Cybersecurity and Mobility in 5G and Beyond
A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".
Deadline for manuscript submissions: closed (30 September 2021) | Viewed by 9436
Special Issue Editor
Interests: IT security; cryptography; wireless sensor networks; information security; network security; applied mathematics; risk assessment security engineering; applied and computational mathematics; data security
Special Issues, Collections and Topics in MDPI journals
Special Issue Information
Dear Colleagues,
A 5G network places high demands on the network’s operating conditions: performance, scalability, latencies, mobile access, a variety of services, etc. To fulfill its tasks, the network is based on three pillars: programmability, virtualization, and the application of edge servers in the cloud. This translates to the usage of three technologies: software-defined networking (SDN), network function virtualization (NFV), and multi-access edge computing (MEC). While guaranteeing network security and mobility, all these extreme requirements and the technological solutions proposed to meet them lead to a complicated network of dependencies and connections between hardware components and expected network functionalities.
This Special Issue is planned as a forum for the exchange of experience in the development of technology, good practices, and prospective visions for security and mobility in 5G networks, guaranteeing the equal and beneficial coexistence of all partners in the network: network providers, service providers, and end users.
Potential topics include but are not limited to the following:
5G MEC networks: threats, vulnerabilities, attacks and countermeasures;
E2E security in 5G;
Cyber intelligence in 5G and beyond;
Hard and soft security in 5G;
Verticals and enterprise cybersecurity;
Slicing and multi-tenancy;
Isolation of slices in 5G RAN and CN;
Privacy protection in RAN and CN;
Secure and reliable interfacing in RAN and CN;
Security measures for virtualized networks;
Secure access technologies;
Access management in verticals;
Security-oriented management and orchestration in contemporary networks;
Modern industrial networks security;
Secure multi-tenancy in sliced networks;
Tenants privacy protection;
Regulation, compliance, and forensics for 5G MEC applications;
Developing security solutions;
New cryptographic algorithms for 5G MEC and cloud edge services;
Future networks sovereignty.
Prof. Dr. Zbigniew Kotulski
Guest Editor
Manuscript Submission Information
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.
Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.
Keywords
- 5G networks mobile edge computing security and privacy cyber intelligence
- modern cryptographic algorithms
- network slicing
- slices isolation
- E2E security
- 5G verticals