ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

IW5GS 2015 - 1st IEEE International Workshop on 5G Security

Date2015-08-20 - 2015-08-22

Deadline2015-04-24

VenueHelsinki, Finland Finland

Keywords

Websitehttps://research.comnet.aalto.fi/Trustco...

Topics/Call fo Papers

There is a fast on-going change in the technical architectures and topologies of the Internet: in the near future 5G and next generation 4G/LTE network architectures will be based on or migrated to Software Defined Networking (SDN) and Network Functions Virtualization (NFV). These create new virtual network elements each affecting the logic of the network operation, traffic management and introducing new and novel security challenges. Aspects such as security of orchestration, management functionality as well as surveillance and privacy are brought to the fore. At the same time they introduce new ways of dealing with attack prevention, management and recovery.
The one-day workshop will consist of papers, presentations and demonstrations on the subject of advanced network security. While primarily related to 5G networks, experiences from 4G/LTE, 3G and earlier, including case studies on practicalities of known attacks and novel attack vectors will be considered for acceptance. An invited keynote speech will be given setting out the overall area of security in network development and operations.
Scope and Interests
We solicit papers and demonstrations in the following areas related to 5G/LTE security:
Core Network Security
Cellular security
Device to Device (D2D)
Security Management and Orchestration of NFV and SDN elements
Terminal and Edge Computing Security
Malware and attack detection and prevention techniques, eg: machine learning
Authentication and Authorisation
Encryption protocols, eg: homomorphic encryption
Key Exchange, Storage and Protection
Content/Semantic processing, inc. anonymisation of (meta*-) data
Honeypot and Firewall Technologies
Protocol security: Diameter, SS7, BGP, etc
Physical Layer Security
Formal Specification and Analysis of Protocols and Attacks, eg: model checking etc.
Trusted Computing with NFV and SDN

Last modified: 2015-02-25 23:34:36