{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T17:36:37Z","timestamp":1767980197574,"version":"3.49.0"},"reference-count":27,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2021,3,29]],"date-time":"2021-03-29T00:00:00Z","timestamp":1616976000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004421","name":"Politechnika Warszawska","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004421","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1016\/j.comcom.2021.03.024","type":"journal-article","created":{"date-parts":[[2021,3,29]],"date-time":"2021-03-29T20:04:20Z","timestamp":1617048260000},"page":"226-237","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":17,"special_numbering":"C","title":["Security policies definition and enforcement utilizing policy control function framework in 5G"],"prefix":"10.1016","volume":"172","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0507-6592","authenticated-orcid":false,"given":"German","family":"Peinado Gomez","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1489-5138","authenticated-orcid":false,"given":"Jordi","family":"Mongay Batalla","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8864-2312","authenticated-orcid":false,"given":"Yoan","family":"Miche","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2616-6212","authenticated-orcid":false,"given":"Silke","family":"Holtmanns","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0333-8034","authenticated-orcid":false,"given":"Constandinos X.","family":"Mavromoustakis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6733-5652","authenticated-orcid":false,"given":"George","family":"Mastorakis","sequence":"additional","affiliation":[]},{"given":"Noman","family":"Haider","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comcom.2021.03.024_b1","article-title":"6G wireless systems: A vision, architectural elements, and future directions","volume":"8","author":"Khan","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.comcom.2021.03.024_b2","series-title":"5G for the Connected World","year":"2019"},{"key":"10.1016\/j.comcom.2021.03.024_b3","article-title":"Security risk assessment for 5G networks - national perspective","author":"Mongay\u00a0Batalla","year":"2020","journal-title":"IEEE Wirel. Commun."},{"key":"10.1016\/j.comcom.2021.03.024_b4","doi-asserted-by":"crossref","DOI":"10.1016\/j.future.2019.03.036","article-title":"Security situation assessment for massive MIMO systems for 5G communications","author":"Yang","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.comcom.2021.03.024_b5","unstructured":"3GPP TS 23.501: Technical Specification System Architecture for the 5G System; Stage 2."},{"key":"10.1016\/j.comcom.2021.03.024_b6","unstructured":"3GPP TS 33.501: Technical Specification Security architecture and procedures for 5G system (Release 16)."},{"issue":"22","key":"10.1016\/j.comcom.2021.03.024_b7","first-page":"466","article-title":"A security architecture for 5G networks","volume":"6","author":"Arfaoui","year":"2018","journal-title":"IEEE Access"},{"key":"10.1016\/j.comcom.2021.03.024_b8","article-title":"Network Services Chaining in 5G vision (guest editorial)","author":"Mongay\u00a0Batalla","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.comcom.2021.03.024_b9","unstructured":"3GPP TS 23.503: Technical Specification Policy and Charging Control Framework for the 5G System; Stage 2."},{"key":"10.1016\/j.comcom.2021.03.024_b10","series-title":"Policy and Charging Rules Function (PCRF) in LTE EPC Core Network Technology","author":"Houshmand","year":"2016"},{"key":"10.1016\/j.comcom.2021.03.024_b11","unstructured":"3GPP TS 23.288: Technical Specification Architecture enhancements for 5G System to support network data analytics services (Release 16)."},{"issue":"1","key":"10.1016\/j.comcom.2021.03.024_b12","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1109\/COMST.2019.2951818","article-title":"A survey on security aspects for 3GPP 5G networks","volume":"22","author":"Cao","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"C","key":"10.1016\/j.comcom.2021.03.024_b13","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/j.comcom.2017.09.003","article-title":"Performance evaluation of application layer joint coding solutions for video transmissions between mobile devices over the internet of things","volume":"118","author":"Bisio","year":"2018","journal-title":"Comput. Commun."