Future Network Security: Challenges & Opportunities Workshop
Free & Virtual | 22-24 March 2021
This workshop will explore 5G security and privacy use cases, as well as associated research challenges. The objective of this workshop is to bring together experts from the globe and create a joint platform for information exchanges, presentation of results, and fruitful discussions to identify gaps and future directions for the IEEE FNI Security Working Group.
The event takes place from 9:00am to 12:30pm Eastern Time US (GMT -5) each day.
Monday 22 March: Watch Presentation Recording
Introduction from IEEE Security Working Group Co-Chairs Dr. Ashutosh Dutta (JHU/APL) and Dr. Eman Hammad (Texas A&M University - RELLIS, USA)
|09:20-09:50||Keynote: From 5G to 6G: Research, Engineering, and Applications for the Future of Connectivity - Charles Clancy (MITRE)|
|09:50-10:10||Security Considerations for Evolving RAN Architectures - Jason S Boswell and Scott Poretsky (Ericsson, USA)|
|10:10-10:30||Security aspects of an Open vRAN Network - Nagendra Bykampadi (Altiostar, India)|
|10:40-11:00||Security Aspects of 5G Radio Access Network Slicing with Adversarial Machine Learning - Yalin E Sagduyu (Intelligent Automation, Inc., USA)|
|11:00-11:20||SECaaS in 5G: Challenges and Solutions - Bin Hu (Avast Software Inc, USA)|
|11:20-11:40||Sub-THz and THz Communications - a Boon and/or Bane for Security and Privacy in NextGen Wireless and Beyond - Rohit Singh (UC Denver, USA)|
|11:40-12:00||5G Security Standards - Bilel Jamoussi (ITU)|
|12:00-12:30|| Birds of Feather Panel - Moderated by Michael Enright (Quantum Dimension, USA) and Fawzi Behmann (TelNet Management Consulting, USA)
Panelists: Roslyn Layton (Aalborg University), Ersi Chorti (ETIS UMR 8051 / ENSEA), Jason Boswell (Ericsson), Rohit Singh (University of Colorado-Denver),
Bin Hu (Avast Software Inc)
Tuesday 23 March: Watch Presentation Recording
|09:00-09:05||Introduction - Michael Enright (Quantum Dimension, USA)|
|09:05-09:35||Keynote: How Policymakers View 5G Security - Eric Burger (former CTO of FCC)|
|09:35-09:55||5G Security and the Road Ahead: Securing OT and Open vRAN - Anand Prasad (Wenovator LLC)|
|09:55-10:15||An AI-Based Approach to Prioritize Vulnerabilities: Case Study on a Medical Application - Georges El Hajal (Bordeaux University, France)|
|10:15-10:35||Hardware Cryptosystem Security for Next-Gen Networks - Kapil Sood (Intel)|
|10:50-11:10||Exploring Tactical Vertical 5G Considering 5G as Disruptive - George F Elmasry (Rockwell Collins, USA)|
|11:10-11:30||AI-Driven Planning and Operation for Robust and Reliable E2E Network Slicing - Diego F. Rueda (Universitat de Girona, Spain)|
|11:30-11:50||A Taxonomy of Policy Statements on 5G by Stakeholders - Donna Schaeffer (Marymount University, USA)|
|11:50-12:10||Towards Standardization for Multi-Domain GANA Knowledge Planes (KPs) for Closed-Loop Security Management - Ranganai Chaparadza (IPv6 Forum, Germany)|
|12:10-12:30||Evolution of privacy from 2G to 5G - Anand Palanigounder (Qualcomm)|
Wednesday 24 March: Watch Presentation Recording
|09:00-09:05||Introduction - Dr. Eman Hammad (Texas A&M University - RELLIS, USA)|
|09:05-09:35||Keynote: Privacy-Integrated Communication and Computation - Dr. Moti Yung (Google, USA)|
|09:35-09:55||Security Challenges of Supporting Vertical Industries in 5G - Marcus Wong (Futurewei Technologies & Subsidiary of Huawei Technologies, USA)|
|09:55-10:15||Evaluating Security Implications of Spectrum Allocation in Licensed and Unlicensed Use: 5G vs. Wi-Fi 6 - David Witkowski (Oku Solutions LLC, USA)|
|10:25-10:45||Zero Trust Architecture for 5G - Junaid Islam (Research Fellow Cloud Security Alliance)|
|10:45-11:05||Security Challenges Related to 5G Telco Deployments - David Lenrow (USA)|
|11:05-11:25||Improving the Cybersecurity framework to become Resilient, Adaptive, and Trustworthy for NextGen Spectrum Systems - Shaun Hutton (Baylor University, USA)|
Future Railway Communication Systems: the FRMCS and the ACS Two Contrasting Approaches - Alessandro Vizzarri (University of Rome Tor Vergata, Italy),
Panel - Moderated by Eman Hammad (Texas A&M University - RELLIS, USA) and Ahmad Cheema (Shared Services Canada)
Dr. Charles Clancy is Senior Vice President and Chief Futurist at The MITRE Corporation where he serves as General Manager for MITRE Labs. In this role he oversees the corporate strategy in applied science and advanced technology, MITRE’s innovation centers, and its solution platforms. Prior to joining MITRE, Dr. Clancy was the Bradley Professor of Electrical and Computer Engineering at Virginia Tech where he led several major university-level and state-wide initiatives and centers focused in cyber and national security. He started his career as a researcher at the National Security Agency. He is co-author to six books and over 250 academic papers, patents, and standards. His research interests focus on the intersection between digital communications, artificial intelligence, and information security.
