2nd Future Network Security: Challenges and Opportunities Workshop
Free & Virtual | 7-8 September 2022
This workshop will explore evolving Future networks (5G/6G) use cases, as well as associated research challenges. The objective of this workshop is to bring together global expertise and create a joint platform for knowledge exchanges, presentation of results, and fruitful discussions to identify gaps and future directions for the IEEE FNI Security Working Group and efforts.
Call for Speaker Proposals
If you do not have an EDAS account, create one here.
Deadline: 21 August 2022
Each proposal (maximum 2 pages) must include:
- Title and Abstract
- Specific track (see descriptions below): Standards/Architecture, Industry Applications, Research Challenges
- A short biography (no more than 200 words) of each speaker
- An explanation of the motivation, background, objective, description of the challenges to be covered, relevance, and timeliness
The proposal will be reviewed based on its relevance, the topic’s importance to the workshop, and the diversity it offers in terms of the problem, proposed solution, and evaluation approach.
Standards & Architecture
5G technologies provide ubiquitous connectivity while also addressing the demands of both individual consumers and businesses. In order to support various 5G use-cases and applications, there is a critical need to design a secure and trusted end-to-end network. 5G networks need to be flexible, adaptive, scalable and able to dynamically react to the changes in the network quite rapidly. Various standards bodies including 3GPP, IEEE, and ETSI have been looking into security issues for 5G networks. To that end, the IEEE Security Working Group is calling presenters to provide and share insights around progress and gaps in 5G security standards and architectures as relevant to 5G deployments and use-cases. It is the intent of the FNI Security WG to develop a roadmap that will evolve into a set of standards to address the technology gaps in 5G and future networks security.
To that end, this area will investigate current work that includes:
- Work on frameworks and standards that incorporate security and privacy principles, e.g. ITU-D, IEEE, 3GPP, GSMA, NIST, ETSI, Open RAN, ISO and others as they apply to the different security capabilities.
- Security architectures and approaches as applicable to different deployment plans and application verticals for 5G networks and core services.
- Applicable or extended Security & Privacy frameworks and guidance that support relevant governance, threat modeling and risk management.
- The effect, challenges and options with regard to security of deploying open systems such as Open RAN, Open Core, etc.
- Security automation and orchestration that addresses the different components of the 5G architecture and 5G enabled market verticals.
- Different AI/ML implementation architectures, options and trade-offs in across the 5G network use-cases and relevant market verticals
In the Industry Applications track, we invite speakers to discuss the industrial deployments of security paradigms and their adoption by stakeholders in the value chain, such as operators, vendors, integrators, and the like. The objective of this track is to understand stakeholders' strategies and plans around 5G security and privacy specifically to support the evolution of 5G deployments and the different 5G market verticals. We encourage contributors to share their experiences and how that it may be beneficial to 5G and Future Networks security and privacy. Descriptions of current work on pre-market 5G testbeds, applications, etc. that have been developed through organizations such as ITU, ETSI, 3GPP 5G PPP, and others are also welcomed in this track.
Invited contributions include but are not limited to the following:
- 5G networks and use-cases updated threat modeling and threat landscape.
- Description of 5G testbeds and applications that have been developed or are currently under development.
- Existing and under-development advanced security and privacy technologies that are relevant and could benefit 5G and future networks.
- Practical approaches for scalable and effective security implementation and orchestration across different networks (urban, rural, disperse, etc).
- Interoperability security challenges and approaches considering evolution of deployments, interconnectivity with public/private cloud providers.
- Results and reports of recent studies and pilot projects considering 5G security approaches including: Zero-Trust Architectures, MEC enabled DDoS protection, Distributed IAM, etc.
In the research topic area, the workshop seeks to expand discussions into newer and future topics related to 5G future networks security and privacy. The goal of this track is to investigate innovative and advanced approaches to improve 5G and future networks security and privacy. For 5G and Future networks to enable continued innovation, trustworthiness needs to be considered in the different layers to enable effective security and risk management. We invite research visions and efforts to examine how these objectives can be accomplished.
Invited research areas of interest include, but are not limited to:
- Potential benefits of cross-layer and context-aware approaches to secure by-design 5G networks and systems.
- Optimization of trade-offs between sustainable security requirements and operational performance to enable the 5G use-cases (mMTC, URRLC) and market verticals.
- Benefits and risks of utilizing the emerging and open technologies such as adversarial ML, GAN, RNN, O-RAN as core components of 5G networks.
- Orchestration and optimization of virtualized and distributed security NFV (security-as-a-service) as applicable for 5G and beyond architectures, use-cases (mMTC, URLLC, eMMB) and market verticals.
- Advances in 5G networks security domains including: spectrum and physical layer security, device (hardware and software) security, RAN and Cloud RAN security, MEC Security, IAM, etc.
- Data protection, sharing and privacy-centric approaches in 5G networks and applications.
- Vertical-specific 5G security and privacy challenges and approaches. Verticals could include Critical Infrastructures, Intelligent Transportation and Autonomous Vehicles, Internet of Things, e-Health among others.
- Methods and use-cases for the use of AI/ML in 5G security and privacy.