, I. (2023). 5G and Beyond, Springer Nature.","DOI":"10.1007\/978-981-99-3668-7"},{"key":"ref_107","unstructured":"Alipour, M.A., Ghasemshirazi, S., and Shirvani, G. (2022). Enabling a Zero Trust Architecture in a 5G-enabled Smart Grid. arXiv."},{"key":"ref_108","doi-asserted-by":"crossref","unstructured":"Feng, Z., Zhou, P., Wang, Q., and Qi, W. (2022, January 21\u201323). A Dual-layer Zero Trust Architecture for 5G Industry MEC Applications Access Control. Proceedings of the 2022 IEEE 5th International Conference on Electronic Information and Communication Technology (ICEICT), Hefei, China.","DOI":"10.1109\/ICEICT55736.2022.9908891"},{"key":"ref_109","doi-asserted-by":"crossref","first-page":"57143","DOI":"10.1109\/ACCESS.2022.3174679","article-title":"Zero Trust Architecture (ZTA): A Comprehensive Survey","volume":"10","author":"Syed","year":"2022","journal-title":"IEEE Access"},{"key":"ref_110","doi-asserted-by":"crossref","first-page":"6476274","DOI":"10.1155\/2022\/6476274","article-title":"A survey on zero trust architecture: Challenges and future trends","volume":"2022","author":"He","year":"2022","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_111","doi-asserted-by":"crossref","first-page":"102436","DOI":"10.1016\/j.cose.2021.102436","article-title":"Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust","volume":"110","author":"Buck","year":"2021","journal-title":"Comput. Secur."},{"key":"ref_112","doi-asserted-by":"crossref","first-page":"55372","DOI":"10.1109\/ACCESS.2018.2871642","article-title":"A Security Authentication Scheme of 5G Ultra-Dense Network Based on Block Chain","volume":"6","author":"Chen","year":"2018","journal-title":"IEEE Access"},{"key":"ref_113","doi-asserted-by":"crossref","first-page":"102693","DOI":"10.1016\/j.jnca.2020.102693","article-title":"Blockchain for 5G and beyond networks: A state of the art survey","volume":"166","author":"Nguyen","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_114","doi-asserted-by":"crossref","first-page":"2163","DOI":"10.1109\/JIOT.2020.3033521","article-title":"EEDTO: An Energy-Efficient Dynamic Task Offloading Algorithm for Blockchain-Enabled IoT-Edge-Cloud Orchestrated Computing","volume":"8","author":"Wu","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_115","doi-asserted-by":"crossref","first-page":"1022","DOI":"10.1109\/TWC.2021.3100985","article-title":"Transaction Throughput Optimization for Integrated Blockchain and MEC System in IoT","volume":"21","author":"Xu","year":"2022","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_116","doi-asserted-by":"crossref","first-page":"4242","DOI":"10.1109\/JIOT.2018.2875715","article-title":"Dynamic Computation Offloading in Edge Computing for Internet of Things","volume":"6","author":"Chen","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_117","doi-asserted-by":"crossref","first-page":"1972","DOI":"10.1109\/TII.2019.2938001","article-title":"Blockchain Meets Edge Computing: A Distributed and Trusted Authentication System","volume":"16","author":"Guo","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_118","doi-asserted-by":"crossref","first-page":"7094","DOI":"10.1109\/TII.2020.2964563","article-title":"Distributed Blockchain-Based Trusted Multidomain Collaboration for Mobile Edge Computing in 5G and Beyond","volume":"16","author":"Yang","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_119","doi-asserted-by":"crossref","unstructured":"Hewa, T., G\u00fcr, G., Kalla, A., Ylianttila, M., Bracken, A., and Liyanage, M. (2020, January 17\u201320). The role of blockchain in 6G: Challenges, opportunities and research directions. Proceedings of the 2020 2nd 6G Wireless Summit (6G SUMMIT), Levi, Finland.","DOI":"10.1109\/6GSUMMIT49458.2020.9083784"},{"key":"ref_120","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/MNET.021.1900629","article-title":"Blockchain-based data security for artificial intelligence applications in 6G networks","volume":"34","author":"Li","year":"2020","journal-title":"IEEE Netw."