{"id":"https://openalex.org/W4320031170","doi":"https://doi.org/10.1109/milcom55135.2022.10017753","title":"5G-Enabled Defence-in-Depth for Multi-domain Operations","display_name":"5G-Enabled Defence-in-Depth for Multi-domain Operations","publication_year":2022,"publication_date":"2022-11-28","ids":{"openalex":"https://openalex.org/W4320031170","doi":"https://doi.org/10.1109/milcom55135.2022.10017753"},"language":"en","primary_location":{"id":"doi:10.1109/milcom55135.2022.10017753","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/milcom55135.2022.10017753","pdf_url":null,"source":{"id":"https://openalex.org/S4363608114","display_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032332214","display_name":"S\u0142awomir Kukli\u0144ski","orcid":"https://orcid.org/0000-0002-2954-3418"},"institutions":[{"id":"https://openalex.org/I108403487","display_name":"Warsaw University of Technology","ror":"https://ror.org/00y0xnp53","country_code":"PL","type":"education","lineage":["https://openalex.org/I108403487"]},{"id":"https://openalex.org/I126469861","display_name":"Orange (Poland)","ror":"https://ror.org/05dt0hn88","country_code":"PL","type":"company","lineage":["https://openalex.org/I126469861","https://openalex.org/I19370010"]}],"countries":["PL"],"is_corresponding":true,"raw_author_name":"Slawomir Kuklinski","raw_affiliation_strings":["Warsaw University of Technology,Warsaw,Poland","Orange Polska, Warsaw, Poland","Warsaw University of Technology, Warsaw, Poland"],"affiliations":[{"raw_affiliation_string":"Warsaw University of Technology,Warsaw,Poland","institution_ids":["https://openalex.org/I108403487"]},{"raw_affiliation_string":"Orange Polska, Warsaw, Poland","institution_ids":["https://openalex.org/I126469861"]},{"raw_affiliation_string":"Warsaw University of Technology, Warsaw, Poland","institution_ids":["https://openalex.org/I108403487"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009166088","display_name":"Krzysztof Szczypiorski","orcid":"https://orcid.org/0000-0001-8638-8584"},"institutions":[{"id":"https://openalex.org/I108403487","display_name":"Warsaw University of Technology","ror":"https://ror.org/00y0xnp53","country_code":"PL","type":"education","lineage":["https://openalex.org/I108403487"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Krzysztof Szczypiorski","raw_affiliation_strings":["Warsaw University of Technology,Warsaw,Poland","Warsaw University of Technology, Warsaw, Poland"],"affiliations":[{"raw_affiliation_string":"Warsaw University of Technology,Warsaw,Poland","institution_ids":["https://openalex.org/I108403487"]},{"raw_affiliation_string":"Warsaw University of Technology, Warsaw, Poland","institution_ids":["https://openalex.org/I108403487"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011301282","display_name":"Konrad Wrona","orcid":"https://orcid.org/0000-0002-3362-9820"},"institutions":[{"id":"https://openalex.org/I4210165920","display_name":"European Network for Cyber Security","ror":"https://ror.org/0584wbt59","country_code":"NL","type":"nonprofit","lineage":["https://openalex.org/I4210165920"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Konrad Wrona","raw_affiliation_strings":["NATO Cyber Security Centre,The Hague,The Netherlands","NATO Cyber Security Centre, The Hague, The Netherlands"],"affiliations":[{"raw_affiliation_string":"NATO Cyber Security Centre,The Hague,The Netherlands","institution_ids":["https://openalex.org/I4210165920"]},{"raw_affiliation_string":"NATO Cyber Security Centre, The Hague, The Netherlands","institution_ids":["https://openalex.org/I4210165920"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054710508","display_name":"J\u0119drzej Bieniasz","orcid":"https://orcid.org/0000-0002-4033-4684"},"institutions":[{"id":"https://openalex.org/I108403487","display_name":"Warsaw University of Technology","ror":"https://ror.org/00y0xnp53","country_code":"PL","type":"education","lineage":["https://openalex.org/I108403487"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Jedrzej Bieniasz","raw_affiliation_strings":["Warsaw University of Technology,Warsaw,Poland","Warsaw University of Technology, Warsaw, Poland"],"affiliations":[{"raw_affiliation_string":"Warsaw University of Technology,Warsaw,Poland","institution_ids":["https://openalex.org/I108403487"]},{"raw_affiliation_string":"Warsaw University of Technology, Warsaw, Poland","institution_ids":["https://openalex.org/I108403487"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5032332214"],"corresponding_institution_ids":["https://openalex.org/I108403487","https://openalex.org/I126469861"],"apc_list":null,"apc_paid":null,"fwci":0.2079,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.4634777,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7747457027435303},{"id":"https://openalex.org/keywords/roaming","display_name":"Roaming","score":0.7467402219772339},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7199490666389465},{"id":"https://openalex.org/keywords/provisioning","display_name":"Provisioning","score":0.6737390160560608},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.61396324634552},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5162889361381531},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.50468909740448},{"id":"https://openalex.org/keywords/cellular-network","display_name":"Cellular