{"id":"https://openalex.org/W4413639920","doi":"https://doi.org/10.1109/csr64739.2025.11130031","title":"DLT-EVA: Hardening O-RAN Auditing and Digital Evidence Preservation Through Blockchain","display_name":"DLT-EVA: Hardening O-RAN Auditing and Digital Evidence Preservation Through Blockchain","publication_year":2025,"publication_date":"2025-08-04","ids":{"openalex":"https://openalex.org/W4413639920","doi":"https://doi.org/10.1109/csr64739.2025.11130031"},"language":"en","primary_location":{"id":"doi:10.1109/csr64739.2025.11130031","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130031","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.1109/CSR64739.2025.11130031","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5095705957","display_name":"Konstantinos Ntouros","orcid":null},"institutions":[{"id":"https://openalex.org/I158716096","display_name":"University of Peloponnese","ror":"https://ror.org/04d4d3c02","country_code":"GR","type":"education","lineage":["https://openalex.org/I158716096"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Konstantinos Ntouros","raw_affiliation_strings":["University of the Peloponnese,Department of Informatics and Telecommunications,Tripolis,Greece,22131"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of the Peloponnese,Department of Informatics and Telecommunications,Tripolis,Greece,22131","institution_ids":["https://openalex.org/I158716096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119433213","display_name":"Eleftherios Poulitsis","orcid":null},"institutions":[{"id":"https://openalex.org/I158716096","display_name":"University of Peloponnese","ror":"https://ror.org/04d4d3c02","country_code":"GR","type":"education","lineage":["https://openalex.org/I158716096"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Eleftherios Poulitsis","raw_affiliation_strings":["University of the Peloponnese,Department of Informatics and Telecommunications,Tripolis,Greece,22131"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of the Peloponnese,Department of Informatics and Telecommunications,Tripolis,Greece,22131","institution_ids":["https://openalex.org/I158716096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046047424","display_name":"Sotirios Brotsis","orcid":"https://orcid.org/0000-0002-6053-7980"},"institutions":[{"id":"https://openalex.org/I158716096","display_name":"University of Peloponnese","ror":"https://ror.org/04d4d3c02","country_code":"GR","type":"education","lineage":["https://openalex.org/I158716096"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Sotirios Brotsis","raw_affiliation_strings":["University of the Peloponnese,Department of Informatics and Telecommunications,Tripolis,Greece,22131"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of the Peloponnese,Department of Informatics and Telecommunications,Tripolis,Greece,22131","institution_ids":["https://openalex.org/I158716096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083499892","display_name":"Konstantinos-Panagiotis Grammatikakis","orcid":"https://orcid.org/0000-0002-7128-7585"},"institutions":[{"id":"https://openalex.org/I158716096","display_name":"University of Peloponnese","ror":"https://ror.org/04d4d3c02","country_code":"GR","type":"education","lineage":["https://openalex.org/I158716096"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Konstantinos P. Grammatikakis","raw_affiliation_strings":["University of the Peloponnese,Department of Informatics and Telecommunications,Tripolis,Greece,22131"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of the Peloponnese,Department of Informatics and Telecommunications,Tripolis,Greece,22131","institution_ids":["https://openalex.org/I158716096"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054122221","display_name":"Nicholas Kolokotronis","orcid":"https://orcid.org/0000-0003-0660-8431"},"institutions":[{"id":"https://openalex.org/I158716096","display_name":"University of Peloponnese","ror":"https://ror.org/04d4d3c02","country_code":"GR","type":"education","lineage":["https://openalex.org/I158716096"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Nicholas Kolokotronis","raw_affiliation_strings":["University of the Peloponnese,Department of Informatics and Telecommunications,Tripolis,Greece,22131"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of the Peloponnese,Department of Informatics and