Deception Techniques for Advanced Cybersecurity in 5G/6G and Beyond Networks
A special issue of Electronics (ISSN 2079-9292).
Deadline for manuscript submissions: closed (15 March 2025)
Special Issue Editors
Interests: Network Function Virtualization, Network Softwarization, Software Defined Networking
2. Faculty of Information Technology and Electrical Engineering, University of Oulu, Oulu, Finland
Interests: 5G/6G network; cryptographic; cyber security; edge and cloud computing; intrusion detection systems
Special Issues, Collections and Topics in MDPI journals
Interests: mobile and sensor networks; computer security; digital forensics; 5G security; AI security
Special Issues, Collections and Topics in MDPI journals
Special Issue Information
Dear Colleagues,
The amount of data transferred through computer networks is growing every day. Hence, these networks as well as the Internet of things (IoT) and 5G/6G are becoming favorable targets for cyber adversaries. Unknown and zero-day attacks are hard to detect, and many unknown attacks are complex enough to be easily mitigated. Therefore, computer networks require defensive mechanisms one step ahead of the adversary. Deception techniques, especially honeypots, are a good candidate in this regard.
Deception techniques are methods used to mislead or manipulate an adversary by creating false impressions, diverting attention, or concealing true intentions. These techniques include tactics such as camouflage, misdirection, deception to hide or conceal the truth, disinformation and falsification to spread false information, and the manipulation or obfuscation of time to confuse or overwhelm a target. They are widely used in fields such as military strategy, cyber security, and psychological operations, often combining multiple techniques to achieve the desired result of misleading or outmaneuvering the adversary.
Deception techniques such as (camouflage, misdirection, feints, decoys, dazzle or confusion tactics, disinformation, masking, double agents, spoofing, honey or honeypots traps, red herrings, obfuscation, and time manipulation) can be applied in the context of 5G networks, particularly in cybersecurity and network management. For example, honeypots are deceptive decoys that pretend to be a productive asset in the network. They can attract adversaries by mimicking vulnerable services. Since legitimate users do not connect to the honeypots, whenever a connection is established, it always an adversary. The honeypots can waste the adversary’s time and resources and collect threat information and patterns.
This Special Issue invites the researchers to present their ideas for improving the deception techniques for advanced cybersecurity in 5G/6G and Beyond networks. Using these techniques can enhance the security, resilience, and reliability of Beyond networks by making it harder for attackers to understand, predict, or exploit the network environment. Some approaches, such as machine learning methods, optimization algorithms, and mathematical models, can be utilized.
The topics of interest for this Special Issue include, but are not limited to, the following:
- Utilizing Machine Learning techniques to improve deception techniques performance;
- Optimizing the number and types of decoys deployed in Beyond networks;
- Improving the deception techniques using game theory models;
- Using the potential of software-defined networking technology for cybersecurity in Beyond networks;
- Presenting a mathematical model for deception techniques in Beyond networks;
- Reviewing the Anti-Deception techniques and their vulnerabilities;
- Proposing combined deception techniques based on Artificial Intelligence.
Prof. Dr. Tarik Taleb
Dr. Amir Javadpour
Dr. Chafika Benzaïd
Guest Editors
Manuscript Submission Information
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.
Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.
Keywords
- deception techniques, cybersecurity, Beyond networks
Benefits of Publishing in a Special Issue
- Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
- Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
- Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
- External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
- Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.
Further information on MDPI's Special Issue policies can be found here.