IW5GS2015
The 1st International Workshop on 5G Security held in conjunction with IEEE TrustCom-15
August 20-22, 2015, Helsinki, Finland
There is a fast on-going change in the technical architectures and topologies
of the Internet: in the near future 5G and next generation 4G/LTE network
architectures will be based on or migrated to Software Defined Networking (SDN)
and Network Functions Virtualization (NFV). These create new virtual network
elements each affecting the logic of the network operation, traffic management
and introducing new and novel security challenges. Aspects such as security of
orchestration, management functionality as well as surveillance and privacy are
brought to the fore. At the same time they introduce new ways of dealing with
attack prevention, management and recovery.
The one-day workshop will consist of papers, presentations and demonstrations on the subject of advanced network security. While primarily related to 5G networks, experiences from 4G/LTE, 3G and earlier, including case studies on practicalities of known attacks and novel attack vectors will be considered for acceptance. An invited keynote speech will be given setting out the overall area of security in network development and operations.
Scope and Interests
We solicit papers and demonstrations in the following areas related to 5G/LTE security:
The one-day workshop will consist of papers, presentations and demonstrations on the subject of advanced network security. While primarily related to 5G networks, experiences from 4G/LTE, 3G and earlier, including case studies on practicalities of known attacks and novel attack vectors will be considered for acceptance. An invited keynote speech will be given setting out the overall area of security in network development and operations.
Scope and Interests
We solicit papers and demonstrations in the following areas related to 5G/LTE security:
- Core Network Security
- Cellular security
- Device to Device (D2D)
- Security Management and Orchestration of NFV and SDN elements
- Terminal and Edge Computing Security
- Malware and attack detection and prevention techniques, eg: machine learning
- Authentication and Authorisation
- Encryption protocols, eg: homomorphic encryption
- Key Exchange, Storage and Protection
- Content/Semantic processing, inc. anonymisation of (meta*-) data
- Honeypot and Firewall Technologies
- Protocol security: Diameter, SS7, BGP, etc
- Physical Layer Security
- Formal Specification and Analysis of Protocols and Attacks, eg: model checking etc.
- Trusted Computing with NFV and SDN
Submission and Publication Information
TBAImportant Dates
Submission deadline: March 31, 2015Authors notification: May 31, 2015
Camera-ready due: July 1, 2015
Registration: July 1, 2015
Program Co-Chairs
Dr. Ian Oliver, Nokia, FinlandDr. Silke Holtmanns, Nokia, Finland
Program Committee
Dr. Rolf Blom (Security Researcher), SICS Security Lab, SwedenDr. Aidan Delaney, University of Brighton, UK
Tobias Engel (Security Expert), Sternraute, Germany (tbc)
Hannu Flinck (Senior Specialist in Internet Technologies), Nokia Networks, Finland
Dr. Martin Gerdes (Ph.D. Fellow), University of Agdar, Norway
Dr. Philip Ginzboorg (Senior Researcher), Huawei, Finland
Leo Hippalainen (Security Expert), Nokia Networks, Finland
Prof. John Howse, University of Brighton, UK
Prof. Theo Kanter, University of Stockholm, Sweden
Dr. Kari Kostiainen (Researcher), ETH Zürich, Switzerland
Dr. Ulrike Meyer (Security Expert), RWTH Aachen, Germany
Prof. Chris Mitchell, Royal Holloway, University of London, UK
Markus Miettinen (Research Assistant), University of Darmstadt, Germany
Dr. Martin Otto (Head of Cyber Security Research), Siemens AG, Germany
Dr. Anand Prasant (3GPP Security Chair), NEC, Japan
Peter Schneider (Senior Specialist Security Solutions), Nokia Networks, Germany
Prof. Taleb Tirak, Aalto University, Finland
Prof. Ralf Tönjes, University of Applied Science, Osnabrueck, Germany
Janne Uusilehto (Head of Security and Privacy), Microsoft Mobile, Finland
Prof. Thanh van Do, Telenor, Norway
Prof. Alf Zugenmaier, Munich University of Applied Science, Germany
No comments:
Post a Comment