posted by user: Liang || 7548 views || tracked by 5 users: [display]

IEEE Network 2021 : IEEE Network Magazine Special Issue Call for Paper: Trust, Security and Privacy of 6G

FacebookTwitterLinkedInGoogle

Link: https://www.comsoc.org/publications/magazines/ieee-network/cfp/trust-security-and-privacy-6g
 
When N/A
Where N/A
Submission Deadline Dec 15, 2021
Notification Due Feb 1, 2022
Final Version Due Apr 15, 2022
Categories    6G   trust   security   privacy
 

Call For Papers

6G follows the footsteps of 5G and pursues the integration of communications and sensing. Through sensing the physical world and human-beings, 6G should be capable of programming to offer automation systems that span a rich variety of devices, several types of network and communication technologies and humans. 6G should timely offer user expected and satisfied networking services. It will embrace emerging technologies, such as quantum communication, molecular communication, real-time intelligent edge, Internet of everything, etc. As a consequence, personal and national safety will highly depend on network and information security. But sensing human-beings and physical world brings serious concern on privacy preservation, which however, conflicts with trust. Another view of 6G is it is a large-scale heterogeneous network (LS-HetNet) by integrating terrestrial networks, space satellite networks, marine networks. Such an integrated network can seamlessly support anywhere and anytime networking. But high Quality-of-Trust should be offered by LS-HetNet to meet mobile user expectations. By integrating with cloud computing, edge computing, network resources can be economically arranged with high flexibility across multiple domains according to user demands. But this requests virtual collaboration among multiple network operators in a trustworthy way with privacy preservation at both operator level and user level. Anticipating future development, ITU-T specifies that Trustworthy Networking should be provided. Trustworthy networking in 6G should ensure security and overcome privacy leakage in an integrated way. In short, 6G is expected to hold such attractive features as trustworthy and autonomous networking based on effective sensing to automatically satisfy user demands through integration of heterogeneous communication and networking technologies. However, such promising features introduce new challenges on trust, security and privacy, which motivate research and practice.

This special issue aims to bring together recent advances on trust, security and privacy in the 6G networks. It welcomes original and innovative perspectives on theories, methodologies, schemes, algorithms, and systems related to 6G trust, security and privacy, from academia, industry, and government. We invite survey and tutorial articles directed to the special issue. Potential topics include but are not limited to the following:

• Theories, architectures and applications of 6G trustworthy networking
• Trustworthy and intelligent routing
• Trust modeling, trust policies and trust mechanisms
• Network trust evaluation and measurement
• 6G network security architecture
• Machine learning for network trust, security and privacy
• Blockchain and 6G trustworthy networking
• End-to-end communication security, privacy and trust
• Cryptography and trustworthy networking
• Smart handover with security and privacy
• Network resource arrangement for trustworthy networking
• Intrusion detection in integrated HetNets
• Security and privacy protection in 6G
• Trust management of 6G
• Network data collection, classification and trust analytics
• Incentive mechanisms of trust management
• Physical security and trust of 6G
• 6G positioning and its trust, security and privacy
• 6G service trust, security and privacy
• Post-quantum cryptography for 6G
• Embedded trust and distributed trust
• Distributed ledger technologies and differential privacy approaches
• Regulation and standardization about 6G security, privacy and trust
• Credibility authentication in 6G
• Edge intelligence/IoT security
• Trust, security and privacy of promising communication technologies in 6G
• Sensing with privacy preservation
• Analysis and design of 6G protocol security
• Domain specific security, privacy and trust in 6G
• Trust, security and privacy of digital twin in 6G"


Important Dates:

Manuscript Submission Deadline: 15 December 2021
Initial Decision Notification: 1 February 2022
Revised Manuscript Due: 1 March 2022
Final Decision Notification: 1 April 2022
Final Manuscript Due: 15 April 2022
Publication Date: July 2022

Guest Editors
• Zheng Yan, Xidian University, China, Aalto University, Finland (zyan@xidian.edu.cn; zheng.yan@aalto.fi)
• Laurence T. Yang, St Francis Xavier University, Canada (ltyang@gmail.com)
• Tieyan Li, Huawei, Singapore (Li.Tieyan@huawei.com)
• Yoan Miche, Nokia, Finland (yoan.miche@nokia-bell-labs.com)
• Shui Yu, University of Technology Sydney, Australia (Shui.Yu@uts.edu.au)
• Stephen Yau, Arizona State University, USA (yau@asu.edu)

Related Resources

CSF 2025   38th IEEE Computer Security Foundations Symposium - deadline 3
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE-EI/Scopus-IECA 2025   2025 2nd International Conference on Informatics Education and Computer Technology Applications -IEEE Xplore/EI/Scopus
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
IJCNN 2025   International Joint Conference on Neural Networks
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience
IEEE ICRAS 2025   IEEE--2025 9th International Conference on Robotics and Automation Sciences (ICRAS 2025)