Prof. Eric W. Burger is Research Professor of Computer Science at Georgetown University (2011-present). He recently returned to Georgetown full time after his detail to the U.S. Federal Communications Commission where he served as CTO (2017-2019) and a detail to the White House Office of Science and Technology Policy where he served as the Assistant Director (2019-2021). He was instrumental in the repurposing of the 3.45 – 3.55 GHz band from Federal to private use (see FCC Auction 110) and amongst other duties he was responsible for the Administration’s communications and cybersecurity priorities, R&D budget, and the R&D, test, and standards portions of the Administration’s Securing 5G and Beyond Implementation Plan. Prior to Georgetown, Dr. Burger was the CTO of several network equipment and enterprise software companies. Dr. Burger is a Senior Member of the National Academy of Inventors, Distinguished Member of the ACM, and Senior Member of the IEEE. He has a SBEE, MBA, and PhD in Computer Science from the Massachusetts Institute of Technology, Katholieke Universiteit Leuven, and Illinois Institute of Technology.
Dr. Moti Yung is a Security and Privacy Research Scientist with Google. He got his PhD from Columbia University in 1988. Previously, he was with IBM Research, Certco, RSA Laboratories, and Snap. He has also been an adjunct senior research faculty at Columbia, where he has co-advised and worked with PhD students. His contributions to research and development treat science and technology holistically: from the theoretical mathematical foundations, via conceptual mechanisms, to applied cryptography, and to participation in developing actual industrial products.
Yung is a fellow of the IEEE, the Association for Computing Machinery (ACM), the International Association for Cryptologic Research (IACR), and the European Association for Theoretical Computer Science (EATCS). In 2010 he gave the IACR Distinguished Lecture. He is the recipient of the 2014 ACM’s SIGSAC Outstanding Innovation award, and the 2014 ESORICS (European Symposium on Research in Computer Security). In 2018 he received the IEEE-CS W. Wallace McDowell Award. In 2020 he received the test-of-time award for a paper predicting ransomware co-authored in 1996 in IEEE’s Symp. on Security and Privacy; also in 2020 he received the IACR’s PKC conference test-of-time award for a paper he co-authored in 1998. In 2021 he received the IEEE-CS Computer Pioneer Award.
Dr. Ashutosh Dutta is currently senior scientist and 5G Chief Strategist at the Johns Hopkins University Applied Physics Laboratory (JHU/APL). Ashutosh also serves as the chair for Electrical and Computer Engineering Department of Engineering for Professional Program at Johns Hopkins University. His career, spanning more than 30 years, includes Director of Technology Security and Lead Member of Technical Staff at AT&T, CTO of Wireless for NIKSUN, Inc., Senior Scientist and Project Manager in Telcordia Research, Director of the Central Research Facility at Columbia University, adjunct faculty at NJIT, and Computer Engineer with TATA Motors. He has more than 100 publications and 31 issued patents. Ashutosh is co-author of the book, titled, “Mobility Protocols and Handover Optimization: Design, Evaluation and Application” published by IEEE and John & Wiley. He has been serving as the founding Co-Chair for the IEEE Future Networks Initiative and serves as co-chair for security working group within FNI. Ashutosh is a Member-At-Large within IEEE Communications Society and served as Distinguished Lecturer from 2017-2020 and as an ACM Distinguished Speaker (2020-2022). Ashutosh is a Distinguished Alumnus of NIT Rourkela and obtained his MS in Computer Science from NJIT; and Ph.D. in Electrical Engineering from Columbia University, New York under the supervision of Prof. Henning Schulzrinne. Ashutosh is a Fellow of IEEE and senior member of ACM.
Dr. Eman Hammad is an interdisciplinary researcher focusing on cybersecurity, trustworthy & resilient critical infrastructure systems. She obtained her PhD in Electrical & Computer Engineering from the University of Toronto. Eman combines practical experience and theoretical research to shape her vision for resilient-by-design solutions in the connected world. Eman's primary focus is on how a deeper understanding of interactions between critical physical systems, communication and enabling technologies can help design new classes of operational solutions that are more resilient to cyber/physical disruptions. Her research has been recognized with merit awards (best paper award, best poster award) and has been featured on the Smart Cybersecurity Network.
