{"id":"https://openalex.org/W7117869585","doi":"https://doi.org/10.1109/6gnet68413.2025.11314082","title":"TAXI: Threat Analysis on the Xn Interface","display_name":"TAXI: Threat Analysis on the Xn Interface","publication_year":2025,"publication_date":"2025-12-17","ids":{"openalex":"https://openalex.org/W7117869585","doi":"https://doi.org/10.1109/6gnet68413.2025.11314082"},"language":null,"primary_location":{"id":"doi:10.1109/6gnet68413.2025.11314082","is_oa":false,"landing_page_url":"https://doi.org/10.1109/6gnet68413.2025.11314082","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 4th International Conference on 6G Networking (6GNet)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5121713447","display_name":"Amy Nymalm","orcid":null},"institutions":[{"id":"https://openalex.org/I4210163994","display_name":"Ericsson (Finland)","ror":"https://ror.org/04vv43q89","country_code":"FI","type":"company","lineage":["https://openalex.org/I1306339040","https://openalex.org/I4210163994"]}],"countries":["FI"],"is_corresponding":true,"raw_author_name":"Amy Nymalm","raw_affiliation_strings":["Ericsson Research,Finland"],"affiliations":[{"raw_affiliation_string":"Ericsson Research,Finland","institution_ids":["https://openalex.org/I4210163994"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020739384","display_name":"Sabina Zaman","orcid":null},"institutions":[{"id":"https://openalex.org/I4210163994","display_name":"Ericsson (Finland)","ror":"https://ror.org/04vv43q89","country_code":"FI","type":"company","lineage":["https://openalex.org/I1306339040","https://openalex.org/I4210163994"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Sabina Zaman","raw_affiliation_strings":["Ericsson Research,Finland"],"affiliations":[{"raw_affiliation_string":"Ericsson Research,Finland","institution_ids":["https://openalex.org/I4210163994"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121727574","display_name":"Eemeli V\u00e4h\u00e4passi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210163994","display_name":"Ericsson (Finland)","ror":"https://ror.org/04vv43q89","country_code":"FI","type":"company","lineage":["https://openalex.org/I1306339040","https://openalex.org/I4210163994"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Eemeli V\u00e4h\u00e4passi","raw_affiliation_strings":["Ericsson Research,Finland"],"affiliations":[{"raw_affiliation_string":"Ericsson Research,Finland","institution_ids":["https://openalex.org/I4210163994"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093111555","display_name":"Sonika Ujjwal","orcid":null},"institutions":[{"id":"https://openalex.org/I4210163994","display_name":"Ericsson (Finland)","ror":"https://ror.org/04vv43q89","country_code":"FI","type":"company","lineage":["https://openalex.org/I1306339040","https://openalex.org/I4210163994"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Sonika Ujjwal","raw_affiliation_strings":["Ericsson Research,Finland"],"affiliations":[{"raw_affiliation_string":"Ericsson Research,Finland","institution_ids":["https://openalex.org/I4210163994"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080169779","display_name":"Zakaria Laaroussi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210163994","display_name":"Ericsson (Finland)","ror":"https://ror.org/04vv43q89","country_code":"FI","type":"company","lineage":["https://openalex.org/I1306339040","https://openalex.org/I4210163994"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Zakaria Laaroussi","raw_affiliation_strings":["Ericsson Research,Finland"],"affiliations":[{"raw_affiliation_string":"Ericsson Research,Finland","institution_ids":["https://openalex.org/I4210163994"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5121713447"],"corresponding_institution_ids":["https://openalex.org/I4210163994"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.69607244,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"50","last_page":"58"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.2508000135421753,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.2508000135421753,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.15780000388622284,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.08219999819993973,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.664900004863739},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.6632999777793884},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.5641000270843506},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.46970000863075256},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.4327999949455261},{"id":"https://openalex.org/keywords/user-interface","display_name":"User interface","score":0.37439998984336853},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.3499999940395355},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.3474000096321106},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.328000009059906}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6974999904632568},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.664900004863739},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.6632999777793884},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6351000070571899},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.5641000270843506},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.46970000863075256},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4327999949455261},{"id":"https://openalex.org/C89505385","wikidata":"https://www.wikidata.org/wiki/Q47146","display_name":"User interface","level":2,"score":0.37439998984336853},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.3499999940395355},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.3474000096321106},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.34450000524520874},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.328000009059906},{"id":"https://openalex.org/C2776362087","wikidata":"https://www.wikidata.org/wiki/Q455112","display_name":"Air interface","level":3,"score":0.3156000077724457},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.31470000743865967},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.31060001254081726},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.3091000020503998},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.298799991607666},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.2946999967098236},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.2858999967575073},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.2833999991416931},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.2825999855995178},{"id":"https://openalex.org/C2778062554","wikidata":"https://www.wikidata.org/wiki/Q3404031","display_name":"Security community","level":2,"score":0.2768000066280365},{"id":"https://openalex.org/C2780264999","wikidata":"https://www.wikidata.org/wiki/Q7445032","display_name":"Security domain","level":2,"score":0.2671999931335449},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.2565000057220459},{"id":"https://openalex.org/C95491727","wikidata":"https://www.wikidata.org/wiki/Q992968","display_name":"Mobile telephony","level":3,"score":0.2563000023365021},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.2549000084400177},{"id":"https://openalex.org/C139366241","wikidata":"https://www.wikidata.org/wiki/Q135707","display_name":"Interface design","level":2,"score":0.25279998779296875},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.2508000135421753}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/6gnet68413.2025.11314082","is_oa":false,"landing_page_url":"https://doi.org/10.1109/6gnet68413.2025.11314082","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 4th International Conference on 6G Networking (6GNet)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W2976189582","https://openalex.org/W4318689604","https://openalex.org/W4406356239","https://openalex.org/W4407783983","https://openalex.org/W7125831640"],"related_works":[],"abstract_inverted_index":{"In":[0],"this":[1],"paper":[2],"we":[3,22,53,91],"examine":[4],"the":[5,8,24,43,47,51,63,77,81,88,111],"security":[6,40,105],"of":[7,65,84,110],"Xn":[9,78],"interface":[10,79],"in":[11,46],"5G":[12,28],"deployment":[13],"by":[14,75],"conducting":[15],"a":[16,55],"Threat":[17],"Analysis":[18],"(TA)":[19],"using":[20],"STRIDE,":[21],"assess":[23],"risks":[25],"from":[26],"different":[27],"deployments,":[29],"operator-specific":[30],"implementations":[31],"and":[32,107],"virtualization.":[33],"We":[34],"also":[35],"analyze":[36],"how":[37],"existing":[38],"3GPP":[39,97],"controls":[41],"mitigate":[42],"identified":[44],"threats":[45],"TA.":[48],"Building":[49],"on":[50,87],"findings":[52],"introduce":[54],"Zero":[56,66],"Trust":[57,67],"Architecture":[58],"(ZTA)":[59],"evaluation":[60],"to":[61,94,102],"explore":[62],"integration":[64],"(ZT)":[68],"principles":[69,101],"into":[70],"future":[71,108],"mobile":[72],"networks":[73],"generations,":[74],"evaluating":[76],"against":[80],"seven":[82],"tenets":[83],"ZT.":[85],"Based":[86],"gaps":[89],"found,":[90],"recommend":[92],"enhancements":[93],"better":[95],"align":[96],"standards":[98],"with":[99],"ZT":[100],"improve":[103],"overall":[104],"posture":[106],"development":[109],"interface.":[112]},"counts_by_year":[],"updated_date":"2026-01-02T23:11:23.791532","created_date":"2026-01-01T00:00:00"}
