{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T18:13:25Z","timestamp":1771265605944,"version":"3.50.1"},"reference-count":74,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T00:00:00Z","timestamp":1742860800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"University of Nebraska\u2013Lincoln\u2019s Nebraska Center for Energy Sciences Research (NCESR)","award":["20-706"],"award-info":[{"award-number":["20-706"]}]},{"name":"Advanced Telecommunications Engineering Lab (TEL) at the University of Nebraska\u2013Lincoln","award":["20-706"],"award-info":[{"award-number":["20-706"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Fifth-Generation (5G) cellular networks extensively utilize subscriber identifiers throughout the protocol stack, thereby linking subscribers to their activities on the network. With the inherent use of linked identifiers comes the potential capability to track subscribers\u2019 location and behavior, which poses critical challenges for user identity protections and privacy in sensitive applications like military or healthcare operating over public 5G infrastructure. The reliance on such personal identifiers threatens a user\u2019s right to privacy and brings to light the importance of proper mechanisms to mitigate these risks for current and future cellular network technologies. In this paper, we explore the 5G specifications to understand the most important list of identifiers and their use across Virtual Network Functions (VNF), and points of exposure within the Core Network (CN). We also examine the existing literature regarding identity protections and efforts to mitigate privacy concerns targeted in the CN. Findings include the need for a trust relationship between users and their network providers to protect and safeguard their identity. While 5G technology has greater user identity protections compared to previous cellular generations, our analysis shows that several areas of concern remain, particularly in the exchange of subscriber metadata. This work also finds that new technologies adopted in 5G networks add further complexity to maintaining a strict posture for safeguarding user identity and privacy protections. This paper also reviews the scientific community\u2019s proposed enhancements for future 6G networks\u2019 user identity and privacy protections, with a focus on emerging Artificial Intelligence (AI) and Machine Learning (ML) applications. The ethical implications of private or anonymous communications are also carefully weighed and examined to understand the multifaceted nature of this topic. Our work is concluded by proposing important further research to reduce the prevalence and reliance on personal identifiers such as the SUPI (Subscription Permanent Identifier) within 5G Core operations to help better protect user identity. We also propose replacing the widespread use of the SUPI between VNFs with ephemeral identifiers, building upon efforts by 3GPP aiming for 5G to protect the SUPI from eavesdroppers.<\/jats:p>","DOI":"10.3390\/fi17040142","type":"journal-article","created":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T05:35:03Z","timestamp":1742880903000},"page":"142","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Survey of 5G Core Network User Identity Protections, Concerns, and Proposed Enhancements for Future 6G Technologies"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-4145-7318","authenticated-orcid":false,"given":"Paul","family":"Scalise","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Nebraska-Lincoln, Lincoln, NE 68588, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7091-8349","authenticated-orcid":false,"given":"Michael","family":"Hempel","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Nebraska-Lincoln, Lincoln, NE 68588, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6229-2043","authenticated-orcid":false,"given":"Hamid","family":"Sharif","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Nebraska-Lincoln, Lincoln, NE 68588, USA"}]}],"member":"1968","published-online":{"date-parts":[[2025,3,25]]},"reference":[{"key":"ref_1","unstructured":"The Tor Project (2025, January 21). The Tor Project | Privacy & Freedom Online\u2014torproject.org. Available online: https:\/\/www.torproject.org."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1177\/1461444816639976","article-title":"Tor, what is it good for? Political repression and the use of online anonymity-granting technologies","volume":"20","author":"Jardine","year":"2018","journal-title":"New Media Soc."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1109\/COMST.2019.2951818","article-title":"A survey on security aspects for 3GPP 5G networks","volume":"22","author":"Cao","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"106871","DOI":"10.1016\/j.comnet.2019.106871","article-title":"Towards secure 5G networks: A Survey","volume":"162","author":"Zhang","year":"2019","journal-title":"Comput. Netw."