ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Date2018-05-20 - 2018-05-24


VenueKansas City, MO, USA - United States USA - United States



Topics/Call fo Papers

Future wireless systems will require a paradigm shift in how they are networked, organized, configured, optimized, and recovered automatically, based on their operating situations. Emerging Internet of Things (IoT) and Cyber-Physical Systems (CPS) applications aim to bring people, data, processes, and things together, to fulfill the needs of our everyday lives. With the emergence of software defined networks, adaptive services and applications are gaining much attention since they allow automatic configuration of devices and their parameters, systems, and services to the user's context change. It is expected that upcoming Fifth Generation (5G) wireless networks, known as more than an extension to 4G, will be the backbone of IoT and CPS, and will support IoT systems by expanding their coverage, reducing latency and enhancing data rate. However, there are several challenges to be addressed to provide resilient connections supporting the massive number of often resource-constrained IoT and other wireless devices. Hence, due to several unique features of emerging applications, such as low latency, low cost, low energy consumption, resilient and reliable connections, traditional communication protocols and techniques are not suitable.
In this regard, it is crucial to have security by design in 5G wireless networks, considering the constraints imposed by heterogeneous IoT and CPS systems. Our aim is to promote the development of 5G security by design. The ICC workshop on 5G-Security aims to serve as a forum for researchers from academia, government and industries, to exchange ideas, present new results, and provide future visions on these topics.
Topics of interest include but are not limited to:
5G architecture with security and privacy considerations
Security for new service delivery models
Verticals and business (non-technical) 5G security requirements and solutions
Big data analytics tools and techniques in 5G Security
Advances in lightweight cryptography and IoT/CPS security
Wireless virtualization and slicing security
Authentication, authorization, and accounting (AAA) for 5G security
Diameter security in 5G
Quantum Safe Cryptography for 5G
Secure Integration of IoT/CPS and Cloud Computing
Secure Device-to-Device communications in 5G
Secure integration of IoT /CPS and other networks
Intrusion Detection/Prevention Techniques and System Integrity
Secure data storage, communications and computing
Energy efficient security in IoT and CPS
Heterogeneous system modeling for 5G security
Secure sensing and computing techniques in 5G
Big data analytics for 5G security
Secure, privacy-aware and trustworthy IoT/CPS communications
Trust models and trust handling/propagation for 5G security
Physical layer security for 5G
5G security standardization

Last modified: 2017-11-20 10:49:49