5G-NS 2018 - 2018 Workshop on 5G Networks Security
Topics/Call fo Papers
With the great success and development of 4G mobile networks it is expected that the 5th generation wireless systems (in short 5G) will be a continued effort toward rich ubiquitous communication infrastructure, promising wide range of high-quality services. It is envisioned that 5G communication will offer significantly greater data bandwidth and almost infinite capability of networking resulting in unfaltering user experiences for (among others): virtual/augmented reality, massive content streaming, telepresence, user-centric computing, crowded area services, smart personal networks, Internet of Things (IoT), smart buildings, smart cities, to name just a few.
The 5G communication is currently in the center of attention of industry, academia, and government worldwide. 5G drives many new requirements for different network capabilities. As 5G aims at utilizing many promising network technologies, such as Software Defined Networking (SDN), Network Functions Virtualization (NFV), Information Centric Network (ICN), Network Slicing, Cloud Computing, etc. and supporting a huge number of connected devices integrating above mentioned advanced technologies and innovating new techniques will surely bring tremendous challenges for security, privacy and trust. Therefore, secure network architectures, mechanisms, and protocols are required as the basis for 5G to address this problem and follow security-by-design rule. Finally, as in 5G networks even more user data and network traffic will be transferred, the big data security solutions should be sought in order to address the magnitude of the data volume and to ensure data security and privacy.
From this perspective, 5G-NS 2018 workshop aims at collecting the most relevant ongoing research efforts in 5G networks security field. It also serves as a forum for 5G-PPP Phase 1 & Phase 2 projects in order to disseminate their security-related results and tighten & boost cooperation, and foster development of the 5G Security Community made of 5G security experts and practitioners who pro-actively discuss and share information to collectively progress and align on the field.
TOPICS OF INTEREST INCLUDE, BUT ARE NOT LIMITED TO:
Security Architecture and Technologies for 5G
Security Management in Heterogeneous 5G Networks
Attacks & Threats Detection in 5G Networks
DDoS Detection & Mitigation in 5G Networks
Security Frameworks for Various 5G Applications & Scenarios
Access Control Security for 5G Networks
Security Protocols for 5G Networks
Security Management and Orchestration of NFV and SDN Elements
Trusted Computing with NFV and SDN
Physical Layer Security in 5G Networks
5G Wireless Communications Security
SDN/NFV Security in 5G Networks
5G Core Network Security
Terminal and Edge Computing Security in 5G Networks
Secure Network Slicing for 5G
Malware Attack Detection and Prevention Techniques in 5G
Information Sharing and Data Protection in 5G Networks
Big Data Security and Analytics in 5G Networks
Cloud Technologies Security in 5G Networks
Privacy preservation and enhancement in 5G
Intrusion detection and content access control in 5G
Trust management in heterogeneous 5G networks
5G identity management and its trustworthiness
Intelligent 5G security provision
Trust collaboration in 5G
IoT security and trust in 5G
The 5G communication is currently in the center of attention of industry, academia, and government worldwide. 5G drives many new requirements for different network capabilities. As 5G aims at utilizing many promising network technologies, such as Software Defined Networking (SDN), Network Functions Virtualization (NFV), Information Centric Network (ICN), Network Slicing, Cloud Computing, etc. and supporting a huge number of connected devices integrating above mentioned advanced technologies and innovating new techniques will surely bring tremendous challenges for security, privacy and trust. Therefore, secure network architectures, mechanisms, and protocols are required as the basis for 5G to address this problem and follow security-by-design rule. Finally, as in 5G networks even more user data and network traffic will be transferred, the big data security solutions should be sought in order to address the magnitude of the data volume and to ensure data security and privacy.
From this perspective, 5G-NS 2018 workshop aims at collecting the most relevant ongoing research efforts in 5G networks security field. It also serves as a forum for 5G-PPP Phase 1 & Phase 2 projects in order to disseminate their security-related results and tighten & boost cooperation, and foster development of the 5G Security Community made of 5G security experts and practitioners who pro-actively discuss and share information to collectively progress and align on the field.
TOPICS OF INTEREST INCLUDE, BUT ARE NOT LIMITED TO:
Security Architecture and Technologies for 5G
Security Management in Heterogeneous 5G Networks
Attacks & Threats Detection in 5G Networks
DDoS Detection & Mitigation in 5G Networks
Security Frameworks for Various 5G Applications & Scenarios
Access Control Security for 5G Networks
Security Protocols for 5G Networks
Security Management and Orchestration of NFV and SDN Elements
Trusted Computing with NFV and SDN
Physical Layer Security in 5G Networks
5G Wireless Communications Security
SDN/NFV Security in 5G Networks
5G Core Network Security
Terminal and Edge Computing Security in 5G Networks
Secure Network Slicing for 5G
Malware Attack Detection and Prevention Techniques in 5G
Information Sharing and Data Protection in 5G Networks
Big Data Security and Analytics in 5G Networks
Cloud Technologies Security in 5G Networks
Privacy preservation and enhancement in 5G
Intrusion detection and content access control in 5G
Trust management in heterogeneous 5G networks
5G identity management and its trustworthiness
Intelligent 5G security provision
Trust collaboration in 5G
IoT security and trust in 5G
Other CFPs
- 2018 International Workshop Cyber Crime
- 7th International Conference on Social Responsibility, Ethics and Sustainable Business
- IEEE International Workshop on Verification and Validation of Adaptive Software Systems
- IEEE International Workshop on Trustworthy Computing
- IEEE International Workshop on Safety and Security in Cyber-Physical Systems
Last modified: 2018-01-13 15:16:17