network","score":0.49554574489593506},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.4757075905799866},{"id":"https://openalex.org/keywords/network-access-control","display_name":"Network Access Control","score":0.44918498396873474},{"id":"https://openalex.org/keywords/umts-frequency-bands","display_name":"UMTS frequency bands","score":0.43887725472450256},{"id":"https://openalex.org/keywords/enterprise-information-security-architecture","display_name":"Enterprise information security architecture","score":0.4150887131690979},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.34553003311157227},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.20696449279785156},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.20467934012413025}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7747457027435303},{"id":"https://openalex.org/C194498986","wikidata":"https://www.wikidata.org/wiki/Q680016","display_name":"Roaming","level":2,"score":0.7467402219772339},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7199490666389465},{"id":"https://openalex.org/C172191483","wikidata":"https://www.wikidata.org/wiki/Q1071806","display_name":"Provisioning","level":2,"score":0.6737390160560608},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.61396324634552},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5162889361381531},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.50468909740448},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.49554574489593506},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.4757075905799866},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.44918498396873474},{"id":"https://openalex.org/C101618186","wikidata":"https://www.wikidata.org/wiki/Q3633928","display_name":"UMTS frequency bands","level":2,"score":0.43887725472450256},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.4150887131690979},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.34553003311157227},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.20696449279785156},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.20467934012413025},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom55135.2022.10017753","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/milcom55135.2022.10017753","pdf_url":null,"source":{"id":"https://openalex.org/S4363608114","display_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.46000000834465027,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W2298376471","https://openalex.org/W2566006170","https://openalex.org/W2976189582","https://openalex.org/W3183324723","https://openalex.org/W4205546762","https://openalex.org/W4285205927","https://openalex.org/W4309050063"],"related_works":["https://openalex.org/W2369138185","https://openalex.org/W2118242884","https://openalex.org/W2945277231","https://openalex.org/W2159826821","https://openalex.org/W1528030171","https://openalex.org/W2086421870","https://openalex.org/W2145201392","https://openalex.org/W2116071707","https://openalex.org/W2390752026","https://openalex.org/W3214824720"],"abstract_inverted_index":{"In":[0,18,38],"many":[1],"civil":[2],"and":[3,31,54,60,64,80,91,115,137],"military":[4],"use":[5,86],"cases,":[6],"5G":[7,25,45,62,95,100],"can":[8],"be":[9],"a":[10,13,20],"segment":[11],"of":[12,52,131],"more":[14],"complex":[15],"end-to-end":[16,108,122],"solution.":[17],"such":[19],"configuration,":[21],"properly":[22],"using":[23],"the":[24,43,50,65,77,89,99,105,129,148],"security":[26,46,96,110,132,141],"mechanisms":[27,47,97],"to":[28,49,68,120],"achieve":[29],"defence-in-depth":[30,109,123],"compliance":[32],"with":[33],"zero-trust":[34],"architecture":[35],"is":[36,138,145],"challenging.":[37],"our":[39],"paper,":[40],"we":[41,116],"discuss":[42,104],"existing":[44],"related":[48],"connection":[51],"trusted":[53],"untrusted":[55],"non-3GPP":[56],"access":[57],"networks":[58],"(wireless":[59],"wired),":[61],"roaming,":[63],"3GPP":[66],"approach":[67],"support":[69],"Uncrewed":[70],"Aerial":[71],"Services,":[72],"which":[73],"provides":[74],"authentication":[75],"between":[76],"mobile":[78],"terminal":[79],"an":[81],"external":[82],"server.":[83],"The":[84,125,143],"identified":[85],"cases":[87],"show":[88],"need":[90],"opportunities":[92],"for":[93,107],"reusing":[94],"beyond":[98],"network":[101,150],"domain.":[102],"We":[103],"options":[106],"provisioning":[111],"in":[112,134],"multi-domain":[113,149],"networks,":[114],"present":[117],"two":[118],"approaches":[119],"providing":[121],"mechanisms.":[124],"first":[126],"relies":[127],"on":[128,140,147],"alignment":[130],"policies":[133],"multiple":[135],"domains":[136],"based":[139,146],"proxies.":[142],"second":[144],"slices.":[151]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
