{"id":"https://openalex.org/W7126102739","doi":"https://doi.org/10.1109/wpmc67460.2025.11351202","title":"Cybersecurity Risks to Industrial Control Systems in the Age of 5G and Beyond","display_name":"Cybersecurity Risks to Industrial Control Systems in the Age of 5G and Beyond","publication_year":2025,"publication_date":"2025-11-09","ids":{"openalex":"https://openalex.org/W7126102739","doi":"https://doi.org/10.1109/wpmc67460.2025.11351202"},"language":null,"primary_location":{"id":"doi:10.1109/wpmc67460.2025.11351202","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wpmc67460.2025.11351202","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 28th International Symposium on Wireless Personal Multimedia Communications (WPMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124210187","display_name":"Ana Koren","orcid":null},"institutions":[{"id":"https://openalex.org/I4210122686","display_name":"River Publishers (Denmark)","ror":"https://ror.org/02nen7n37","country_code":"DK","type":"company","lineage":["https://openalex.org/I4210122686"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Ana Koren","raw_affiliation_strings":["River Publishers,Zagreb,Croatia"],"affiliations":[{"raw_affiliation_string":"River Publishers,Zagreb,Croatia","institution_ids":["https://openalex.org/I4210122686"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5124194565","display_name":"Ramjee Prasad","orcid":null},"institutions":[{"id":"https://openalex.org/I891191580","display_name":"Aalborg University","ror":"https://ror.org/04m5j1k67","country_code":"DK","type":"education","lineage":["https://openalex.org/I891191580"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Ramjee Prasad","raw_affiliation_strings":["CTIF GLOBAL CAPSULE,Aalborg,Denmark"],"affiliations":[{"raw_affiliation_string":"CTIF GLOBAL CAPSULE,Aalborg,Denmark","institution_ids":["https://openalex.org/I891191580"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5124210187"],"corresponding_institution_ids":["https://openalex.org/I4210122686"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.70659455,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9666000008583069,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9666000008583069,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.003700000001117587,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10763","display_name":"Digital Transformation in Industry","score":0.002899999963119626,"subfield":{"id":"https://openalex.org/subfields/2209","display_name":"Industrial and Manufacturing Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.6789000034332275},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.6182000041007996},{"id":"https://openalex.org/keywords/control-system-security","display_name":"Control system security","score":0.5091999769210815},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4611000120639801},{"id":"https://openalex.org/keywords/digital-transformation","display_name":"Digital transformation","score":0.4047999978065491},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.4011000096797943}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6801999807357788},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.6789000034332275},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.6182000041007996},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5343000292778015},{"id":"https://openalex.org/C172862783","wikidata":"https://www.wikidata.org/wiki/Q5165888","display_name":"Control system security","level":5,"score":0.5091999769210815},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4611000120639801},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.41830000281333923},{"id":"https://openalex.org/C126082660","wikidata":"https://www.wikidata.org/wiki/Q4252370","display_name":"Digital transformation","level":2,"score":0.4047999978065491},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.4011000096797943},{"id":"https://openalex.org/C207267971","wikidata":"https://www.wikidata.org/wiki/Q120208","display_name":"Emerging technologies","level":2,"score":0.38609999418258667},{"id":"https://openalex.org/C2779033394","wikidata":"https://www.wikidata.org/wiki/Q5186733","display_name":"Critical infrastructure protection","level":3,"score":0.358599990606308},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.33820000290870667},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.33160001039505005},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.298799991607666},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.29649999737739563},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.26170000433921814},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.2529999911785126},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.25189998745918274}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wpmc67460.2025.11351202","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wpmc67460.2025.11351202","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 28th International Symposium on Wireless Personal Multimedia Communications (WPMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6695348620414734,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1557652964","https://openalex.org/W1990067238","https://openalex.org/W2012446724","https://openalex.org/W2052588183","https://openalex.org/W2094741359","https://openalex.org/W2142993476","https://openalex.org/W2550453031","https://openalex.org/W2619874920","https://openalex.org/W2901648808","https://openalex.org/W2968746919","https://openalex.org/W3004344782","https://openalex.org/W3005666569","https://openalex.org/W3035677232","https://openalex.org/W3137262157","https://openalex.org/W4383898261","https://openalex.org/W4384835155","https://openalex.org/W4386881452"],"related_works":[],"abstract_inverted_index":{"Industrial":[0],"Control":[1],"Systems":[2],"(ICS)":[3],"form":[4],"the":[5,47,69,90],"backbone":[6],"of":[7,46],"critical":[8],"infrastructure":[9],"across":[10],"energy,":[11],"manufacturing,":[12],"transportation,":[13],"and":[14,20,76,84,98],"water":[15],"sectors.":[16],"As":[17],"digital":[18],"transformation":[19],"next-generation":[21],"wireless":[22],"technologies":[23],"such":[24],"as":[25],"5G":[26],"(and":[27],"soon":[28],"6G)":[29],"become":[30],"increasingly":[31],"integrated":[32],"into":[33],"ICS":[34,65],"environments,":[35],"new":[36],"cybersecurity":[37],"challenges":[38],"arise.":[39],"This":[40],"paper":[41],"provides":[42],"a":[43],"comprehensive":[44],"review":[45],"evolving":[48],"threat":[49,85,100],"landscape":[50],"targeting":[51],"ICS,":[52],"emphasizing":[53],"how":[54],"these":[55],"risks":[56],"are":[57],"amplified":[58],"by":[59,81],"emerging":[60],"technologies.":[61],"We":[62],"analyze":[63],"major":[64],"cyber":[66],"incidents,":[67],"highlight":[68],"specific":[70],"vulnerabilities":[71],"associated":[72],"with":[73],"ICS-5G":[74],"convergence,":[75],"outline":[77],"mitigation":[78],"strategies":[79],"informed":[80],"case":[82],"studies":[83],"modeling.":[86],"Our":[87],"findings":[88],"underscore":[89],"need":[91],"for":[92],"context-aware":[93],"security":[94],"models,":[95],"regulatory":[96],"harmonization,":[97],"proactive":[99],"intelligence":[101],"to":[102],"ensure":[103],"resilient":[104],"industrial":[105],"operations.":[106]},"counts_by_year":[],"updated_date":"2026-02-01T03:34:12.195049","created_date":"2026-01-30T00:00:00"}
