{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2019:VZ6MJTHWBBJBCIGHBXAIOUSJUC","short_pith_number":"pith:VZ6MJTHW","schema_version":"1.0","canonical_sha256":"ae7cc4ccf608521120c70dc0875249a08a5615063f0b183cb3dbd1efb39b98d1","source":{"kind":"arxiv","id":"1906.11427","version":1},"attestation_state":"computed","paper":{"title":"Security of 5G-Mobile Backhaul Networks: A Survey","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR","cs.SI"],"primary_cat":"cs.NI","authors_text":"Gaurav Choudhary, Jiyoon Kim, Vishal Sharma","submitted_at":"2019-06-27T03:55:36Z","abstract_excerpt":"The rapid involution of the mobile generation with incipient data networking capabilities and utilization has exponentially increased the data traffic volumes. Such traffic drains various key issues in 5G mobile backhaul networks. Security of mobile backhaul is of utmost importance; however, there are a limited number of articles, which have explored such a requirement. This paper discusses the potential design issues and key challenges of the secure 5G mobile backhaul architecture. The comparisons of the existing state-of-the-art solutions for secure mobile backhaul, together with their major"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1906.11427","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2019-06-27T03:55:36Z","cross_cats_sorted":["cs.CR","cs.SI"],"title_canon_sha256":"4116efabd593b440981d762a47237902edced754e4298b7f38c9a9ec181500ec","abstract_canon_sha256":"3d1513d3abd3c186eaa64f65d46b0b8c10dce181257cc62db1ec4b5d66eef609"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:42:07.107012Z","signature_b64":"Boq/ICTy8amONR306OOxUT+b9IwL3rYb8Zjk/pi6x8JqgvAQr3w9py2/zA+D56IUhCrKBRMFvQIqRcILJg2jBQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"ae7cc4ccf608521120c70dc0875249a08a5615063f0b183cb3dbd1efb39b98d1","last_reissued_at":"2026-05-17T23:42:07.106271Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:42:07.106271Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Security of 5G-Mobile Backhaul Networks: A Survey","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR","cs.SI"],"primary_cat":"cs.NI","authors_text":"Gaurav Choudhary, Jiyoon Kim, Vishal Sharma","submitted_at":"2019-06-27T03:55:36Z","abstract_excerpt":"The rapid involution of the mobile generation with incipient data networking capabilities and utilization has exponentially increased the data traffic volumes. Such traffic drains various key issues in 5G mobile backhaul networks. Security of mobile backhaul is of utmost importance; however, there are a limited number of articles, which have explored such a requirement. This paper discusses the potential design issues and key challenges of the secure 5G mobile backhaul architecture. The comparisons of the existing state-of-the-art solutions for secure mobile backhaul, together with their major"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1906.11427","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1906.11427","created_at":"2026-05-17T23:42:07.106415+00:00"},{"alias_kind":"arxiv_version","alias_value":"1906.11427v1","created_at":"2026-05-17T23:42:07.106415+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1906.11427","created_at":"2026-05-17T23:42:07.106415+00:00"},{"alias_kind":"pith_short_12","alias_value":"VZ6MJTHWBBJB","created_at":"2026-05-18T12:33:30.264802+00:00"},{"alias_kind":"pith_short_16","alias_value":"VZ6MJTHWBBJBCIGH","created_at":"2026-05-18T12:33:30.264802+00:00"},{"alias_kind":"pith_short_8","alias_value":"VZ6MJTHW","created_at":"2026-05-18T12:33:30.264802+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/VZ6MJTHWBBJBCIGHBXAIOUSJUC","json":"https://pith.science/pith/VZ6MJTHWBBJBCIGHBXAIOUSJUC.json","graph_json":"https://pith.science/api/pith-number/VZ6MJTHWBBJBCIGHBXAIOUSJUC/graph.json","events_json":"https://pith.science/api/pith-number/VZ6MJTHWBBJBCIGHBXAIOUSJUC/events.json","paper":"https://pith.science/paper/VZ6MJTHW"},"agent_actions":{"view_html":"https://pith.science/pith/VZ6MJTHWBBJBCIGHBXAIOUSJUC","download_json":"https://pith.science/pith/VZ6MJTHWBBJBCIGHBXAIOUSJUC.json","view_paper":"https://pith.science/paper/VZ6MJTHW","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1906.11427&json=true","fetch_graph":"https://pith.science/api/pith-number/VZ6MJTHWBBJBCIGHBXAIOUSJUC/graph.json","fetch_events":"https://pith.science/api/pith-number/VZ6MJTHWBBJBCIGHBXAIOUSJUC/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/VZ6MJTHWBBJBCIGHBXAIOUSJUC/action/timestamp_anchor","attest_storage":"https://pith.science/pith/VZ6MJTHWBBJBCIGHBXAIOUSJUC/action/storage_attestation","attest_author":"https://pith.science/pith/VZ6MJTHWBBJBCIGHBXAIOUSJUC/action/author_attestation","sign_citation":"https://pith.science/pith/VZ6MJTHWBBJBCIGHBXAIOUSJUC/action/citation_signature","submit_replication":"https://pith.science/pith/VZ6MJTHWBBJBCIGHBXAIOUSJUC/action/replication_record"}},"created_at":"2026-05-17T23:42:07.106415+00:00","updated_at":"2026-05-17T23:42:07.106415+00:00"}