IEEE International Conference on Computer Communications
2-5 May 2022 // Virtual Conference

Sixth Workshop on 5G & Beyond Wireless Security - Call for Papers

The Sixth IEEE Workshop on 5G & Beyond Wireless Security (Wireless-Sec)

Call for Papers

 

Future wireless systems will require a paradigm shift in how they are networked, organized, configured, optimized, and recovered automatically, based on their operating situations. Emerging Internet of Things (IoT) and Cyber-Physical Systems (CPS) applications aim to bring people, data, processes, and things together, to fulfill the needs of our everyday lives. With the emergence of software defined networks, adaptive services and applications are gaining much attention since they allow automatic configuration of devices and their parameters, systems, and services to the user's context change. It is expected that upcoming Fifth Generation and Beyond (5G&B) wireless networks, known as more than an extension to 4G, will be the backbone of IoT and CPS, and will support IoT systems by expanding their coverage, reducing latency and enhancing data rate. However, there are several challenges to be addressed to provide resilient connections supporting the massive number of often resource-constrained IoT and other wireless devices. Hence, due to several unique features of emerging applications, such as low latency, low cost, low energy consumption, resilient and reliable connections, traditional communication protocols and techniques are not suitable.

In this regard, it is crucial to have security by design in 5G and Beyond wireless networks, considering the constraints imposed by heterogeneous IoT and CPS systems. Our aim is to promote the development of 5G security by design. The proposed INFOCOM workshop Wireless-Sec 2022 will serve as a forum for researchers from academia, government and industries, to exchange ideas, present new results, and provide future visions on these topics.

Topics include, but not limited to:

  • 5G & Beyond architecture with security and privacy considerations 
  • Security for new service delivery models 
  • AI and Machine Learning for 5G and Beyond security 
  • Verticals and business (non-technical) 5G & Beyond security requirements and solutions 
  • Big data analytics tools/techniques in 5G & Beyond Security 
  • Advances in lightweight cryptography and IoT/CPS security 
  • Wireless virtualization and slicing security 
  • Authentication, authorization, and accounting for 5G & Beyond security 
  • AI and Machine Learning for 5G & Beyond security 
  • Diameter security in 5G & Beyond 
  • Quantum Safe Cryptography for 5G & Beyond 
  • Secure Integration of IoT/CPS and Cloud Computing 
  • Secure integration of IoT /CPS and other networks
  • Secure Device-to-Device communications in 5G & Beyond 
  • Intrusion Detection/Prevention Techniques and System Integrity 
  • Secure data storage, communications and computing 
  • Energy efficient security in IoT and CPS 
  • Heterogeneous system modeling for 5G security 
  • Secure sensing and computing techniques in 5G & Beyond 
  • Big data analytics for 5G & Beyond security 
  • Secure, privacy-aware and trustworthy IoT/CPS communications 
  • Trust models and trust handling/propagation for 5G & Beyond security 
  • Physical layer security for 5G & Beyond 
  • 5G & Beyond security standardization

Patrons

Student Conference Grant Sponsors