Tuesday, 10 February 2015

IW5GS2015 - The 1st International Workshop on 5G Security held in conjunction with IEEE TrustCom-15

IW5GS2015

The 1st International Workshop on 5G Security held in conjunction with IEEE TrustCom-15

August 20-22, 2015, Helsinki, Finland


There is a fast on-going change in the technical architectures and topologies of the Internet: in the near future 5G and next generation 4G/LTE network architectures will be based on or migrated to Software Defined Networking (SDN) and Network Functions Virtualization (NFV). These create new virtual network elements each affecting the logic of the network operation, traffic management and introducing new and novel security challenges. Aspects such as security of orchestration, management functionality as well as surveillance and privacy are brought to the fore. At the same time they introduce new ways of dealing with attack prevention, management and recovery.

The one-day workshop will consist of papers, presentations and demonstrations on the subject of advanced network security. While primarily related to 5G networks, experiences from 4G/LTE, 3G and earlier, including case studies on practicalities of known attacks and novel attack vectors will be considered for acceptance. An invited keynote speech will be given setting out the overall area of security in network development and operations.

Scope and Interests
We solicit papers and demonstrations in the following areas related to 5G/LTE security:

  • Core Network Security
  • Cellular security
  • Device to Device (D2D)
  • Security Management and Orchestration of NFV and SDN elements
  • Terminal and Edge Computing Security
  • Malware and attack detection and prevention techniques, eg: machine learning
  • Authentication and Authorisation
  • Encryption protocols, eg: homomorphic encryption
  • Key Exchange, Storage and Protection
  • Content/Semantic processing, inc. anonymisation of (meta*-) data
  • Honeypot and Firewall Technologies
  • Protocol security: Diameter, SS7, BGP, etc
  • Physical Layer Security
  • Formal Specification and Analysis of Protocols and Attacks, eg: model checking etc.
  • Trusted Computing with NFV and SDN

Submission and Publication Information

TBA

Important Dates

Submission deadline: March 31, 2015
Authors notification: May 31, 2015
Camera-ready due: July 1, 2015
Registration: July 1, 2015

Program Co-Chairs

Dr. Ian Oliver, Nokia, Finland
Dr. Silke Holtmanns, Nokia, Finland

Program Committee

Dr. Rolf Blom (Security Researcher), SICS Security Lab, Sweden
Dr. Aidan Delaney, University of Brighton, UK
Tobias Engel (Security Expert), Sternraute, Germany (tbc)
Hannu Flinck (Senior Specialist in Internet Technologies), Nokia Networks, Finland
Dr. Martin Gerdes (Ph.D. Fellow), University of Agdar, Norway
Dr. Philip Ginzboorg (Senior Researcher), Huawei, Finland
Leo Hippalainen (Security Expert), Nokia Networks, Finland
Prof. John Howse, University of Brighton, UK
Prof. Theo Kanter, University of Stockholm, Sweden
Dr. Kari Kostiainen (Researcher), ETH Zürich, Switzerland
Dr. Ulrike Meyer (Security Expert), RWTH Aachen, Germany
Prof. Chris Mitchell, Royal Holloway, University of London, UK
Markus Miettinen (Research Assistant), University of Darmstadt, Germany
Dr. Martin Otto (Head of Cyber Security Research), Siemens AG, Germany
Dr. Anand Prasant (3GPP Security Chair), NEC, Japan
Peter Schneider (Senior Specialist Security Solutions), Nokia Networks, Germany
Prof. Taleb Tirak, Aalto University, Finland
Prof. Ralf Tönjes, University of Applied Science, Osnabrueck, Germany
Janne Uusilehto (Head of Security and Privacy), Microsoft Mobile, Finland
Prof. Thanh van Do, Telenor, Norway
Prof. Alf Zugenmaier, Munich University of Applied Science, Germany

Contact

Please email inquiries concerning the workshop to Ian Oliver and Silke Holtmanns.

No comments: