Cybersecurity and Mobility in 5G and Beyond

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: closed (30 September 2021) | Viewed by 9436

Special Issue Editor

Faculty of Electronics and Information Technology, Institute of Telecommunications, Department of Cybersecurity, Warsaw University of Technology, 00-665 Warszawa, Poland
Interests: IT security; cryptography; wireless sensor networks; information security; network security; applied mathematics; risk assessment security engineering; applied and computational mathematics; data security
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

A 5G network places high demands on the network’s operating conditions: performance, scalability, latencies, mobile access, a variety of services, etc. To fulfill its tasks, the network is based on three pillars: programmability, virtualization, and the application of edge servers in the cloud. This translates to the usage of three technologies: software-defined networking (SDN), network function virtualization (NFV), and multi-access edge computing (MEC). While guaranteeing network security and mobility, all these extreme requirements and the technological solutions proposed to meet them lead to a complicated network of dependencies and connections between hardware components and expected network functionalities.

 

This Special Issue is planned as a forum for the exchange of experience in the development of technology, good practices, and prospective visions for security and mobility in 5G networks, guaranteeing the equal and beneficial coexistence of all partners in the network: network providers, service providers, and end users.

Potential topics include but are not limited to the following:

5G MEC networks: threats, vulnerabilities, attacks and countermeasures;

E2E security in 5G;

Cyber intelligence in 5G and beyond;

Hard and soft security in 5G;

Verticals and enterprise cybersecurity;

Slicing and multi-tenancy;

Isolation of slices in 5G RAN and CN;

Privacy protection in RAN and CN;

Secure and reliable interfacing in RAN and CN;

Security measures for virtualized networks;

Secure access technologies;

Access management in verticals;

Security-oriented management and orchestration in contemporary networks;

Modern industrial networks security;

Secure multi-tenancy in sliced networks;

Tenants privacy protection;

Regulation, compliance, and forensics for 5G MEC applications;

Developing security solutions;

New cryptographic algorithms for 5G MEC and cloud edge services;

Future networks sovereignty.

Prof. Dr. Zbigniew Kotulski
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • 5G networks mobile edge computing security and privacy cyber intelligence
  • modern cryptographic algorithms
  • network slicing
  • slices isolation
  • E2E security
  • 5G verticals

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

20 pages, 1255 KiB  
Article
Token-Based Authentication Framework for 5G MEC Mobile Networks
by Wojciech Niewolski, Tomasz W. Nowak, Mariusz Sepczuk and Zbigniew Kotulski
Electronics 2021, 10(14), 1724; https://0-doi-org.brum.beds.ac.uk/10.3390/electronics10141724 - 18 Jul 2021
Cited by 9 | Viewed by 3650
Abstract
MEC technology provides a distributed computing environment in 5G mobile networks for application and service hosting. It allows customers with different requirements and professional competencies to use the services offered by external suppliers. We consider a service access control framework on 5G MEC [...] Read more.
MEC technology provides a distributed computing environment in 5G mobile networks for application and service hosting. It allows customers with different requirements and professional competencies to use the services offered by external suppliers. We consider a service access control framework on 5G MEC networks that is efficient, flexible, and user-friendly. Its central element is the MEC Enabler, which handles AAA requests for stakeholders accessing services hosted on the edge servers. The JSON Web Token (JWT) open standard is a suitable tool for the MEC Enabler to manage access control credentials and transfer them securely between parties. In this paper, in the context of access control, we propose the token reference pattern called JSON MEC Access Token (JMAT) and analyze the effectiveness of its available protection methods in compliance with the standard requirements of MEC-hosted services in 5G networks. Full article
(This article belongs to the Special Issue Cybersecurity and Mobility in 5G and Beyond)
Show Figures

Figure 1

32 pages, 1895 KiB  
Article
Improving Security of Future Networks Using Enhanced Customer Edge Switching and Risk-Based Analysis
by Slawomir Nowaczewski and Wojciech Mazurczyk
Electronics 2021, 10(9), 1107; https://0-doi-org.brum.beds.ac.uk/10.3390/electronics10091107 - 08 May 2021
Viewed by 1635
Abstract
Customer Edge Switching (CES) is an extension of the already known classical firewall that is often described and used in future networks like 5G. It extends its functionality by enabling information exchange with other firewalls to decide whether the inspected network traffic should [...] Read more.
Customer Edge Switching (CES) is an extension of the already known classical firewall that is often described and used in future networks like 5G. It extends its functionality by enabling information exchange with other firewalls to decide whether the inspected network traffic should be considered malicious or legitimate. In this paper, we show how the Passive DNS can be used to further improve security of this solution. First, we discuss CES solution and its internals. We also determine how it uses DNS and CETP protocols. Secondly, we describe the basics of the Passive DNS and how it impacts the DNS protocol. Thirdly, we evaluate how the Passive DNS can be extended to collect also CETP information. Finally, we integrate the solutions and present obtained experimental results. Full article
(This article belongs to the Special Issue Cybersecurity and Mobility in 5G and Beyond)
Show Figures

Figure 1

18 pages, 1159 KiB  
Article
A New Card-Linked Loyalty Program: Estimated and Anticipated Benefits for Payment Transaction Parties
by Albert Sitek and Zbigniew Kotulski
Electronics 2020, 9(11), 1956; https://0-doi-org.brum.beds.ac.uk/10.3390/electronics9111956 - 19 Nov 2020
Cited by 1 | Viewed by 2779
Abstract
Electronic card payments are getting more and more popular, mainly because of their simplicity, convenience, processing time and high level of security. The fact that a single payment card is issued for a particular cardholder makes it possible to link a card to [...] Read more.
Electronic card payments are getting more and more popular, mainly because of their simplicity, convenience, processing time and high level of security. The fact that a single payment card is issued for a particular cardholder makes it possible to link a card to various services. In this paper, we investigated a usage of a payment card in the loyalty program that incorporates our Contextual Risk Management System (CRMS) to assure a novel intangible reward: Shorter transaction processing time. In the beginning, we emphasize the importance of soft benefits in modern loyalty programs and recall the risk management algorithms and the reputation system that has been used in the CRMS. Then, using an extensive dataset of 2.5 million payment transaction traces (collected within a year from 68 terminals) we estimate potential benefits for merchants and cardholders and try to predict an effect of this system for the future. We also discuss the impact of this system on the real and user-perceived security level. Full article
(This article belongs to the Special Issue Cybersecurity and Mobility in 5G and Beyond)
Show Figures

Figure 1

Back to TopTop