2nd Future Network Security: Challenges and Opportunities Workshop

2022 Security Workshop Banner Oct

Free & Virtual | 26-27 October 2022

   Register Today   

This workshop will explore evolving Future networks (5G/6G) use cases, as well as associated research challenges. The objective of this workshop is to bring together global expertise and create a joint platform for knowledge exchanges, presentation of results, and fruitful discussions to identify gaps and future directions for the IEEE FNI Security Working Group and efforts.

Call for Speaker Proposals 

   Submit Proposal   

 If you do not have an EDAS account, create one here.
Deadline: 15 September 2022
Each proposal (maximum 2 pages) must include:

  • Title and Abstract
  • Specific track (see descriptions below): Standards/Architecture, Industry Applications, Research Challenges
  • A short biography (no more than 200 words) of each speaker
  • An explanation of the motivation, background, objective, description of the challenges to be covered, relevance, and timeliness

The proposal will be reviewed based on its relevance, the topic’s importance to the workshop, and the diversity it offers in terms of the problem, proposed solution, and evaluation approach.


Sponsorship and Exhibit Opportunities

button SponsorshipBrochure

Track Descriptions
Standards & Architecture
5G technologies provide ubiquitous connectivity while also addressing the demands of both individual consumers and businesses. In order to support various 5G use-cases and applications, there is a critical need to design a secure and trusted end-to-end network. 5G networks need to be flexible, adaptive, scalable and able to dynamically react to the changes in the network quite rapidly. Various standards bodies including 3GPP, IEEE, and ETSI have been looking into security issues for 5G networks. To that end, the IEEE Security Working Group is calling presenters to provide and share insights around progress and gaps in 5G security standards and architectures as relevant to 5G deployments and use-cases. It is the intent of the FNI Security WG to develop a roadmap that will evolve into a set of standards to address the technology gaps in 5G and future networks security.

To that end, this area will investigate current work that includes:

  • Work on frameworks and standards that incorporate security and privacy principles, e.g. ITU-D, IEEE, 3GPP, GSMA, NIST, ETSI, Open RAN, ISO and others as they apply to the different security capabilities.
  • Security architectures and approaches as applicable to different deployment plans and application verticals for 5G networks and core services.
  • Applicable or extended Security & Privacy frameworks and guidance that support relevant governance, threat modeling and risk management.
  • The effect, challenges and options with regard to security of deploying open systems such as Open RAN, Open Core, etc.
  • Security automation and orchestration that addresses the different components of the 5G architecture and 5G enabled market verticals.
  • Different AI/ML implementation architectures, options and trade-offs in across the 5G network use-cases and relevant market verticals


Industry Applications
In the Industry Applications track, we invite speakers to discuss the industrial deployments of security paradigms and their adoption by stakeholders in the value chain, such as operators, vendors, integrators, and the like. The objective of this track is to understand stakeholders' strategies and plans around 5G security and privacy specifically to support the evolution of 5G deployments and the different 5G market verticals. We encourage contributors to share their experiences and how that it may be beneficial to 5G and Future Networks security and privacy. Descriptions of current work on pre-market 5G testbeds, applications, etc. that have been developed through organizations such as ITU, ETSI, 3GPP 5G PPP, and others are also welcomed in this track.

Invited contributions include but are not limited to the following:

  • 5G networks and use-cases updated threat modeling and threat landscape.
  • Description of 5G testbeds and applications that have been developed or are currently under development.
  • Existing and under-development advanced security and privacy technologies that are relevant and could benefit 5G and future networks.
  • Practical approaches for scalable and effective security implementation and orchestration across different networks (urban, rural, disperse, etc).
  • Interoperability security challenges and approaches considering evolution of deployments, interconnectivity with public/private cloud providers.
  • Results and reports of recent studies and pilot projects considering 5G security approaches including: Zero-Trust Architectures, MEC enabled DDoS protection, Distributed IAM, etc.


Research Challenges
In the research topic area, the workshop seeks to expand discussions into newer and future topics related to 5G future networks security and privacy. The goal of this track is to investigate innovative and advanced approaches to improve 5G and future networks security and privacy. For 5G and Future networks to enable continued innovation, trustworthiness needs to be considered in the different layers to enable effective security and risk management. We invite research visions and efforts to examine how these objectives can be accomplished.
Invited research areas of interest include, but are not limited to:

  • Potential benefits of cross-layer and context-aware approaches to secure by-design 5G networks and systems.
  • Optimization of trade-offs between sustainable security requirements and operational performance to enable the 5G use-cases (mMTC, URRLC) and market verticals.
  • Benefits and risks of utilizing the emerging and open technologies such as adversarial ML, GAN, RNN, O-RAN as core components of 5G networks.
  • Orchestration and optimization of virtualized and distributed security NFV (security-as-a-service) as applicable for 5G and beyond architectures, use-cases (mMTC, URLLC, eMMB) and market verticals.
  • Advances in 5G networks security domains including: spectrum and physical layer security, device (hardware and software) security, RAN and Cloud RAN security, MEC Security, IAM, etc.
  • Data protection, sharing and privacy-centric approaches in 5G networks and applications.
  • Vertical-specific 5G security and privacy challenges and approaches. Verticals could include Critical Infrastructures, Intelligent Transportation and Autonomous Vehicles, Internet of Things, e-Health among others.
  • Methods and use-cases for the use of AI/ML in 5G security and privacy.


