{"id":"https://openalex.org/W7128802057","doi":"https://doi.org/10.48550/arxiv.2602.11820","title":"Solving the Post-Quantum Control Plane Bottleneck: Energy-Aware Cryptographic Scheduling in Open RAN","display_name":"Solving the Post-Quantum Control Plane Bottleneck: Energy-Aware Cryptographic Scheduling in Open RAN","publication_year":2026,"publication_date":"2026-02-12","ids":{"openalex":"https://openalex.org/W7128802057","doi":"https://doi.org/10.48550/arxiv.2602.11820"},"language":null,"primary_location":{"id":"pmh:doi:10.48550/arxiv.2602.11820","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5125923044","display_name":"Neha Gupta","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Gupta, Neha","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125903998","display_name":"Hamed Alimohammadi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Alimohammadi, Hamed","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125935700","display_name":"Mohammad Shojafar","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shojafar, Mohammad","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125951764","display_name":"De Mi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mi, De","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5125947719","display_name":"Muhammad N. M. Bhutta","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bhutta, Muhammad N. M.","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5125923044"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.44690001010894775,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.44690001010894775,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10579","display_name":"Cognitive Radio Networks and Spectrum Sensing","score":0.07090000063180923,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.03689999878406525,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scheduling","display_name":"Scheduling (production processes)","score":0.6432999968528748},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5170000195503235},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5110999941825867},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.48399999737739563},{"id":"https://openalex.org/keywords/bottleneck","display_name":"Bottleneck","score":0.4765999913215637},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4327000081539154},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.38760000467300415},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.37380000948905945},{"id":"https://openalex.org/keywords/efficient-energy-use","display_name":"Efficient energy use","score":0.3695000112056732}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7426999807357788},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.6432999968528748},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5666000247001648},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5170000195503235},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5110999941825867},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.48399999737739563},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.4765999913215637},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4327000081539154},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3937000036239624},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.38760000467300415},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.37380000948905945},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.3695000112056732},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.36489999294281006},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.3292999863624573},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.3131999969482422},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.31130000948905945},{"id":"https://openalex.org/C157607044","wikidata":"https://www.wikidata.org/wiki/Q5165851","display_name":"Control channel","level":3,"score":0.3052000105381012},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.289000004529953},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.2865999937057495},{"id":"https://openalex.org/C55416958","wikidata":"https://www.wikidata.org/wiki/Q6206757","display_name":"Job shop scheduling","level":3,"score":0.27649998664855957},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.26989999413490295},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2614000141620636},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.26080000400543213},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.25850000977516174},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2513999938964844}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:doi:10.48550/arxiv.2602.11820","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2602.11820","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.11820","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:doi:10.48550/arxiv.2602.11820","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[{"score":0.4900144338607788,"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,65,140],"Open":[1,116],"Radio":[2],"Access":[3,120],"Network":[4],"(O-RAN)":[5],"offers":[6],"flexibility":[7],"and":[8,106,131,153,179],"innovation":[9],"but":[10],"introduces":[11],"unique":[12],"security":[13,85],"vulnerabilities,":[14],"particularly":[15],"from":[16,183],"cryptographically":[17],"relevant":[18],"quantum":[19,58],"computers.":[20],"While":[21],"Post-Quantum":[22],"Cryptography":[23],"(PQC)":[24],"is":[25],"the":[26,39,78,83,98,115,125,128,168],"primary":[27],"scalable":[28],"defence,":[29],"its":[30],"computationally":[31],"intensive":[32],"handshakes":[33],"create":[34],"a":[35,72,91,171],"significant":[36],"bottleneck":[37],"for":[38],"RAN":[40],"control":[41],"plane,":[42],"posing":[43],"sustainability":[44],"challenges.":[45],"This":[46],"paper":[47],"proposes":[48],"an":[49,68],"energy-aware":[50],"framework":[51],"to":[52],"solve":[53],"this":[54],"PQC":[55,88,144],"bottleneck,":[56],"ensuring":[57],"resilience":[59],"without":[60,198],"sacrificing":[61],"operational":[62],"energy":[63,193],"efficiency.":[64],"system":[66],"employs":[67],"O-RAN":[69],"aligned":[70],"split:":[71],"Crypto":[73],"Policy":[74],"rApp":[75],"residing":[76],"in":[77,97],"Non-Real-Time":[79],"(Non-RT)":[80],"RIC":[81,100],"defines":[82],"strategic":[84],"envelope":[86],"(including":[87],"suites),":[89],"while":[90,127,160],"Security":[92,122,135],"Operations":[93],"Scheduling":[94],"(SOS)":[95],"xApp":[96,142],"Near-RT":[99],"converts":[101],"these":[102],"into":[103],"tactical":[104],"timing":[105],"placement":[107],"intents.":[108],"Cryptographic":[109],"enforcement":[110],"remains":[111],"at":[112,124,137],"standards-compliant":[113],"endpoints:":[114],"Fronthaul":[117],"utilizes":[118,133],"Media":[119],"Control":[121],"(MACsec)":[123],"O-DU/O-RU,":[126],"xhaul":[129],"(midhaul":[130],"backhaul)":[132],"IP":[134],"(IPsec)":[136],"tunnel":[138],"terminators.":[139],"SOS":[141],"reduces":[143],"overhead":[145],"by":[146,194],"batching":[147],"non-urgent":[148],"handshakes,":[149],"prioritizing":[150],"session":[151],"resumption,":[152],"selecting":[154],"parameters":[155],"that":[156,187],"meet":[157],"slice":[158,200],"SLAs":[159],"minimizing":[161],"joules":[162],"per":[163],"secure":[164],"connection.":[165],"We":[166],"evaluate":[167],"architecture":[169],"via":[170],"Discrete-Event":[172],"Simulation":[173],"(DES)":[174],"using":[175],"3GPP-aligned":[176],"traffic":[177],"profiles":[178],"verified":[180],"hardware":[181],"benchmarks":[182],"literature.":[184],"Results":[185],"show":[186],"intelligent":[188],"scheduling":[189],"can":[190],"reduce":[191],"per-handshake":[192],"approximately":[195],"60":[196],"percent":[197],"violating":[199],"latency":[201],"targets.":[202]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2026-02-14T00:00:00"}
