posted by user: Liang || 6126 views || tracked by 5 users: [display]

IEEE Network 2021 : IEEE Network Magazine Special Issue Call for Paper: Trust, Security and Privacy of 6G

FacebookTwitterLinkedInGoogle

Link: https://www.comsoc.org/publications/magazines/ieee-network/cfp/trust-security-and-privacy-6g
 
When N/A
Where N/A
Submission Deadline Dec 15, 2021
Notification Due Feb 1, 2022
Final Version Due Apr 15, 2022
Categories    6G   trust   security   privacy
 

Call For Papers

6G follows the footsteps of 5G and pursues the integration of communications and sensing. Through sensing the physical world and human-beings, 6G should be capable of programming to offer automation systems that span a rich variety of devices, several types of network and communication technologies and humans. 6G should timely offer user expected and satisfied networking services. It will embrace emerging technologies, such as quantum communication, molecular communication, real-time intelligent edge, Internet of everything, etc. As a consequence, personal and national safety will highly depend on network and information security. But sensing human-beings and physical world brings serious concern on privacy preservation, which however, conflicts with trust. Another view of 6G is it is a large-scale heterogeneous network (LS-HetNet) by integrating terrestrial networks, space satellite networks, marine networks. Such an integrated network can seamlessly support anywhere and anytime networking. But high Quality-of-Trust should be offered by LS-HetNet to meet mobile user expectations. By integrating with cloud computing, edge computing, network resources can be economically arranged with high flexibility across multiple domains according to user demands. But this requests virtual collaboration among multiple network operators in a trustworthy way with privacy preservation at both operator level and user level. Anticipating future development, ITU-T specifies that Trustworthy Networking should be provided. Trustworthy networking in 6G should ensure security and overcome privacy leakage in an integrated way. In short, 6G is expected to hold such attractive features as trustworthy and autonomous networking based on effective sensing to automatically satisfy user demands through integration of heterogeneous communication and networking technologies. However, such promising features introduce new challenges on trust, security and privacy, which motivate research and practice.

This special issue aims to bring together recent advances on trust, security and privacy in the 6G networks. It welcomes original and innovative perspectives on theories, methodologies, schemes, algorithms, and systems related to 6G trust, security and privacy, from academia, industry, and government. We invite survey and tutorial articles directed to the special issue. Potential topics include but are not limited to the following:

• Theories, architectures and applications of 6G trustworthy networking
• Trustworthy and intelligent routing
• Trust modeling, trust policies and trust mechanisms
• Network trust evaluation and measurement
• 6G network security architecture
• Machine learning for network trust, security and privacy
• Blockchain and 6G trustworthy networking
• End-to-end communication security, privacy and trust
• Cryptography and trustworthy networking
• Smart handover with security and privacy
• Network resource arrangement for trustworthy networking
• Intrusion detection in integrated HetNets
• Security and privacy protection in 6G
• Trust management of 6G
• Network data collection, classification and trust analytics
• Incentive mechanisms of trust management
• Physical security and trust of 6G
• 6G positioning and its trust, security and privacy
• 6G service trust, security and privacy
• Post-quantum cryptography for 6G
• Embedded trust and distributed trust
• Distributed ledger technologies and differential privacy approaches
• Regulation and standardization about 6G security, privacy and trust
• Credibility authentication in 6G
• Edge intelligence/IoT security
• Trust, security and privacy of promising communication technologies in 6G
• Sensing with privacy preservation
• Analysis and design of 6G protocol security
• Domain specific security, privacy and trust in 6G
• Trust, security and privacy of digital twin in 6G"


Important Dates:

Manuscript Submission Deadline: 15 December 2021
Initial Decision Notification: 1 February 2022
Revised Manuscript Due: 1 March 2022
Final Decision Notification: 1 April 2022
Final Manuscript Due: 15 April 2022
Publication Date: July 2022

Guest Editors
• Zheng Yan, Xidian University, China, Aalto University, Finland (zyan@xidian.edu.cn; zheng.yan@aalto.fi)
• Laurence T. Yang, St Francis Xavier University, Canada (ltyang@gmail.com)
• Tieyan Li, Huawei, Singapore (Li.Tieyan@huawei.com)
• Yoan Miche, Nokia, Finland (yoan.miche@nokia-bell-labs.com)
• Shui Yu, University of Technology Sydney, Australia (Shui.Yu@uts.edu.au)
• Stephen Yau, Arizona State University, USA (yau@asu.edu)

Related Resources

ACM WiSec Call for Workshop 2023   ACM WiSec 2023 - Call for Workshop Proposals
EICC 2023   European Interdisciplinary Cybersecurity Conference (EICC 2023)
IEEE CCNC STP-CPS 2023   5th International Workshop on Security Trust Privacy for Cyber-Physical Systems (STP-CPS'23) with IEEE CCNC 2023, 8-11 January, Las Vegas, NV, USA
IEEE ICA 2022   The 6th IEEE International Conference on Agents
IROS 2023   IEEE/RSJ International Conference on Intelligent Robots and Systems
SI on ATD&IS II 2023   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI
ICISSP 2023   9th International Conference on Information Systems Security and Privacy
IEEE SSCI 2023   2023 IEEE Symposium Series on Computational Intelligence
IEEE ICIVC 2023   IEEE--2023 8th International Conference on Image, Vision and Computing (ICIVC 2023)
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications