IMPACT SCORE JOURNAL RANKING CONFERENCE RANKING Conferences Journals Workshops Seminars SYMPOSIUMS MEETINGS BLOG LaTeX 5G Tutorial Free Tools
IEEE-5G-Security 2020 : IEEE Communications Magazine Feature Topic “5G Security: Can 5G Be Verifiably Secure?”
IEEE-5G-Security 2020 : IEEE Communications Magazine Feature Topic “5G Security: Can 5G Be Verifiably Secure?”

IEEE-5G-Security 2020 : IEEE Communications Magazine Feature Topic “5G Security: Can 5G Be Verifiably Secure?”

N/A
Event Date: January 01, 1970 - January 01, 1970
Submission Deadline: September 15, 2019
Notification of Acceptance: December 15, 2019
Camera Ready Version Due: January 15, 2020




Call for Papers

----------------------------------------------
IEEE Communications Magazine Feature Topic
“5G Security: Can 5G Be Verifiably Secure?”
----------------------------------------------

5G heralds the advent of the true convergence of IT and Wireless and Wireline networks. In the midst of this transition, security and the operationalization of the technology are critical areas. Traditional security has seen a focus on network access and communication channel protection, but the new system will challenge the emerging standards and requires something beyond channel- and component-level analysis. Network slicing, e-SIM, MEC along with SDN/NFV and massive IoT pose new challenges that are not addressed with the legacy understanding of network security. This feature topic aims at putting together various paradigms and techniques needed to address 5G security in a holistic manner.

How to assess the fundamental security of deployed 5G networks? Implementation security seems to be crucial. The dependence on source code requires a focus on software assessment methods, and yet these are closely guarded as a manufacturer's intellectual property. Can secure and trustworthy software and hardware platforms, such as operating systems, hypervisors and CPUs, significantly protect against source code vulnerabilities? Can their (lifecycle) security be practically verified, possibly by formal methods?

Is component-level analysis, as seen in engineering requirements, sufficient? Or, will the 5G system need to be deployed as an integrated and functional system alongside its underlying platforms to be truly assessed for the ultimate security outcome? How much benefit can threat and trust modelling along with new deployment architectures make to the security of 5G?

There are a lot of areas for exploration but the focus here is on delivering a secure 5G system to the market and ensuring an overall secure outcome for mobility consumers, regardless of the underlying complexity. This focus may, arguably, be beyond what has been practiced to date, but is important to explore in this feature. Analysis of the current security framework trends and proposals from organisations such as GSMA, 3GPP and NGMN is also relevant.

----------------------------------------------
Topics of Interest
----------------------------------------------

Potential topics include, but are not limited to:

* comparative analysis of existing security certification programs towards a provably secure 5G technology and implementation
* methods and techniques for verifying supply chain integrity of 5G products
* techniques towards independent and trustworthy security evaluation and assertion of 5G product integrity
* formal method analysis and design of 5G protocol security
* threat modelling techniques for the evaluation of 5G end-to-end systems and for 5G full stack, hardware and software included
* expected adversarial methods for proposed future 5G architectures
* security testing for end-to-end network slices
* impact of hardware side-channel security attacks on 5G deployments
* secure architectures towards 'zero-trust' 5G deployments
* security orchestration across all components of a fully deployed 5G system
* fundamentals for establishing a 5G security reference model and data set, enabling repeatable results, research and analysis

----------------------------------------------
Submission Guidelines
----------------------------------------------

Manuscripts should conform to the standard format as indicated in the Information for Authors section of the Manuscript Submission Guidelines. Please, check these guidelines carefully since they have been updated recently.

All manuscripts to be considered for publication must be submitted by the deadline through Manuscript Central (https://mc.manuscriptcentral.com/commag-ieee/). Select the "March 2020/5G Security" topic from the drop-down menu of Topic/Series titles. Please observe the dates specified here below noting that there will be no extension of submission deadline.