},{"key":"ref_121","doi-asserted-by":"crossref","first-page":"1279","DOI":"10.1109\/LCOMM.2019.2921755","article-title":"Blockchained on-device federated learning","volume":"24","author":"Kim","year":"2019","journal-title":"IEEE Commun. Lett."},{"key":"ref_122","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1016\/S1361-3723(17)30051-9","article-title":"The impact of quantum computing on cryptography","volume":"2017","author":"Aumasson","year":"2017","journal-title":"Comput. Fraud. Secur."},{"key":"ref_123","doi-asserted-by":"crossref","unstructured":"Clancy, T.C., McGwier, R.W., and Chen, L. (2019, January 15\u201317). Post-Quantum Cryptography and 5G Security: Tutorial. Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec \u201919, New York, NY, USA.","DOI":"10.1145\/3317549.3324882"},{"key":"ref_124","doi-asserted-by":"crossref","unstructured":"Buhler, J.P. (1998). International Algorithmic Number Theory Symposium, Springer.","DOI":"10.1007\/BFb0054849"},{"key":"ref_125","unstructured":"Augot, D., Batina, L., Bernstein, D.J., Bos, J., Buchmann, J., Castryck, W., Dunkelman, O., G\u00fcneysu, T., Gueron, S., and H\u00fclsing, A. (2023, August 12). Initial Recommendations of long-Term Secure Post-Quantum Systems (2015). Available online: https:\/\/pqcrypto.eu.org\/docs\/initial-recommendations.pdf."},{"key":"ref_126","unstructured":"National Institute of Standards and Technology (2023). Module-Lattice-Based Key-Encapsulation Mechanism Standard, National Institute of Standards and Technology."},{"key":"ref_127","doi-asserted-by":"crossref","unstructured":"Bos, J., Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schanck, J.M., Schwabe, P., Seiler, G., and Stehl\u00e9, D. (2018, January 24\u201326). CRYSTALS-Kyber: A CCA-secure module-lattice-based KEM. Proceedings of the 2018 IEEE European Symposium on Security and Privacy (EuroS&P), London, UK.","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"ref_128","unstructured":"National Institute of Standards and Technology (2023, December 30). Module-Lattice-Based Digital Signature Standard, Available online: https:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.204.ipd.pdf."},{"key":"ref_129","doi-asserted-by":"crossref","first-page":"238","DOI":"10.46586\/tches.v2018.i1.238-268","article-title":"Crystals-dilithium: A lattice-based digital signature scheme","volume":"2018","author":"Ducas","year":"2018","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"ref_130","unstructured":"National Institute of Standards and Technology (2023). Stateless Hash-Based Digital Signature Standard, National Institute of Standards and Technology."},{"key":"ref_131","unstructured":"Bernstein, D.J., H\u00fclsing, A., K\u00f6lbl, S., Niederhagen, R., Rijneveld, J., and Schwabe, P. (2019, January 11\u201315). The SPHINCS+ signature framework. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, UK."},{"key":"ref_132","unstructured":"Preuss Mattsson, J., Thormarker, E., and Smeets, B. (2023). Migration of quantum-resistant algorithms to mobile networks. Ericsson Blog, Available online: https:\/\/www.ericsson.com\/en\/blog\/2023\/2\/quantum-resistant-algorithms-mobile-networks."},{"key":"ref_133","doi-asserted-by":"crossref","first-page":"1094","DOI":"10.1109\/OJCOMS.2021.3078081","article-title":"The roadmap to 6G security and privacy","volume":"2","author":"Porambage","year":"2021","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref_134","unstructured":"Sajimon, P., Jain, K., and Krishnan, P. (2022, January 25\u201327). Analysis of post-quantum cryptography for internet of things. Proceedings of the 2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India."},{"key":"ref_135","unstructured":"3GPP (2022). Evolved Universal Terrestrial Radio Access (E-UTRA) and NR; Study on Enhancement for Data Collection for NR and EN-DC (Release 17), 3GPP."