Special Issue "Security and Privacy Issues in Systems and Networks Beyond 5G"

Submission Deadline: 31 December 2021 (closed)
Guest Editors
Prof. Ilsun You, Soonchunhyang University, South Korea.
Prof. Antonio F. Skarmeta, University of Murcia, Spain.
Prof. Isaac Woungang, Ryerson University, Canada.
Prof. Yuanlong Cao, Jiangxi Normal University, China.


5G's capabilities and flexibility hold the promise of further facilitating the society's digitalization by enabling new services (e.g., remote surgery, advanced industrial applications) and communication modes (e.g., gestures, facial expressions and haptics). Current wireless communication systems do not meet the performance requirements of these new services, such as bandwidth, latency and reliability. Furthermore, the current COVID-19 crisis has fundamentally changed the way the world communicates and operates, accelerating the shift towards a more digital world. Such transformation and the new requirements make the need of secure, reliable and high-quality digital services promised by 5G more crucial than ever. Moreover, these fundamental drivers are expected to amplify and become even more prominent in future 6G networks.


For Systems and Networks Beyond 5G (SysNetB5G), there are two main technologies: Beyond 5G mobile communications and Industrial Internet of Things (IIoT) Obviously, IIoT and SysNetB5G, if not well protected, are vulnerable to critical security and privacy problems. Compared to traditional networks, IIoT and SysNetB5G have a much broader scope of security concerns. Moreover, in IIoT and SysNetB5G, various kinds of massive data are quickly generated by many heterogeneous nodes, which makes it so difficult to preserve privacy. In order to counter such problems, research has increased tremendously in recent years. Nevertheless, many security and privacy issues remain open to IIoT and SysNetB5G.


This special issue aims to bring together the current state of-the-art research and future directions for security and privacy issues in IIoT and SysNetB5G. Especially, it focuses on discussing innovative concepts for security management of IIoT and SysNetB5G from a holistic high-level architecture perspective to reach a fully-automated and secured B5G infrastructure. For this goal, we cordially invite researchers and engineers from both academia and industry to submit their original and novel work for inclusion in this Special Issue. Additionally, high-quality review and survey papers are also welcome.


The topics of interests include, but are not limited to:

- Emerging privacy and security issues in IIoT and SysNetB5G

- Secure and privacy-perserving communications in IIoT and SysNetB5G

- Developing secure communication systems or environments

- Secure and private mobility solutions for IIoT and SysNetB5G

- Future authentication and key exchange protocols in IIoT and SysNetB5G

- Formal security analysis on security protocols for IIoT and SysNetB5G

- Physical security solutions in IIoT and SysNetB5G

- Trustworthiness mechanism in IIoT and SysNetB5G

- Balancing security, privacy and trust and QoS in IIoT and SysNetB5G

- Zero-touch network and Service Management (ZSM) for secure IIoT and SysNetB5G

- Intrusion and malware detection for secure IIoT and SysNetB5G

- Software-Defined Security (D-SEC) models

- AI/ML driven security network management

- Cyber-attacks detection for IIoT and SysNetB5G

Security, privacy, 5G and Beyond (5GB), Industrial IoT (IIoT)

Published Papers
  • User Recognition System Based on Spectrogram Image Conversion Using EMG Signals
  • Abstract Recently, user recognition methods to authenticate personal identity has attracted significant attention especially with increased availability of various internet of things (IoT) services through fifth-generation technology (5G) based mobile devices. The EMG signals generated inside the body with unique individual characteristics are being studied as a part of next-generation user recognition methods. However, there is a limitation when applying EMG signals to user recognition systems as the same operation needs to be repeated while maintaining a constant strength of muscle over time. Hence, it is necessary to conduct research on multidimensional feature transformation that includes changes in frequency features over… More
  •   Views:444       Downloads:348        Download PDF

  • DAVS: Dockerfile Analysis for Container Image Vulnerability Scanning
  • Abstract Container technology plays an essential role in many Information and Communications Technology (ICT) systems. However, containers face a diversity of threats caused by vulnerable packages within container images. Previous vulnerability scanning solutions for container images are inadequate. These solutions entirely depend on the information extracted from package managers. As a result, packages installed directly from the source code compilation, or packages downloaded from the repository, etc., are ignored. We introduce DAVS–A Dockerfile analysis-based vulnerability scanning framework for OCI-based container images to deal with the limitations of existing solutions. DAVS performs static analysis using file extraction based on Dockerfile information to… More
  •   Views:481       Downloads:396        Download PDF

  • From Network Functions to NetApps: The 5GASP Methodology
  • Abstract As the 5G ecosystem continues its consolidation, the testing and validation of the innovations achieved by integrators and verticals service providers is of preponderant importance. In this line, 5GASP is a European H2020-funded project that aims at easing the idea-to-market process through the creation of an European testbed that is fully automated and self-service, in order to foster rapid development and testing of new and innovative 5G Network Applications (NetApps). The main objective of this paper is to present the 5GASP's unified methodology to design, develop and onboard NetApps within the scope of different vertical services, letting them use specific… More
  •   Views:653       Downloads:524        Download PDF