posted by organizer: msanka || 9431 views || tracked by 7 users: [display]

5G_Security 2017 : Comprehensive Guide to 5G Security

FacebookTwitterLinkedInGoogle

Link: https://sites.google.com/site/5gbook2017/
 
When Apr 1, 2016 - Aug 31, 2017
Where Finland
Abstract Registration Due Jul 31, 2016
Submission Deadline Dec 1, 2016
Notification Due Jan 15, 2017
Final Version Due Feb 14, 2017
Categories    communication   engineering   computer science   information technology
 

Call For Papers

Call for Chapters – Comprehensive Guide to 5G Security

We would like to bring your attention to the edited books i.e. "Comprehensive Guide to 5G Security". This book will be published by WILEY Publishers and is anticipated to be in print by August 2017 tentatively. We request you to kindly contribute chapters for the book based on your research expertise.

Editors
• Madhusanka Liyanage (University of Oulu, Finland)
• Andrei Gurtov (Aalto University, Finland)
• Mika Yliantilla (University of Oulu, Finland)
• Ijaz Ahmed (University of Oulu, Finland)
• Ahmed Bux Abro (VMware, Inc. USA)

Important Dates
• Proposals Submission Deadline: 31th July 2016
• Acceptance of Proposals: 31st August 2016
• Full Chapter Submission: 01th December 2016
• Review Results: 15th January 2017
• Final Chapters Due: 14th February 2017

More information can be found in Call for Chapter website:
https://sites.google.com/site/5gbook2017/

Objective
The book provides a reference material to a comprehensive study of 5G security. It offers an insight into the current and future threats to mobile networks and mechanisms to protect it. It covers the critical lifecycle functions and stages of 5G security, and how to build effective security architecture for 5G based mobile networks. This is the first time mobile network security is addressed based on Network-centricity, Device-centricity, Information-centricity and most importantly People-Centricity in a single book.

Target Audience
This books offers security considerations for all relative stakeholders of mobile networks such as mobile network operators (MNOs), mobile network virtual operators (MVNOs), Mobile users, wireless users, IoT organizations and digital organizations. Furthermore, this book will provide very useful reference material for academic professionals and young students and researchers.

Recommended Topics include, but are not limited to, the following
Part I : 5G Security Overview
1. Evolution of Cellular Systems
• Evolution of Mobile Networks
• History of Mobile Networks

2. 5G mobile networks
• 5G requirements
• 5G Working Groups/ Research Communities

3. Security Standardization

4. Mobile Networks Security Landscape
• Evolution of Security Threats for Mobile Networks
• Attack Vectors
• Mitigation Mechanisms

5. Overview of 5G Security Lifecycle Functions
• Security Measurement (Measure the security using metrics)
• Threat analysis, Risk Analysis, Behavior Analysis, Data Protection Analysis
• Security Auditing, Security Monitoring
• Security Policy Management, Security Device Management

6. Overview of 5G Security Architecture
• 5G Security Business and Technical Use cases
• Security Requirements, Security Principles
• Security Domains

7. Building security architecture for 5G Networks

8. The 5G Security Areas
• 5G Network-Centric Security
• 5G Device and People -Centric Security
• 5G Cloud Security
• 5G Information-Centric Security
• 5G Industry-Centric Security

Part II : 5G Network-Centric Security

9. 5G-Core Network Security
• SGi Interface Security
• S8 Security
• EPC security

10. Radio Access Network Security
• S1 Interface Security
• eNB Security
• Physical Layer Security

11. 5G-WLAN Security
• WiFi security
• LiFi Security

12. SDMN Security
• Control Plane Security
• Data Plane Security
• Application Plane Security
• Management-Plane Security
• Communication Channels Security

13. Mobile Virtual Network Operator (MVNO) Security

Part III : 5G Device-Centric Security

14. Mobile Device Security
• USIM Security
• Local authentication

15. M2M (Machine to Machine) and D2D (Device to Device) Security

16. IoT Security

Part VI : 5G Cloud and Data Center Security

17. Infrastructure Security
• Virtualization layer security,Firewalls, VPNs

18. NFV based security services

19. Cloud Security
• Secure Multi-Tenancy
• Security as a Service

Part V : 5G Information and People-Centric Security

20. Data Protection
• Data Access Control
• Data Encryption

21. Big Data Analytics for 5G Security

22. User Privacy

23. Identity and access management

24. Regulatory Impacts on Security



Submission Procedure:

Researchers and practitioners are invited to submit, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified by 31st of August, 2016 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by 1st of December, 2016. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project. More information can be found in Call for Chapter website:

Manuscript guidelines:

Refer to the link shown: Click here. The preparation of manuscripts submitted for the book must be in the scope of the book, original and not previously published elsewhere or currently under review. Expected chapter length is between 8,000 to 15,000 words or more (or can be discussed with the editors). The formatting of initial or draft manuscripts should follow: A4 page format, single column with 11 point Times New Roman font with 1.5 line spacing, while submitting your manuscript as Microsoft Office Word document. WILEY follows Harvard Style as the reference style. Refer to manuscript instruction file.

Publishing and Indexing:

This book is scheduled to be published by WILEY Publishers. For additional information regarding the publisher, please visit WILEY Publishers . This publication is anticipated to be released in August 2017.

Publication Cost to Authors:

Free of charge. Contributors will be offered one free electronic copy.


Inquiries and submissions can be forwarded electronically (Word document):

Madhusanka Liyanage
Research Scientist,
Centre for Wireless Communication,
University of Oulu,
Finland.
E-mail: 5gbook2017@gmail.com
Website: https://sites.google.com/site/5gbook2017/

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
CETA's EOAP 2025   Call for chapters: Comprehensive Training and Employment Act's (CETA) Employment of Artists Project (1974–1981)
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
SEAS 2025   14th International Conference on Software Engineering and Applications
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
Philosophical Approaches to Games and Ga 2024   Call For Papers - Philosophical Approaches to Games and Gamification: Ethical, Aesthetic, Technological and Political Perspectives
ISCSO 2024   Multi-Objective Optimization Competition
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
ISKE 2025   The 20th International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2025)