},{"key":"ref_136","doi-asserted-by":"crossref","first-page":"836","DOI":"10.1109\/OJCOMS.2021.3071496","article-title":"Survey on 6G Frontiers: Trends, Applications, Requirements, Technologies and Future Research","volume":"2","author":"Alwis","year":"2021","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref_137","doi-asserted-by":"crossref","unstructured":"Siriwardhana, Y., Porambage, P., Liyanage, M., and Ylianttila, M. (2021, January 8\u201311). AI and 6G Security: Opportunities and Challenges. Proceedings of the 2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC\/6G Summit), Porto, Portugal.","DOI":"10.1109\/EuCNC\/6GSummit51104.2021.9482503"},{"key":"ref_138","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1109\/MIC.2021.3062487","article-title":"RIC: A RAN Intelligent Controller Platform for AI-Enabled Cellular Networks","volume":"25","author":"Balasubramanian","year":"2021","journal-title":"IEEE Internet Comput."},{"key":"ref_139","doi-asserted-by":"crossref","unstructured":"Lee, H., Cha, J., Kwon, D., Jeong, M., and Park, I. (2020, January 7\u201311). Hosting AI\/ML Workflows on O-RAN RIC Platform. Proceedings of the 2020 IEEE Globecom Workshops (GC Wkshps), Taipei, Taiwan.","DOI":"10.1109\/GCWkshps50303.2020.9367572"},{"key":"ref_140","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1109\/MNET.011.2000195","article-title":"Artificial-Intelligence-Enabled Intelligent 6G Networks","volume":"34","author":"Yang","year":"2020","journal-title":"IEEE Netw."},{"key":"ref_141","unstructured":"B\u00e1rcena, J.L.C., Ducange, P., Marcelloni, F., Nardini, G., Noferi, A., Renda, A., Stea, G., and Virdis, A. (2022, January 21). Towards Trustworthy AI for QoE prediction in B5G\/6G Networks. Proceedings of the First Int\u2019l Workshop on Artificial Intelligence in Beyond 5G and 6G Wireless Networks (AI6G 2022), Padua, Italy."},{"key":"ref_142","doi-asserted-by":"crossref","unstructured":"Kohli, P., Sharma, S., and Matta, P. (2023, January 26\u201328). Intrusion Detection Techniques For Security and Privacy of 6G Applications. Proceedings of the 2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC), Jalandhar, India.","DOI":"10.1109\/ICSCCC58608.2023.10176740"},{"key":"ref_143","doi-asserted-by":"crossref","unstructured":"Saeed, M.M., Saeed, R.A., Abdelhaq, M., Alsaqour, R., Hasan, M.K., and Mokhtar, R.A. (2023). Anomaly detection in 6G networks using machine learning methods. Electronics, 12.","DOI":"10.3390\/electronics12153300"},{"key":"ref_144","doi-asserted-by":"crossref","unstructured":"Ayub, M.A., Johnson, W.A., Talbert, D.A., and Siraj, A. (2020, January 18\u201320). Model Evasion Attack on Intrusion Detection Systems using Adversarial Machine Learning. Proceedings of the 2020 54th Annual Conference on Information Sciences and Systems (CISS), Princeton, NJ, USA.","DOI":"10.1109\/CISS48834.2020.1570617116"},{"key":"ref_145","doi-asserted-by":"crossref","unstructured":"Wang, S., Ko, R.K.L., Bai, G., Dong, N., Choi, T., and Zhang, Y. (2023). Evasion Attack and Defense On Machine Learning Models in Cyber-Physical Systems: A Survey. IEEE Commun. Surv. Tutor., 1\u201338.","DOI":"10.1109\/COMST.2023.3344808"},{"key":"ref_146","doi-asserted-by":"crossref","unstructured":"Khowaja, S.A., Khuwaja, P., Dev, K., and Antonopoulos, A. (June, January 28). Spin: Simulated poisoning and inversion network for federated learning-based 6g vehicular networks. Proceedings of the ICC 2023-IEEE International Conference on Communications, Rome, Italy.","DOI":"10.1109\/ICC45041.2023.10279339"},{"key":"ref_147","doi-asserted-by":"crossref","unstructured":"Renda, A., Ducange, P., Gallo, G., and Marcelloni, F. (2021, January 11\u201314). XAI models for quality of experience prediction in wireless networks. Proceedings of the 2021 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Luxembourg.","DOI":"10.1109\/FUZZ45933.2021.9494509"}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/16\/3\/67\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T14:02:47Z","timestamp":1760104967000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/16\/3\/67"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,20]]},"references-count":147,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["fi16030067"],"URL":"https:\/\/doi.org\/10.3390\/fi16030067","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,20]]}}}