Telecommunications,Tripolis,Greece,22131","institution_ids":["https://openalex.org/I158716096"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5095705957"],"corresponding_institution_ids":["https://openalex.org/I158716096"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.31810381,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1075","last_page":"1081"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9855999946594238,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9855999946594238,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9139999747276306,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.8372641205787659},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.6313825845718384},{"id":"https://openalex.org/keywords/ran","display_name":"Ran","score":0.5461971163749695},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.45682859420776367},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37103426456451416},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.2758166790008545},{"id":"https://openalex.org/keywords/accounting","display_name":"Accounting","score":0.22664320468902588},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1273505687713623}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.8372641205787659},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.6313825845718384},{"id":"https://openalex.org/C160704184","wikidata":"https://www.wikidata.org/wiki/Q18031028","display_name":"Ran","level":2,"score":0.5461971163749695},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.45682859420776367},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37103426456451416},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.2758166790008545},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.22664320468902588},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1273505687713623}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/csr64739.2025.11130031","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130031","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},{"id":"pmh:oai:zenodo.org:17786029","is_oa":true,"landing_page_url":"https://doi.org/10.1109/CSR64739.2025.11130031","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"CSR, 2025 IEEE International Conference on Cyber Security and Resilience, Chania, Crete, Greece, 04-06 August 2025","raw_type":"info:eu-repo/semantics/conferencePaper"}],"best_oa_location":{"id":"pmh:oai:zenodo.org:17786029","is_oa":true,"landing_page_url":"https://doi.org/10.1109/CSR64739.2025.11130031","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"CSR, 2025 IEEE International Conference on Cyber Security and Resilience, Chania, Crete, Greece, 04-06 August 2025","raw_type":"info:eu-repo/semantics/conferencePaper"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W3048554917","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047"],"abstract_inverted_index":{"The":[0,32],"open":[1],"radio":[2],"access":[3],"network":[4,51],"(O-RAN)":[5],"includes":[6],"innovative":[7],"building":[8],"blocks,":[9],"like":[10],"the":[11,27,44,60,81,132,148],"near-real":[12],"time":[13],"RAN":[14,116],"intelligent":[15],"controller":[16],"and":[17,30,58,112,123,155],"extensible":[18],"applications,":[19],"among":[20],"others,":[21],"that":[22,117],"provide":[23],"effective":[24],"management":[25,78],"of":[26,34,84,137,151],"communications":[28],"infrastructure":[29],"services.":[31,156],"integration":[33],"potentially":[35],"untrusted":[36],"thirdparty":[37],"applications":[38,154],"raises":[39],"significant":[40],"security":[41,65,86],"concerns,":[42],"while":[43],"transition":[45],"to":[46,62,69,104],"softwarized":[47],"networks":[48],"driven":[49],"by":[50],"function":[52],"virtualization":[53],"extends":[54],"O-RAN":[55,153],"attack":[56],"surface":[57],"increases":[59],"threats":[61],"consider.":[63],"Although":[64],"event":[66,87],"logging":[67],"contributes":[68],"adversarial":[70],"behavior":[71],"detection":[72],"in":[73,114],"O-RAN,":[74],"an":[75],"elaborate":[76],"log":[77,126],"architecture":[79],"for":[80,107],"secure":[82,124,149],"preservation":[83,111],"important":[85],"information":[88],"is":[89,129,135],"still":[90],"at":[91],"its":[92],"early":[93],"stages.":[94],"In":[95],"this":[96],"paper,":[97],"we":[98],"propose":[99],"a":[100],"blockchain-enabled":[101],"framework,":[102],"referred":[103],"as":[105],"DLTEVA,":[106],"trusted":[108],"digital":[109],"evidence":[110],"auditing":[113],"$O-$":[115],"employs":[118],"advanced":[119],"remote":[120,143],"attestation":[121,144],"techniques":[122],"distributed":[125],"management.":[127],"It":[128],"shown":[130],"how":[131],"proposed":[133],"framework":[134],"capable":[136],"defending":[138],"against":[139],"sophisticated":[140],"cyberattacks":[141],"on":[142],"systems,":[145],"therefore":[146],"ensuring":[147],"operation":[150],"critical":[152]},"counts_by_year":[],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2025-10-10T00:00:00"}
