IEEE International Conference on Communications
20-24 May 2018 // Kansas City, MO, USA
Communications for Connecting Humanity

Call For Papers

Call for Papers [PDF]

Future wireless systems will require a paradigm shift in how they are networked, organized, configured, optimized, and recovered automatically, based on their operating situations. Emerging Internet of Things (IoT) and Cyber-Physical Systems (CPS) applications aim to bring people, data, processes, and things together, to fulfill the needs of our everyday lives. With the emergence of software defined networks, adaptive services and applications are gaining much attention since they allow automatic configuration of devices and their parameters, systems, and services to the user's context change. It is expected that upcoming Fifth Generation (5G) wireless networks, known as more than an extension to 4G, will be the backbone of IoT and CPS, and will support IoT systems by expanding their coverage, reducing latency and enhancing data rate. However, there are several challenges to be addressed to provide resilient connections supporting the massive number of often resource-constrained IoT and other wireless devices. Hence, due to several unique features of emerging applications, such as low latency, low cost, low energy consumption, resilient and reliable connections, traditional communication protocols and techniques are not suitable.

In this regard, it is crucial to have security by design in 5G wireless networks, considering the constraints imposed by heterogeneous IoT and CPS systems. Our aim is to promote the development of 5G security by design. The ICC workshop on 5G-Security aims to serve as a forum for researchers from academia, government and industries, to exchange ideas, present new results, and provide future visions on these topics.

Topics of interest include but are not limited to:

    • 5G architecture with security and privacy considerations
    • Security for new service delivery models
    • Verticals and business (non-technical) 5G security requirements and solutions
    • Big data analytics tools and techniques in 5G Security
    • Advances in lightweight cryptography and IoT/CPS security
    • Wireless virtualization and slicing security
    • Authentication, authorization, and accounting (AAA) for 5G security
    • Diameter security in 5G
    • Quantum Safe Cryptography for 5G
    • Secure Integration of IoT/CPS and Cloud Computing
    • Secure Device-to-Device communications in 5G
    • Secure integration of IoT /CPS and other networks
    • Intrusion Detection/Prevention Techniques and System Integrity
    • Secure data storage, communications and computing
    • Energy efficient security in IoT and CPS
    • Heterogeneous system modeling for 5G security
    • Secure sensing and computing techniques in 5G
    • Big data analytics for 5G security
    • Secure, privacy-aware and trustworthy IoT/CPS communications
    • Trust models and trust handling/propagation for 5G security
    • Physical layer security for 5G
    • 5G security standardization