},{"key":"ref_5","first-page":"1","article-title":"A comprehensive survey on core technologies and services for 5G security: Taxonomies, issues, and solutions","volume":"11","author":"Park","year":"2021","journal-title":"Hum.-Centric Comput. Inf. Sci."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Ziani, A., and Medouri, A. (2021). A survey of security and privacy for 5G networks. Emerging Trends in ICT for Sustainable Development: The Proceedings of NICE2020 International Conference, Springer.","DOI":"10.1007\/978-3-030-53440-0_22"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"108288","DOI":"10.1016\/j.comnet.2021.108288","article-title":"NFV security survey in 5G networks: A three-dimensional threat taxonomy","volume":"197","author":"Madi","year":"2021","journal-title":"Comput. Netw."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"18298","DOI":"10.1109\/ACCESS.2022.3151000","article-title":"A systematic analysis of 5g networks with a focus on 5g core security","volume":"10","author":"Tang","year":"2022","journal-title":"IEEE Access"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"2191","DOI":"10.1109\/COMST.2021.3115797","article-title":"A survey of decentralizing applications via blockchain: The 5G and beyond perspective","volume":"23","author":"Yue","year":"2021","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Scalise, P., Boeding, M., Hempel, M., Sharif, H., Delloiacovo, J., and Reed, J. (2024). A systematic survey on 5G and 6G security considerations, challenges, trends, and research areas. Future Internet, 16.","DOI":"10.3390\/fi16030067"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1109\/MCOM.2019.1800511","article-title":"Private Identification of Subscribers in Mobile Networks: Status and Challenges","volume":"57","author":"Mjolsnes","year":"2019","journal-title":"IEEE Commun. Mag."},{"key":"ref_12","unstructured":"US Cybersecurity and Infrastructure Security Agency (2025, February 27). Joint Statement by FBI and CISA on PRC Activity Targeting Telecommunications, Available online: https:\/\/www.cisa.gov\/news-events\/news\/joint-statement-fbi-and-cisa-prc-activity-targeting-telecommunications."},{"key":"ref_13","unstructured":"US Cybersecurity and Infrastructure Security Agency (2025, February 27). AT&T Discloses Breach of Customer Data, Available online: https:\/\/www.cisa.gov\/news-events\/alerts\/2024\/07\/12\/att-discloses-breach-customer-data."},{"key":"ref_14","unstructured":"Office of the Maine Attorney General (2025, February 27). Data Breach Notifications, Available online: https:\/\/www.maine.gov\/agviewer\/content\/ag\/985235c7-cb95-4be2-8792-a1252b4f8318\/3778e1fc-2ed5-461d-9cc5-df15c07f687c.shtml."},{"key":"ref_15","unstructured":"Office of the Maine Attorney General (2025, February 27). Data Breach Notifications, Available online: https:\/\/www.maine.gov\/agviewer\/content\/ag\/985235c7-cb95-4be2-8792-a1252b4f8318\/65b9290a-b22e-4ae7-93e7-5acb84357297.shtml."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"107345","DOI":"10.1016\/j.comnet.2020.107345","article-title":"5G In the internet of things era: An overview on security and privacy challenges","volume":"179","author":"Sicari","year":"2020","journal-title":"Comput. Netw."},{"key":"ref_17","unstructured":"3GPP (2025, January 21). 5G System; Technical Realization of Service Based Architecture; Stage 3. Technical Specification (TS) 29.500, 3rd Generation Partnership Project (3GPP). Available online: https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=3338."},{"key":"ref_18","unstructured":"3GPP (2025, January 21). 5G System; Principles and Guidelines for Services Definition; Stage 3. Technical Specification (TS) 29.501, 3rd Generation Partnership Project (3GPP). Available online: https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=3341."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Bartock, M., Cichonski, J., Souppaya, M., Scarfone, K., Grayeli, P., and Sharma, S. (2024). Reallocation of Temporary Identities: Applying 5G Cybersecurity and Privacy Capabilities (Draft), Technical Report.","DOI":"10.6028\/NIST.CSWP.36C.ipd"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Gorrepati, U., Zavarsky, P., and Ruhl, R. (2021, January 21\u201323). Privacy Protection in LTE and 5G Networks. Proceedings of the 2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC), Jalandhar, India.","DOI":"10.1109\/ICSCCC51823.2021.9478109"},{"key":"ref_21","unstructured":"3GPP (2025, January 21). Security Architecture and Procedures for 5G System. Technical Specification (TS) 33.501, 3rd Generation Partnership Project (3GPP). Available online: https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=3169."