Cybersecurity and Mobility in 5G and Beyond
A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".
Deadline for manuscript submissions: closed (30 September 2021) | Viewed by 10674
Special Issue Editor
Interests: IT security; cryptography; wireless sensor networks; information security; network security; applied mathematics; risk assessment security engineering; applied and computational mathematics; data security
Special Issues, Collections and Topics in MDPI journals
Special Issue Information
Dear Colleagues,
A 5G network places high demands on the network’s operating conditions: performance, scalability, latencies, mobile access, a variety of services, etc. To fulfill its tasks, the network is based on three pillars: programmability, virtualization, and the application of edge servers in the cloud. This translates to the usage of three technologies: software-defined networking (SDN), network function virtualization (NFV), and multi-access edge computing (MEC). While guaranteeing network security and mobility, all these extreme requirements and the technological solutions proposed to meet them lead to a complicated network of dependencies and connections between hardware components and expected network functionalities.
This Special Issue is planned as a forum for the exchange of experience in the development of technology, good practices, and prospective visions for security and mobility in 5G networks, guaranteeing the equal and beneficial coexistence of all partners in the network: network providers, service providers, and end users.
Potential topics include but are not limited to the following:
5G MEC networks: threats, vulnerabilities, attacks and countermeasures;
E2E security in 5G;
Cyber intelligence in 5G and beyond;
Hard and soft security in 5G;
Verticals and enterprise cybersecurity;
Slicing and multi-tenancy;
Isolation of slices in 5G RAN and CN;
Privacy protection in RAN and CN;
Secure and reliable interfacing in RAN and CN;
Security measures for virtualized networks;
Secure access technologies;
Access management in verticals;
Security-oriented management and orchestration in contemporary networks;
Modern industrial networks security;
Secure multi-tenancy in sliced networks;
Tenants privacy protection;
Regulation, compliance, and forensics for 5G MEC applications;
Developing security solutions;
New cryptographic algorithms for 5G MEC and cloud edge services;
Future networks sovereignty.
Prof. Dr. Zbigniew Kotulski
Guest Editor
Manuscript Submission Information
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.
Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.
Keywords
- 5G networks mobile edge computing security and privacy cyber intelligence
- modern cryptographic algorithms
- network slicing
- slices isolation
- E2E security
- 5G verticals
Benefits of Publishing in a Special Issue
- Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
- Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
- Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
- External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
- e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.
Further information on MDPI's Special Issue polices can be found here.