Dr. Michael A. Enright is the CEO and President of Quantum Dimension, Inc. and has 30 years of experience in security, Artificial Intelligence (AI) and Machine Learning (ML), embedded computing, image and video processing, RF communication and more. Dr. Enright has a Ph.D. in Electrical Engineering from the University of Southern California (USC) thru his work with the Signal and Image Processing Institute (SIPI) at USC, an M.S. in Electrical Engineering from the Illinois Institute of Technology, an M.S. in Mechanical Engineering from the University of Missouri-Columbia and a B.S. in Aeronautical and Astronautical Engineering from the University of Illinois at Champaign-Urbana and is a Senior Member of the IEEE.
Standards & Architecture
5G technologies provide ubiquitous connectivity while also addressing the demands of both individual consumers and businesses. In order to support various 5G use-cases and applications, there is a critical need to design a secure and trusted end-to-end network. 5G networks need to be flexible, adaptive, scalable and able to dynamically react to the changes in the network quite rapidly. Various standards bodies including 3GPP, IEEE, and ETSI have been looking into security issues for 5G networks. To that end, the IEEE Security Working Group is calling presenters to provide and share insights around progress and gaps in 5G security standards and architectures as relevant to 5G deployments and use-cases. It is the intent of the FNI Security WG to develop a roadmap that will evolve into a set of standards to address the technology gaps in 5G and future networks security.
To that end, this area will investigate current work that includes:
- Work on frameworks and standards that incorporate security and privacy principles, e.g. ITU-D, IEEE, 3GPP, GSMA, NIST, ETSI, Open RAN, ISO and others as they apply to the different security capabilities.
- Security architectures and approaches as applicable to different deployment plans and application verticals for 5G networks and core services.
- Applicable or extended Security & Privacy frameworks and guidance that support relevant governance, threat modeling and risk management.
- The effect, challenges and options with regard to security of deploying open systems such as Open RAN, Open Core, etc.
- Security automation and orchestration that addresses the different components of the 5G architecture and 5G enabled market verticals.
- Different AI/ML implementation architectures, options and trade-offs in across the 5G network use-cases and relevant market verticals
In the Industry Applications track, we invite speakers to discuss the industrial deployments of security paradigms and their adoption by stakeholders in the value chain, such as operators, vendors, integrators, and the like. The objective of this track is to understand stakeholders' strategies and plans around 5G security and privacy specifically to support the evolution of 5G deployments and the different 5G market verticals. We encourage contributors to share their experiences and how that it may be beneficial to 5G and Future Networks security and privacy. Descriptions of current work on pre-market 5G testbeds, applications, etc. that have been developed through organizations such as ITU, ETSI, 3GPP 5G PPP, and others are also welcomed in this track.
Invited contributions include but are not limited to the following:
- 5G networks and use-cases updated threat modeling and threat landscape.
- Description of 5G testbeds and applications that have been developed or are currently under development.
- Existing and under-development advanced security and privacy technologies that are relevant and could benefit 5G and future networks.
- Practical approaches for scalable and effective security implementation and orchestration across different networks (urban, rural, disperse, etc).
- Interoperability security challenges and approaches considering evolution of deployments, interconnectivity with public/private cloud providers.
- Results and reports of recent studies and pilot projects considering 5G security approaches including: Zero-Trust Architectures, MEC enabled DDoS protection, Distributed IAM, etc.
In the research topic area, the workshop seeks to expand discussions into newer and future topics related to 5G future networks security and privacy. The goal of this track is to investigate innovative and advanced approaches to improve 5G and future networks security and privacy. For 5G and Future networks to enable continued innovation, trustworthiness needs to be considered in the different layers to enable effective security and risk management. We invite research visions and efforts to examine how these objectives can be accomplished.
Invited research areas of interest include, but are not limited to:
- Potential benefits of cross-layer and context-aware approaches to secure by-design 5G networks and systems.
- Optimization of trade-offs between sustainable security requirements and operational performance to enable the 5G use-cases (mMTC, URRLC) and market verticals.
- Benefits and risks of utilizing the emerging and open technologies such as adversarial ML, GAN, RNN, O-RAN as core components of 5G networks.
- Orchestration and optimization of virtualized and distributed security NFV (security-as-a-service) as applicable for 5G and beyond architectures, use-cases (mMTC, URLLC, eMMB) and market verticals.
- Advances in 5G networks security domains including: spectrum and physical layer security, device (hardware and software) security, RAN and Cloud RAN security, MEC Security, IAM, etc.
- Data protection, sharing and privacy-centric approaches in 5G networks and applications.
- Vertical-specific 5G security and privacy challenges and approaches. Verticals could include Critical Infrastructures, Intelligent Transportation and Autonomous Vehicles, Internet of Things, e-Health among others.
- Methods and use-cases for the use of AI/ML in 5G security and privacy.