},{"key":"ref_22","unstructured":"3GPP (2025, January 22). Numbering, Addressing and Identification. Technical Specification (TS) 23.003, 3rd Generation Partnership Project (3GPP). Available online: https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=729."},{"key":"ref_23","unstructured":"3GPP (2025, January 22). Service Requirements for the 5G System. Technical Specification (TS) 22.261, 3rd Generation Partnership Project (3GPP). Available online: https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=3107."},{"key":"ref_24","unstructured":"3GPP (2025, January 22). Wireless and Wireline Convergence Access Support for the 5G System (5GS). Technical Specification (TS) 23.316, 3rd Generation Partnership Project (3GPP). Available online: https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=3576."},{"key":"ref_25","unstructured":"Institute of Electrical and Electronics Engineers (2025, February 27). Guidelines for Use of Extended Unique Identifier (EUI), Organizationally Unique Identifier (OUI), and Company ID (CID)\u2014standards-support.ieee.org. Available online: https:\/\/standards-support.ieee.org\/hc\/en-us\/articles\/4888705676564-Guidelines-for-Use-of-Extended-Unique-Identifier-EUI-Organizationally-Unique-Identifier-OUI-and-Company-ID-CID."},{"key":"ref_26","unstructured":"3GPP. NR, and User Equipment (UE) Procedures in Idle Mode and in RRC Inactive State (2025, January 22). Technical Specification (TS) 38.304, 3rd Generation Partnership Project (3GPP). Available online: https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=3192."},{"key":"ref_27","unstructured":"3GPP (2025, January 22). Evolved Universal Terrestrial Radio Access (E-UTRA); User Equipment (UE) Procedures in Idle Mode. Technical Specification (TS) 36.304, 3rd Generation Partnership Project (3GPP). Available online: https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=2432."},{"key":"ref_28","unstructured":"3GPP (2025, January 22). NR; Radio Resource Control (RRC); Protocol Specification. Technical Specification (TS) 38.331, 3rd Generation Partnership Project (3GPP). Available online: https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=3197."},{"key":"ref_29","unstructured":"3GPP (2025, January 22). Evolved Universal Terrestrial Radio Access (E-UTRA); Radio Resource Control (RRC); Protocol Specification. Technical Specification (TS) 36.331, 3rd Generation Partnership Project (3GPP). Available online: https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=2440."},{"key":"ref_30","unstructured":"3GPP (2025, January 22). Procedures for the 5G System (5GS). Technical Specification (TS) 23.502, 3rd Generation Partnership Project (3GPP). Available online: https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=3145."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Yao, J., Han, Z., Sohail, M., and Wang, L. (2019). A Robust Security Architecture for SDN-Based 5G Networks. Future Internet, 11.","DOI":"10.3390\/fi11040085"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"012037","DOI":"10.1088\/1742-6596\/1979\/1\/012037","article-title":"5G network security issues, challenges, opportunities and future directions: A survey","volume":"1979","author":"Humayun","year":"2021","journal-title":"J. Phys. Conf. Ser."},{"key":"ref_33","unstructured":"National Institute of Standards and Technology (2025, January 22). Linkable Information, Available online: https:\/\/csrc.nist.gov\/glossary\/term\/linkable_information."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1927","DOI":"10.1109\/TMC.2013.84","article-title":"A Privacy-Preserving Attribute-Based Authentication System for Mobile Health Networks","volume":"13","author":"Guo","year":"2013","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Liyanage, M., Salo, J., Braeken, A., Kumar, T., Seneviratne, S., and Ylianttila, M. (2018, January 9\u201311). 5G Privacy: Scenarios and Solutions. Proceedings of the 2018 IEEE 5G World Forum (5GWF), Santa Clara, CA, USA.","DOI":"10.1109\/5GWF.2018.8516981"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Liyanage, M., Ahmad, I., Abro, A.B., Gurtov, A., and Ylianttila, M. (2017). User Privacy, Identity and Trust in 5G. A Comprehensive Guide to 5G Security, Wiley.","DOI":"10.1002\/9781119293071"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Eleftherakis, S., Otim, T., Santaromita, G., Zayas, A.D., Giustiniano, D., and Kourtellis, N. (2024, January 18\u201322). Demystifying Privacy in 5G Stand Alone Networks. Proceedings of the 30th Annual International Conference on Mobile Computing and Networking, ACM MobiCom \u201924, Washington, DC, USA.","DOI":"10.1145\/3636534.3690696"},{"key":"ref_38","first-page":"69","article-title":"Privacy Enhanced Fast Mutual Authentication in 5G Network Using Identity Based Encryption","volume":"5","author":"Khan","year":"2017","journal-title":"J. ICT Stand."