Recent Advances in Reliability and Security in 5G/6G Mobile Networks

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: 20 December 2024 | Viewed by 925

Special Issue Editors


E-Mail Website
Guest Editor
School of Cyber Engineering, Xidian University, Xi'an 710126, China
Interests: 5G/6G security; formal verification; AI security

E-Mail Website
Guest Editor
School of Cyber Engineering, Xidian University, Xi'an 710126, China
Interests: 5G/6G security; applied cryptography
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

With the advent of 5G technology, mobile networks have undergone significant advancements, and the future holds even greater promises with the emergence of 6G. The transition from 5G to 6G is more than a technological evolution, it represents a fundamental rethinking of how mobile networks operate and interact with other cutting-edge technologies, such as Terahertz Communications, Multimodal Network, Non-Terrestrial Network, Holographic Communication and Artificial Intelligence, which presents a multidimensional landscape that demands exploration. However, along with these advancements, new security challenges need to be addressed in order to ensure the integrity, confidentiality, availability, traceability and privacy of mobile networks. This Special Issue provides a platform for researchers and professionals to exchange knowledge and insights on the future challenges and potential solutions in mobile network security for 5G/6G. By addressing these security concerns, we can pave the way for a secure and trustworthy mobile network infrastructure that will support the digital transformation and connectivity needs of the future.

Topics of interest include (but are not limited to) the following:

  • Innovative Network Architectures for 5G/6G Mobile Network Security.
  • Formal Theories and Verification Technologies for 5G/6G Mobile Network Security.
  • Lightweight Cryptographic Algorithms and Protocols for 5G/6G Mobile Network.
  • Artificial Intelligence (AI) Solutions for Security Issues in 5G/6G Mobile Network.
  • Open Source Software (OSS) Security Technologies in 5G/6G Mobile Network.
  • Internet of Things (IoT) Security Technologies in 5G/6G Mobile Network.
  • Network Slicing Security Technologies for 5G/6G Mobile Network.
  • Security and Privacy Preservation Technologies for 5G/6G Mobile Network.
  • Innovative Attacks and Defenses Technologies in 5G/6G Mobile Network.
  • Cloud Computing and Edge Computing Security Technologies for 5G/6G Mobile Network.

Dr. Yulong Fu
Prof. Dr. Jin Cao
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • 5G/6G mobile network
  • network security
  • AI security
  • crypto-security protocols
  • OSS Security

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Review

32 pages, 2247 KiB  
Review
Security Threats, Requirements and Recommendations on Creating 5G Network Slicing System: A Survey
by Shujuan Gao, Ruyan Lin, Yulong Fu, Hui Li and Jin Cao
Electronics 2024, 13(10), 1860; https://0-doi-org.brum.beds.ac.uk/10.3390/electronics13101860 - 10 May 2024
Viewed by 361
Abstract
Network slicing empowers 5G with enhanced network performance and efficiency, cost saving, and better QoS and customer satisfaction, and expands the commercial application scenarios of 5G networks. However, the introduction of new techniques usually raises new security threats. Most of the existing works [...] Read more.
Network slicing empowers 5G with enhanced network performance and efficiency, cost saving, and better QoS and customer satisfaction, and expands the commercial application scenarios of 5G networks. However, the introduction of new techniques usually raises new security threats. Most of the existing works on 5G security only focus on 5G itself and do not analyze 5G network slicing security in detail. We consider network slices as a virtual logical network that can unite the subnetwork parts of 5G. If a 5G network slice has security problems or has been attacked, the entire 5G network will have security risks. In this paper, after synthesizing the existing literature, we analyze the security threats step by step through the lifecycle of 5G network slices, analyzing and summarizing more than 70 security threats in three major categories. Based on the security issues investigated, from a viewpoint of building a secure 5G network slicing system, we compiled 24 security requirements and proposed the corresponding recommendations for different scenarios of 5G network slicing. Finally, we collated the future research trends of 5G network slicing security. Full article
(This article belongs to the Special Issue Recent Advances in Reliability and Security in 5G/6G Mobile Networks)
Show Figures

Figure 1

Back to TopTop