----------------------------------------------
Important Dates
----------------------------------------------

Submissions Due: 15 September 2019
Decision Notification: 15 December 2019
Final Manuscript Due: 15 January 2019
Publication Date: March 2020

----------------------------------------------
Guest Editors
----------------------------------------------

Marc Kneppers, Chief Security Architect, TELUS Fellow, TELUS Communications, Canada (Lead Guest Editor)

Dr. Imad Elhajj, Professor, Department of Electrical and Computer Engineering, American University of Beirut, Lebanon

Jovan Golic, Prof. Dr., Senior technical leader at Telecom Italia

* CFP Announcement:
https://www.comsoc.org/publications/magazines/ieee-communications-magazine/cfp/5g-security-can-5g-be-verifiably-secure



Credits and Sources

[1] IEEE-5G-Security 2020 : IEEE Communications Magazine Feature Topic “5G Security: Can 5G Be Verifiably Secure?”


Check other Conferences, Workshops, Seminars, and Events


OTHER 5G EVENTS

WiMob - CWN 2024: Eleventh International Workshop on Cooperative Wireless Networks (WiMob – CWN’24)
Paris
Oct 9, 2024
MoMM 2024: The 22nd International Conference on Advances in Mobile Computing & Multimedia Intelligence
Bratislava. Slovakia
Dec 2, 2024
ISCAIS 2024: 【Keynote: Academician of Chinese Academy of Engineering & IEEE Fellow】The 2024 3rd International Symposium on Computer Applications and Information Systems(ISCAIS 2024)
Wuhan
Mar 24, 2024
HCIS-IS 2024: IS02: Edge Computing Technologies for Mobile Computing and Internet of Things (4th Edition)
Madeira, Portugal
Jun 19, 2024
5GBS 2023: The 7th International Symposium on 5G and Beyond Systems
San Antonio, Texas , USA
Oct 23, 2023
SHOW ALL

OTHER SECURITY EVENTS

CANS 2024: The International Conference on Cryptology and Network Security (CANS)
Cambridge, UK
Sep 24, 2024
ICTCE 2024: 2024 The 6th International Conference on Telecommunications and Communication Engineering (ICTCE 2024)--JA
Chengdu, China
Nov 22, 2024
CECSP 2024: 2024 the International Conference on Electronics, Communications, and Signal Processing (CECSP 2024)
Kunming, China
Oct 25, 2024
ICICM 2024: ACM--2024 The 14th International Conference on Information Communication and Management (ICICM 2024)
France, Paris
Nov 6, 2024
ADIP--EI 2024: 2024 6th Asia Digital Image Processing Conference (ADIP 2024)
Tokyo, Japan
Dec 14, 2024
SHOW ALL

OTHER FORMAL METHODS EVENTS

ICFEM 2024: International Conference on Formal Engineering Methods
Hiroshima , Japan
Dec 2, 2024
AFMAS 2024: Science of Computer Programming special issue on Advances in Formal Methods for Autonomous Systems
N/A
SIMULTECH 2024: 14th International Conference on Simulation and Modeling Methodologies, Technologies and Applications
Dijon, France
Jul 10, 2024
FMICS 2024: 29th International Conference on Formal Methods for Industrial Critical Systems
Milano
Sep 9, 2024
SEC 2024: 10th International Conference on Software Engineering
Melbourne, Australia
Apr 20, 2024
SHOW ALL

OTHER VERIFICATION EVENTS

AREA 2024: 4th Workshop on Agents and Robots for reliable Engineered Autonomy
Santiago de Compostela
Oct 19, 2024
LearnAut 2024: Learning and Automata
Tallinn, Estonia
Jul 7, 2024
SCID @ AsiaCCS 2024: 1st ACM workshop on Security-Centric Strategies for Combating Information Disorder
Singapore
Jul 1, 2024
SPIN 2024: 30th International Symposium on Model Checking Software
Luxembourg City
Apr 10, 2024
FAACS 2024: The 8th International Workshop on Formal Approaches for Advanced Computing Systems
IIIT Hyderabad, India
Jun 4, 2024
SHOW ALL