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Ginzboorg, P., and Niemi, V. (2016, January 18\u201319). Privacy of the long-term identities in cellular networks. Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, Xi\u2019an, China.","DOI":"10.4108\/eai.18-6-2016.2264410"},{"key":"ref_40","unstructured":"Khan, M.S.A., and Mitchell, C.J. (2015). Improving Air Interface User Privacy in Mobile Telephony. Security Standardisation Research: Proceedings of the Security Standardisation Research: Second International Conference, SSR 2015, Tokyo, Japan, 15\u201316 December 2015, Springer. Proceedings 2."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Norrman, K., N\u00e4slund, M., and Dubrova, E. (2016, January 18\u201319). Protecting IMSI and User Privacy in 5G Network. Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, MobiMedia \u201916, Xi\u2019an, China.","DOI":"10.4108\/eai.18-6-2016.2264114"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Van Den Broek, F., Verdult, R., and De Ruiter, J. (2015, January 12\u201316). Defeating IMSI Catchers. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA.","DOI":"10.1145\/2810103.2813615"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"7868","DOI":"10.1109\/TVT.2016.2541862","article-title":"Secure and Privacy-Aware Cloud-Assisted Video Reporting Service in 5G-Enabled Vehicular Networks","volume":"65","author":"Eiza","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_44","first-page":"5551","article-title":"Preserving Privacy of User Identity Based on Pseudonym Variable in 5G","volume":"70","author":"Saeed","year":"2022","journal-title":"Comput. Mater. Contin."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Liu, F., Su, L., Yang, B., Du, H., Qi, M., and He, S. (July, January 28). Security Enhancements to Subscriber Privacy Protection Scheme in 5G Systems. Proceedings of the 2021 International Wireless Communications and Mobile Computing (IWCMC), Harbin, China.","DOI":"10.1109\/IWCMC51323.2021.9498591"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1049\/cmu2.12327","article-title":"A comprehensive review on the users\u2019 identity privacy for 5G networks","volume":"16","author":"Saeed","year":"2022","journal-title":"IET Commun."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MCOM.2017.1600363CM","article-title":"Security and Privacy for Cloud-Based IoT: Challenges","volume":"55","author":"Zhou","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_48","unstructured":"3GPP (2025, January 20). 3G Security; Lawful Interception Requirements. Technical Specification (TS) 33.106, 3rd Generation Partnership Project (3GPP). Available online: https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=2265."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Lange, S., Gringoli, F., Hollick, M., and Classen, J. (2024, January 16\u201320). Wherever I May Roam: Stealthy Interception and Injection Attacks Through Roaming Agreements. Proceedings of the European Symposium on Research in Computer Security, Bydgoszcz, Poland.","DOI":"10.1007\/978-3-031-70903-6_11"},{"key":"ref_50","unstructured":"(2025, January 21). open5gs.org. Available online: https:\/\/open5gs.org."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1109\/OJCOMS.2021.3057679","article-title":"The Road Towards 6G: A Comprehensive Survey","volume":"2","author":"Jiang","year":"2021","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref_52","unstructured":"Shahraki, A., Abbasi, M., Piran, M.J., and Taherkordi, A. (2021). A Comprehensive Survey on 6G Networks:Applications, Core Services, Enabling Technologies, and Future Challenges. arXiv."},{"key":"ref_53","unstructured":"Yang, M., Qu, Y., Ranbaduge, T., Thapa, C., Sultan, N., Ding, M., Suzuki, H., Ni, W., Abuadbba, S., and Smith, D. (2024). From 5G to 6G: A Survey on Security, Privacy, and Standardization Pathways. arXiv."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"21320","DOI":"10.1109\/ACCESS.2024.3359992","article-title":"Leveraging Network Data Analytics Function and Machine Learning for Data Collection, Resource Optimization, Security and Privacy in 6G Networks","volume":"12","author":"Gkonis","year":"2024","journal-title":"IEEE Access"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Abdel Hakeem, S.A., Hussein, H.H., and Kim, H. (2022). Security Requirements and Challenges of 6G Technologies and Applications. Sensors, 22.","DOI":"10.3390\/s22051969"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1016\/j.dcan.2020.07.003","article-title":"Security and privacy in 6G networks: New areas and new challenges","volume":"6","author":"Wang","year":"2020","journal-title":"Digit. Commun. Netw."