},{"issue":"1","key":"10.1016\/j.comcom.2021.03.024_b14","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1109\/MCOM.2018.1700467","article-title":"5G for vehicular communications","volume":"56","author":"Shah","year":"2018","journal-title":"IEEE Commun. Mag."},{"issue":"12","key":"10.1016\/j.comcom.2021.03.024_b15","doi-asserted-by":"crossref","first-page":"251","DOI":"10.3390\/fi11120251","article-title":"Secure WiFi-direct using key exchange for IoT device-to-device communications in a smart environment","volume":"11","author":"Belghazi","year":"2019","journal-title":"Future Internet."},{"key":"10.1016\/j.comcom.2021.03.024_b16","series-title":"Security and Deployment of Advanced Mobile Communications","author":"5G\u00a0Explained","year":"2019"},{"key":"10.1016\/j.comcom.2021.03.024_b17","series-title":"Alliance, NGMN, NGMN 5G white paper, Next Generation Mobile Networks, White paper","year":"2015"},{"key":"10.1016\/j.comcom.2021.03.024_b18","series-title":"Proceedings of the 12th IEEE\/ACM International Conference on Utility and Cloud Computing (UCC \u201919)","first-page":"219","article-title":"Container-based sandboxes for malware analysis: A compromise worth considering","author":"Khalimov","year":"2019"},{"issue":"5","key":"10.1016\/j.comcom.2021.03.024_b19","doi-asserted-by":"crossref","first-page":"1004","DOI":"10.1109\/JSAC.2018.2832818","article-title":"Joint coding and multicast subgrouping over satellite-eMBMS networks","volume":"36","author":"Araniti","year":"2018","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"3","key":"10.1016\/j.comcom.2021.03.024_b20","doi-asserted-by":"crossref","first-page":"1761","DOI":"10.1109\/COMST.2020.2997475","article-title":"Complementing IoT services through software defined networking and edge computing: A comprehensive survey","volume":"22","author":"Rafique","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"4","key":"10.1016\/j.comcom.2021.03.024_b21","doi-asserted-by":"crossref","first-page":"2441","DOI":"10.1109\/JIOT.2018.2847249","article-title":"Secure and privacy-aware incentives-based witness service in social internet of vehicles clouds","volume":"5","author":"Hussain","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comcom.2021.03.024_b22","unstructured":"3GPP TS 33.210: Technical Specification Network Domain Security (NDS); IP network layer security."},{"key":"10.1016\/j.comcom.2021.03.024_b23","unstructured":"Antonio Pastor (Telefonica I+D), Applying AI to Protect 5G Control Traffic, ETSI Security week 2019, available at: https:\/\/docbox.etsi.org\/Workshop\/2019\/201906_ETSISECURITYWEEK\/1906_AI_SECURITY\/S02_AI_ATTACK_DEFENSE\/AI_PROTECT_5G_CONTRL_TRAFFIC_TELEFONICA.pdf."},{"key":"10.1016\/j.comcom.2021.03.024_b24","series-title":"Convergence of Artificial Intelligence and the Internet of Things","isbn-type":"print","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-44907-0","author":"Mastorakis","year":"2020","ISBN":"https:\/\/id.crossref.org\/isbn\/9783030449063"},{"key":"10.1016\/j.comcom.2021.03.024_b25","series-title":"The evolution of 5G in security","author":"5G\u00a0Americas","year":"2019"},{"key":"10.1016\/j.comcom.2021.03.024_b26","doi-asserted-by":"crossref","DOI":"10.1109\/COMST.2019.2916180","article-title":"Security for 5G and beyond","author":"Ahmad","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"8","key":"10.1016\/j.comcom.2021.03.024_b27","doi-asserted-by":"crossref","first-page":"1935","DOI":"10.3390\/s19081935","article-title":"Privacy and security for resource-constrained IoT devices and networks: Research challenges and opportunities","volume":"19","author":"Li","year":"2019","journal-title":"Sensors"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366421001262?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366421001262?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T23:33:29Z","timestamp":1758843209000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366421001262"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4]]},"references-count":27,"alternative-id":["S0140366421001262"],"URL":"https:\/\/doi.org\/10.1016\/j.comcom.2021.03.024","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2021,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Security policies definition and enforcement utilizing policy control function framework in 5G","name":"articletitle","label":"Article Title"},{"value":"Computer Communications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comcom.2021.03.024","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2021 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}