{"id":"https://openalex.org/W4384834255","doi":"https://doi.org/10.23919/cycon58705.2023.10182173","title":"Modeling 5G Threat Scenarios for Critical Infrastructure Protection","display_name":"Modeling 5G Threat Scenarios for Critical Infrastructure Protection","publication_year":2023,"publication_date":"2023-05-29","ids":{"openalex":"https://openalex.org/W4384834255","doi":"https://doi.org/10.23919/cycon58705.2023.10182173"},"language":"en","primary_location":{"id":"doi:10.23919/cycon58705.2023.10182173","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cycon58705.2023.10182173","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008131672","display_name":"Gerrit Holtrup","orcid":null},"institutions":[{"id":"https://openalex.org/I4210116793","display_name":"Kudelski (Switzerland)","ror":"https://ror.org/022m5tt98","country_code":"CH","type":"company","lineage":["https://openalex.org/I4210116793"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Gerrit Holtrup","raw_affiliation_strings":["Kudelski IoT Security,Cheseaux-sur-Lausanne,Switzerland","Kudelski IoT Security, Cheseaux-sur-Lausanne, Switzerland"],"affiliations":[{"raw_affiliation_string":"Kudelski IoT Security,Cheseaux-sur-Lausanne,Switzerland","institution_ids":["https://openalex.org/I4210116793"]},{"raw_affiliation_string":"Kudelski IoT Security, Cheseaux-sur-Lausanne, Switzerland","institution_ids":["https://openalex.org/I4210116793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092503372","display_name":"William Blonay","orcid":null},"institutions":[{"id":"https://openalex.org/I2802296436","display_name":"NATO Cooperative Cyber Defence Centre of Excellence","ror":"https://ror.org/050reks70","country_code":"EE","type":"facility","lineage":["https://openalex.org/I2802296436","https://openalex.org/I4210162703"]}],"countries":["EE"],"is_corresponding":false,"raw_author_name":"William Blonay","raw_affiliation_strings":["NATO CCDCOE,Tallinn,Estonia","NATO CCDCOE, Tallinn, Estonia"],"affiliations":[{"raw_affiliation_string":"NATO CCDCOE,Tallinn,Estonia","institution_ids":["https://openalex.org/I2802296436"]},{"raw_affiliation_string":"NATO CCDCOE, Tallinn, Estonia","institution_ids":["https://openalex.org/I2802296436"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079874685","display_name":"Martin Strohmeier","orcid":"https://orcid.org/0000-0002-1936-0933"},"institutions":[{"id":"https://openalex.org/I4210156213","display_name":"American Rock Mechanics Association","ror":"https://ror.org/05vfrxy92","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210156213"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Martin Strohmeier","raw_affiliation_strings":["armasuisse Science and Technology,Thun,Switzerland","armasuisse Science and Technology, Thun, Switzerland"],"affiliations":[{"raw_affiliation_string":"armasuisse Science and Technology,Thun,Switzerland","institution_ids":["https://openalex.org/I4210156213"]},{"raw_affiliation_string":"armasuisse Science and Technology, Thun, Switzerland","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072777494","display_name":"Alain Mermoud","orcid":"https://orcid.org/0000-0001-6471-772X"},"institutions":[{"id":"https://openalex.org/I4210156213","display_name":"American Rock Mechanics Association","ror":"https://ror.org/05vfrxy92","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210156213"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alain Mermoud","raw_affiliation_strings":["armasuisse Science and Technology,Thun,Switzerland","armasuisse Science and Technology, Thun, Switzerland"],"affiliations":[{"raw_affiliation_string":"armasuisse Science and Technology,Thun,Switzerland","institution_ids":["https://openalex.org/I4210156213"]},{"raw_affiliation_string":"armasuisse Science and Technology, Thun, Switzerland","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092503373","display_name":"Jean-Pascal Chavanne","orcid":null},"institutions":[{"id":"https://openalex.org/I4210089841","display_name":"Federal Department of Justice and Police","ror":"https://ror.org/00d2zfh55","country_code":"CH","type":"government","lineage":["https://openalex.org/I4210089841","https://openalex.org/I4210120539"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Jean-Pascal Chavanne","raw_affiliation_strings":["Federal Department of Justice and Police,Bern,Switzerland","Federal Department of Justice and Police, Bern, Switzerland"],"affiliations":[{"raw_affiliation_string":"Federal Department of Justice and Police,Bern,Switzerland","institution_ids":["https://openalex.org/I4210089841"]},{"raw_affiliation_string":"Federal Department of Justice and Police, Bern, Switzerland","institution_ids":["https://openalex.org/I4210089841"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048330561","display_name":"Vincent Lenders","orcid":"https://orcid.org/0000-0002-2289-3722"},"institutions":[{"id":"https://openalex.org/I4210156213","display_name":"American Rock Mechanics Association","ror":"https://ror.org/05vfrxy92","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210156213"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vincent Lenders","raw_affiliation_strings":["armasuisse Science and Technology,Thun,Switzerland","armasuisse Science and Technology, Thun, Switzerland"],"affiliations":[{"raw_affiliation_string":"armasuisse Science and Technology,Thun,Switzerland","institution_ids":["https://openalex.org/I4210156213"]},{"raw_affiliation_string":"armasuisse Science and