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"e4233","DOI":"10.1002\/ett.4233","article-title":"6G: A comprehensive survey on technologies, applications, challenges, and research problems","volume":"32","author":"Mahmoud","year":"2021","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Pujolle, G., and Urien, P. (2024, January 4\u20136). A New Generation of Security for the 6G. Proceedings of the 2024 8th Cyber Security in Networking Conference (CSNet), Paris, France.","DOI":"10.1109\/CSNet64211.2024.10851745"},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"2694","DOI":"10.1109\/COMST.2020.3011561","article-title":"When Machine Learning Meets Privacy in 6G: A Survey","volume":"22","author":"Sun","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"2384","DOI":"10.1109\/COMST.2021.3108618","article-title":"Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges","volume":"23","author":"Nguyen","year":"2021","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3662179","article-title":"A Survey on Privacy of Personal and Non-Personal Data in B5G\/6G Networks","volume":"56","author":"Sandeepa","year":"2024","journal-title":"ACM Comput. Surv."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"3940","DOI":"10.1109\/TCE.2024.3371928","article-title":"Privacy-Preserving AI Framework for 6G-enabled Consumer Electronics","volume":"70","author":"Wang","year":"2024","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Siriwardhana, Y., Porambage, P., Liyanage, M., and Ylianttila, M. (2021, January 8\u201311). AI and 6G Security: Opportunities and Challenges. Proceedings of the 2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC\/6G Summit), Porto, Portugal.","DOI":"10.1109\/EuCNC\/6GSummit51104.2021.9482503"},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Navaie, K. (2024). Personal Data Protection in AI-Native 6G Systems. arXiv.","DOI":"10.2139\/ssrn.4874341"},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Ismail, L., and Buyya, R. (2022). Artificial Intelligence Applications and Self-Learning 6G Networks for Smart Cities Digital Ecosystems: Taxonomy, Challenges, and Future Directions. Sensors, 22.","DOI":"10.3390\/s22155750"},{"key":"ref_66","unstructured":"Li, S., Lin, X., Liu, Y., and Li, J. (2024). Trustworthy AI-Generative Content in Intelligent 6G Network: Adversarial, Privacy, and Fairness. arXiv."},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Uwaoma, C. (2023). On Security Strategies for Addressing Potential Vulnerabilities in 6G Technologies Deployable in Healthcare. arXiv.","DOI":"10.2196\/preprints.52593"},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1109\/MWC.005.2400019","article-title":"When Large Language Model Agents Meet 6G Networks: Perception, Grounding, and Alignment","volume":"31","author":"Xu","year":"2024","journal-title":"IEEE Wirel. Commun."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"2490","DOI":"10.1109\/OJCOMS.2024.3386872","article-title":"Explainable AI for 6G Use Cases: Technical Aspects and Research Challenges","volume":"5","author":"Wang","year":"2024","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref_70","unstructured":"Ylianttila, M., Kantola, R., Gurtov, A., Mucchi, L., Oppermann, I., Yan, Z., Nguyen, T.H., Liu, F., Hewa, T., and Liyanage, M. (2020). 6G White paper: Research challenges for Trust, Security and Privacy. arXiv."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"190255","DOI":"10.1109\/ACCESS.2024.3516194","article-title":"A User-Centric Perspective of 6G Networks: A Survey","volume":"12","author":"Drampalou","year":"2024","journal-title":"IEEE Access"},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Guo, S., Zhang, A., Wang, Y., Feng, C., and Quek, T.Q. (2024). Trustworthy Semantic-Enabled 6G Communication: A Task-oriented and Privacy-preserving Perspective. arXiv.","DOI":"10.36227\/techrxiv.172306348.85317734\/v1"},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Dass, P., Ujjwal, S., Novotny, J., Zolotavkin, Y., Laaroussi, Z., and K\u00f6psell, S. (2024, January 4\u20135). Addressing Privacy Concerns in Joint Communication and Sensing for 6G Networks: Challenges and Prospects. Proceedings of the Annual Privacy Forum, Karlstad, Sweden.","DOI":"10.1007\/978-3-031-68024-3_5"},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1109\/OJCOMS.2023.3244274","article-title":"The Road to Trustworthy 6G: A survey on Trust Anchor Technologies","volume":"4","author":"Veith","year":"2023","journal-title":"IEEE Open J. Commun. Soc."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/4\/142\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:59:40Z","timestamp":1760029180000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/4\/142"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,25]]},"references-count":74,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,4]]}},"alternative-id":["fi17040142"],"URL":"https:\/\/doi.org\/10.3390\/fi17040142","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,25]]}}}