[HTML][HTML] DLT architectures for trust anchors in 6G

D Krummacker, B Veith, D Lindenschmitt… - Annals of …, 2023 - Springer
This manuscript investigates viable Distributed Ledger Technology (DLT) architecture
approaches to be used as basis for the distribution of integrity verification data. We discuss …

The road to trustworthy 6G: A survey on trust anchor technologies

B Veith, D Krummacker… - IEEE Open Journal of the …, 2023 - ieeexplore.ieee.org
While 5G networks are driving a growing number of use cases in the fields of iot and
industrial applications, the vision of the next generation of mobile communications systems …

BALAdIN: truthfulness in collaborative access networks with distributed ledgers

V Messié, G Fromentoux, N Labidurie, B Radier… - Annals of …, 2022 - Springer
Distributed ledger technology (DLT), also known as “Blockchain” is one of the trendiest
digital innovations in our era. While firstly applied to crypto-currencies, the trustworthiness …

LegIoT: Ledgered trust management platform for IoT

J Neureither, A Dmitrienko, D Koisser, F Brasser… - … –ESORICS 2020: 25th …, 2020 - Springer
We investigate and address the currently unsolved problem of trust establishment in large-
scale Internet of Things (IoT) networks where heterogeneous devices and mutually …

INSPIRE-5Gplus: Intelligent security and pervasive trust for 5G and beyond networks

J Ortiz, R Sanchez-Iborra, JB Bernabe… - Proceedings of the 15th …, 2020 - dl.acm.org
The promise of disparate features envisioned by the 3GPP for 5G, such as offering
enhanced Mobile Broadband connectivity while providing massive Machine Type …

6G network needs to support embedded trust

R Kantola - Proceedings of the 14th International Conference on …, 2019 - dl.acm.org
A slogan coined at the recent first Levi 6G Summit by Peter Wetter of Nokia Bell Labs was"
the 6G is about the 6th sense". This can be understood in at least two ways. One is that the …

Two-Layer Models for Managing Distributed Authenticity and Trust

R Haenni, J Jonczy, R Kohlas - Trust in E-Services: Technologies …, 2007 - igi-global.com
This chapter describes the difficulty of managing authenticity and trust in large open
networks. Participants of such networks are usually unknown to each other. Questioning …

Testing trust properties using a formal distributed network monitoring approach

X Che, J Lopez, S Maag, G Morales - annals of telecommunications …, 2015 - Springer
Collaborative systems are growing in use and in popularity. The need to boost the methods
concerned by the interoperability is growing as well; making thus trustworthy interactions of …

Trust modelling in 5G mobile networks

M Surridge, G Correndo, K Meacham, J Papay… - Proceedings of the …, 2018 - dl.acm.org
5G technologies will change the business landscape for mobile network operation. The use
of virtualization through SDN, NFV and Cloud computing offer significant savings of CAPEX …

Lokey: Leveraging the sms network in decentralized, end-to-end trust establishment

AJ Nicholson, IE Smith, J Hughes, BD Noble - International Conference on …, 2006 - Springer
People increasingly depend on the digital world to communicate with one another, but such
communication is rarely secure. Users typically have no common administrative control to …