Technology, Thun, Switzerland","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5008131672"],"corresponding_institution_ids":["https://openalex.org/I4210116793"],"apc_list":null,"apc_paid":null,"fwci":0.5245,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.70613838,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"161","last_page":"180"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.773311972618103},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7252445816993713},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.5370015501976013},{"id":"https://openalex.org/keywords/cellular-network","display_name":"Cellular network","score":0.49147021770477295},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.47091174125671387},{"id":"https://openalex.org/keywords/network-access-control","display_name":"Network Access Control","score":0.4633728861808777},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.420791357755661},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4149532616138458},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.41294047236442566},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.25057435035705566},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.1294684112071991}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.773311972618103},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7252445816993713},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.5370015501976013},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.49147021770477295},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.47091174125671387},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.4633728861808777},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.420791357755661},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4149532616138458},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.41294047236442566},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.25057435035705566},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.1294684112071991},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/cycon58705.2023.10182173","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cycon58705.2023.10182173","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6200000047683716,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1992291252","https://openalex.org/W2029344129","https://openalex.org/W2809727329","https://openalex.org/W2889791335","https://openalex.org/W4221128938","https://openalex.org/W4284881889","https://openalex.org/W4306407034","https://openalex.org/W4312460360"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W4312814274","https://openalex.org/W1482973429","https://openalex.org/W1824983686","https://openalex.org/W4200223299","https://openalex.org/W3130460901"],"abstract_inverted_index":{"Fifth-generation":[0],"cellular":[1],"networks":[2,128],"(5G)":[3],"are":[4,129],"currently":[5],"being":[6],"deployed":[7],"by":[8,63],"mobile":[9],"operators":[10],"around":[11],"the":[12,40,54,74,78,84,91,94,107,112,138,141,158,170,181,185,196,201,208,233,253],"globe.":[13],"5G":[14,41,59,66,79,134,146,197,234,258],"is":[15,81,99,110,224,246],"an":[16],"enabler":[17],"for":[18,48],"many":[19,123],"use":[20],"cases":[21],"and":[22,25,29,172,184,228,241,248],"improves":[23],"security":[24,36,46,124,142,235,242],"privacy":[26],"over":[27],"4G":[28,57,103,114,127],"previous":[30],"network":[31,109,186,222,259],"generations.":[32],"However,":[33],"as":[34],"recent":[35],"research":[37],"has":[38,44],"revealed,":[39],"standard":[42],"still":[43,100,111,130],"technical":[45],"weaknesses":[47],"attackers":[49],"to":[50,58,83,157],"exploit.":[51],"In":[52,211],"addition,":[53],"migration":[55],"from":[56],"systems":[60],"takes":[61],"place":[62],"first":[64,75],"deploying":[65],"solutions":[67],"in":[68,132,144],"a":[69,121,165,213],"non-standalone":[70],"(NSA)":[71],"manner,":[72],"where":[73,215],"step":[76],"of":[77,88,96,126,174,255],"deployment":[80],"restricted":[82],"new":[85],"radio":[86,182],"aspects":[87],"5G.":[89],"At":[90],"same":[92],"time,":[93],"control":[95],"user":[97],"equipment":[98],"based":[101,168],"on":[102,169,195,252],"protocols;":[104],"that":[105,179,190],"is,":[106],"core":[108,117],"legacy":[113],"evolved":[115],"packet":[116],"(EPC)":[118],"network.":[119],"As":[120],"result,":[122],"vulnerabilities":[125,194],"present":[131],"current":[133,145],"deployments.":[135],"To":[136,231],"stimulate":[137],"discussion":[139],"about":[140],"risks":[143],"networks,":[147],"particularly":[148],"regarding":[149],"critical":[150],"infrastructures,":[151],"we":[152,237],"model":[153],"possible":[154,239],"threats":[155],"according":[156],"STRIDE":[159],"threat":[160,176,204],"classification":[161],"model.":[162],"We":[163,188],"derive":[164],"risk":[166],"matrix":[167],"likelihood":[171],"impact":[173],"eleven":[175],"scenarios":[177],"(TS)":[178],"affect":[180],"access":[183],"core.":[187],"estimate":[189],"malware":[191],"or":[192,261],"software":[193],"base":[198],"station":[199],"constitute":[200],"most":[202,209],"impactful":[203],"scenario,":[205],"though":[206],"not":[207,250],"probable.":[210],"contrast,":[212],"scenario":[214],"compromised":[216],"cryptographic":[217],"keys":[218],"threaten":[219],"communications":[220],"between":[221],"functions":[223],"both":[225],"highly":[226,229],"probable":[227],"impactful.":[230],"improve":[232],"posture,":[236],"discuss":[238],"mitigations":[240],"controls.":[243],"Our":[244],"analysis":[245],"generalizable":[247],"does":[249],"depend":[251],"specifics":[254],"any":[256],"particular":[257],"vendor":[260],"operator.":[262]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
