Information Security in Telecommunication Systems

A special issue of Future Internet (ISSN 1999-5903). This special issue belongs to the section "Smart System Infrastructure and Applications".

Deadline for manuscript submissions: closed (20 December 2025) | Viewed by 3718

Special Issue Editors


E-Mail Website
Guest Editor
School of Cyber Engineering, Xidian University, Xi’an 710126, China
Interests: network security; network measurement

E-Mail Website
Guest Editor
School of Automation, Qingdao University, Qingdao 266071, China
Interests: complex system modeling; intelligent control and optimization; machine learning

E-Mail Website
Guest Editor
School of Artificial Intelligence, OPtics and ElectroNics (iOPEN), Northwestern Polytechnical University (NWPU), Xi’an 710072, China
Interests: information computation; pattern recognition; image processing

Special Issue Information

Dear Colleagues,

Post-5G or 6G telecommunication infrastructure has become important in modern society, supporting the needs of daily communications. However, with the increasing complexity of network environments and the rapid influx of access devices, information security has gradually become a key factor restricting the development of telecommunication infrastructure. On the one hand, cyberattacks are becoming increasingly diverse and sophisticated. Hackers, malware, and other threats continue to launch attacks on telecommunication infrastructure, trying to steal important data and disrupt the normal operation of the system. This situation will lead to the disclosure of user privacy and may cause extensive communication failure, seriously affecting social and economic activities. On the other hand, the complexity of telecommunication infrastructure itself also brings difficulties to information security. Large network architectures, numerous access points, and constantly updated technologies can create new security vulnerabilities.

The goal of this Special Issue is to provide the latest research methods on information security in post-5G or 6G telecommunication infrastructures. Theoretical and technical methods related with big data analysis and encryption techniques in telecommunication infrastructure are also encouraged.

Topics of interest include, but are not limited to, the following:

  • Intrusion detection and attack defense in post-5G or 6G;
  • Privacy computing in post-5G or 6G;
  • Trust management and access control in post-5G or 6G;
  • Vulnerability discovery and patching in post-5G or 6G;
  • Edge computing in post-5G or 6G;
  • New data structure for big data analysis in post-5G or 6G;
  • Encryption techniques in post-5G or 6G;
  • Hardware security in post-5G or 6G;
  • Virtualized resource security in post-5G or 6G;
  • Experience reports on security and privacy issues of post-5G or 6G.

Dr. Xuyang Jing
Dr. Xian Li
Dr. Cong Wang
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 250 words) can be sent to the Editorial Office for assessment.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • post-5G or 6G
  • information security
  • intrusion detection
  • privacy computing
  • trust management
  • big data analysis

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

36 pages, 537 KB  
Article
WebRTC Swarms: Decentralized, Incentivized, and Privacy-Preserving Signaling with Designated Verifier Zero-Knowledge Authentication
by Rafał Skowroński
Future Internet 2026, 18(1), 13; https://doi.org/10.3390/fi18010013 - 26 Dec 2025
Viewed by 1853
Abstract
Real-time peer-to-peer communication in web browsers typically relies on centralized signaling servers, creating single points of failure, privacy vulnerabilities, and censorship risks. We present WebRTC Swarms, a fully decentralized signaling architecture integrated into GRIDNET OS that combines onion-routed relay circuits with designated verifier [...] Read more.
Real-time peer-to-peer communication in web browsers typically relies on centralized signaling servers, creating single points of failure, privacy vulnerabilities, and censorship risks. We present WebRTC Swarms, a fully decentralized signaling architecture integrated into GRIDNET OS that combines onion-routed relay circuits with designated verifier zero-knowledge authentication and cryptoeconomic incentives. The proposed system empowers peers to discover and connect without exposing identities or IP addresses through an overlay of incentivized full nodes that carry signaling traffic using transmission tokens. We introduce a MAC-based designated verifier ZK authentication protocol allowing peers sharing a pre-shared key to mutually authenticate without revealing the key, ensuring only authorized participants can join sessions while preserving unlinkability to outsiders across sessions. Through formal verification using TLA+, we prove key safety and liveness properties of both the signaling protocol and the authentication mechanism. Empirical evaluation demonstrates near-100% NAT traversal success via incentivized decentralized TURN relaying (compared to approximately 85% for STUN-only approaches), join latencies under 2 s for swarms of dozens of peers, and strong resilience against Sybil and denial-of-service attacks through token-based rate limiting. Our work represents the first practical integration of decentralized WebRTC signaling with designated verifier cryptographic authentication and built-in economic incentives, providing a privacy-first substrate for secure, community-governed communication networks. Full article
(This article belongs to the Special Issue Information Security in Telecommunication Systems)
Show Figures

Graphical abstract

21 pages, 481 KB  
Article
Transformer-Based Intrusion Detection for Post-5G and 6G Telecommunication Networks Using Dynamic Semantic Embedding
by Haonan Yan, Xin Pang, Shaopeng Zhou and Honghui Fan
Future Internet 2025, 17(12), 544; https://doi.org/10.3390/fi17120544 - 27 Nov 2025
Cited by 2 | Viewed by 994
Abstract
Post-5G and 6G telecommunication infrastructures face critical information security challenges due to increasing network complexity and sophisticated cyberattacks. Traditional intrusion detection systems based on statistical traffic analysis struggle to identify advanced threats that exploit semantic-level vulnerabilities in modern communication protocols. This paper proposes [...] Read more.
Post-5G and 6G telecommunication infrastructures face critical information security challenges due to increasing network complexity and sophisticated cyberattacks. Traditional intrusion detection systems based on statistical traffic analysis struggle to identify advanced threats that exploit semantic-level vulnerabilities in modern communication protocols. This paper proposes a Transformer-based intrusion detection system specifically designed for post-5G and 6G networks. Our approach integrates three key innovations: First, a comprehensive feature extraction method capturing both semantic content characteristics and communication behavior patterns. Second, a dynamic semantic embedding mechanism that adaptively adjusts positional encoding based on semantic context changes. Third, a Transformer-based classifier with multi-head attention mechanisms to model long-range dependencies in attack sequences. Extensive experiments on CICIDS2017 and UNSW-NB15 datasets demonstrate superior performance compared to LSTM, GRU, and CNN baselines across multiple evaluation metrics. Robustness testing and cross-dataset validation confirm strong generalization capability, making the system suitable for deployment in heterogeneous post-5G and 6G telecommunication environments. Full article
(This article belongs to the Special Issue Information Security in Telecommunication Systems)
Show Figures

Figure 1

Back to TopTop