Special Issue "Computational Intelligence Techniques for Securing Systems and Networks beyond 5G"

Submission Deadline: 30 June 2022
Submit to Special Issue
Guest Editors
Prof. Muhammad Asghar Khan, Hamdard University, Pakistan
Prof. Yu-Chen Hu, Providence University, Taiwan
Prof. Justyna Żywiołek, Czestochowa University of Technology, Poland

Summary

The Fifth-Generation (5G) mobile network has made it possible to envision cellular networks beyond 5G (B5G) and Sixth-Generation (6G), capable of incorporating autonomous services to systems and networks such as the Internet of Things (IoT), Industrial IoT (IIoT), Internet of Drones (IoD), Internet of Medical Things (IoMT), and others.  They provide capacity expansion strategies to resolve the issue of massive connectivity and provide ultra-high throughput, even in extreme or emergency situations where there may be varying system densities, bandwidth as well as traffic patterns. However, deploying connected devices on such a large scale will exacerbate security and privacy concerns, as well as communication and computational costs associated with managing the massive data generated by their integrated sensors. To this aim, the systems connected to cyberspace on a large scale face the most unprecedented constraints of lower computational cost, faster speed, and enhanced security attributes. Furthermore, with the rise in known and unknown cyber-attacks and privacy vulnerabilities in Internet-connected systems and networks, cybersecurity and privacy has become a difficult discipline to acquire. As a result, advanced Computational Intelligence (CI) approaches are extremely useful.

Computational intelligence is a powerful tool for solving complex security problems when traditional modelling or mathematics are inadequate. These approaches are known for their great accuracy and low computational cost, which is the prime objective of modelling any security scheme. Artificial Neural Networks (ANNs), expert systems, evolutionary computation, fuzzy systems, and learning systems are examples of CI-based methods that can help with network security and privacy.

Therefore, the focus of this Special Issue is on using computational intelligence to construct security and privacy schemes. The issue will offer new guidance to relevant scholars and broaden the scope of computational intelligence study. Both original research and review articles are encouraged to submit.

 

The topics of interest for this special issue include, but are not limited to:

 

• CI-based security and privacy-preserving schemes for systems and networks beyond 5G   

 

• Evolutionary computing and swarm intelligence-based trust control in systems and networks beyond 5G  

 

• Advanced deep learning cyberspace intrusion detection algorithms for systems and networks beyond 5G  

 

• Security and privacy t solutions in reconfigurable intelligent surfaces for 6G enabled UAV networks.

 

• Blockchain-based security protocols for 6G enabled systems and networks

 

• Novel frameworks and algorithms based on computational intelligence to enhance the scalability and security for 6G enabled systems and networks

 

• Machine learning algorithms for intelligent sensing in 6G enabled systems and networks

 

• Advanced intelligent big data analytics in 6G enabled networks

 

• Reinforcement-Learning based intelligent applications in 6G enabled systems and networks

 

• CI-based resilience models for advanced security and privacy threats in cyberspace.

 

• Applications of innovative CI techniques for systems and networks beyond 5G;