Workshop Co-Chairs

Ashutosh Dutta ProfileDr. Ashutosh Dutta is currently senior scientist and 5G Chief Strategist at the Johns Hopkins University Applied Physics Laboratory (JHU/APL). Ashutosh also serves as the chair for Electrical and Computer Engineering Department of Engineering for Professional Program at Johns Hopkins University. His career, spanning more than 30 years, includes Director of Technology Security and Lead Member of Technical Staff at AT&T, CTO of Wireless for NIKSUN, Inc., Senior Scientist and Project Manager in Telcordia Research, Director of the Central Research Facility at Columbia University, adjunct faculty at NJIT, and Computer Engineer with TATA Motors. He has more than 100 publications and 31 issued patents. Ashutosh is co-author of the book, titled, “Mobility Protocols and Handover Optimization: Design, Evaluation and Application” published by IEEE and John & Wiley. He has been serving as the founding Co-Chair for the IEEE Future Networks Initiative and serves as co-chair for security working group within FNI. Ashutosh is a Member-At-Large within IEEE Communications Society and served as Distinguished Lecturer from 2017-2020 and as an ACM Distinguished Speaker (2020-2022). Ashutosh is a Distinguished Alumnus of NIT Rourkela and obtained his MS in Computer Science from NJIT; and Ph.D. in Electrical Engineering from Columbia University, New York under the supervision of Prof. Henning Schulzrinne. Ashutosh is a Fellow of IEEE and senior member of ACM.

Eman Hammad Profile2Dr. Eman Hammad is an interdisciplinary researcher focusing on cybersecurity, trustworthy & resilient critical infrastructure systems. She obtained her PhD in Electrical & Computer Engineering from the University of Toronto. Eman combines practical experience and theoretical research to shape her vision for resilient-by-design solutions in the connected world. Eman's primary focus is on how a deeper understanding of interactions between critical physical systems, communication and enabling technologies can help design new classes of operational solutions that are more resilient to cyber/physical disruptions. Her research has been recognized with merit awards (best paper award, best poster award) and has been featured on the Smart Cybersecurity Network.


Michael Enright ProfileDr. Michael A. Enright is the CEO and President of Quantum Dimension, Inc. and has 30 years of experience in security, Artificial Intelligence (AI) and Machine Learning (ML), embedded computing, image and video processing, RF communication and more. Dr. Enright has a Ph.D. in Electrical Engineering from the University of Southern California (USC) thru his work with the Signal and Image Processing Institute (SIPI) at USC, an M.S. in Electrical Engineering from the Illinois Institute of Technology, an M.S. in Mechanical Engineering from the University of Missouri-Columbia and a B.S. in Aeronautical and Astronautical Engineering from the University of Illinois at Champaign-Urbana and is a Senior Member of the IEEE.


Mithun Mukherjee ProfileDr. Mithun Mukherjee received the Ph.D. degree in electrical engineering from the Indian Institute of Technology Patna, Patna, India, in 2015. He is currently a Professor at the School of Artificial Intelligence, Nanjing University of Information Science and Technology, Nanjing, China. He has (co)authored more than 100 publications in peer-reviewed journals and conferences. Dr. Mukherjee was a recipient of the 2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS) Best Paper Award. He also served/will serve as the Publicity Co-Chair of IEEE 5G World 2018-2022. His current research interests center around edge intelligence.


Miguel Gaitn profileMiguel Gutiérrez Gaitán (https://researchers.unab.cl/en/persons/miguel-gaitan) is an Assistant Professor at the Faculty of Engineering of the Andrés Bello University (UNAB) in Santiago, Chile. He holds an MS in Telecommunications Engineering from the Polytechnic University of Turin (Polito), Italy, and a BS in Electronics Engineering from the Pontifical Catholic University of Valparaíso (PUCV), Chile.
Currently, he is a PhD candidate in Electrical and Computer Engineering at the Faculty of Engineering of the University of Porto (FEUP), Portugal, working under the supervision of Prof. Luís Almeida. Here, he is also a research fellow at CISTER – Research Centre in Real-Time and Embedded Computing Systems – (http://www.cister.isep.ipp.pt/), where he collaborates on international research projects, mainly in the areas of wireless communication, real-time networks, and the Internet of Things.

Shashank GaurShashank Gaur is Conferences Tools Committee Chair for IEEE Conferences Committee since 2021. Over the past decade Shashank has been involved with the organization of multiple conferences such as ICC, GLOBECOM, RTSS, CPSWEEK, WFCS, etc. Shashank has been an IEEE volunteer for 15+ years across various OUs such as MGA, Region 8, TAB and ComSoc. Professionally, Shashank Gaur is a Systems and Safety Engineer at TTTech Auto, providing safe software and hardware platforms for automated driving. Shashank contributes to topics such as Time Sensitive Networking and Scheduling for in-vehicle communication. Shashank also actively engages in TSN standards activities on behalf of TTTech Auto.