Security and Communication Networks

Authentication and Privacy Preservation in New Application Scenarios for 5G


Publishing date
01 May 2021
Status
Closed
Submission deadline
25 Dec 2020

Lead Editor

1Xidian University, Xi'an, China

2Chinese Academy of Sciences, Beijing, China

3Nanyang Technological University, Singapore

4Xi'an University of Posts and Telecommunications, Xi’an, China

This issue is now closed for submissions.
More articles will be published in the near future.

Authentication and Privacy Preservation in New Application Scenarios for 5G

This issue is now closed for submissions.
More articles will be published in the near future.

Description

With the continuous development of mobile communication technology, the next generation network presents new features of diversified terminals, huge number of nodes, ultra-high-density deployment of nodes, and coexistence of multiple wireless network technologies. This network architecture takes the fifth-generation mobile communication (5G) technology as the main carrier, and integrates many new techniques including massive Internet of Things (IoT), Device to Device (D2D) communication, Vehicle to everything (V2X) communication, Software Defined Network (SDN), Network Function Virtualization (NFV), network slice, and so on, which provides users with high communication quality and diversified services.

Due to the introduction of new features and techniques, 5G supports different types of application scenarios, which makes network security extremely challenging. Firstly, malicious users may modify the network settings, consume network resources, and even deprive legitimate users of normal access. Secondly, malicious network nodes may forge legitimate nodes to provide false network services for users, accomplish illegal transactions, and even steal user assets. Finally, a huge amount of privacy information, like user’s identity, mobility pattern, and health status, are always involved in the data and signaling transmission phase. Revealing such information may sharply hurt the normal life of users, steal users' assets and even threaten their lives. Therefore, it is critical to provide a wide and rigorous secure protection architecture for 5G network.

In order to build a secure protection architecture for 5G network, this Special Issue will invite and collect authentication, privacy preservation, key management and data secure transmission technologies related to the 5G network. Original research and review articles are welcome.

Potential topics include but are not limited to the following:

  • New access authentication protocol with privacy preservation for 5G network
  • New handover authentication protocol with privacy preservation for 5G network
  • Lightweight cryptography for massive eMTC and NB-IoT devices
  • Fault-resistant batch authentication for massive eMTC and NB-IoT devices
  • Privacy-preserving and fine-grained data sharing in 5G network
  • Secure device discovery and mutual authentication for D2D communication
  • Authentication and privacy protection for edge computing
  • Slicing security and privacy protection
  • Physical layer security
  • AI and Machine Learning for 5G security

Articles

  • Special Issue
  • - Volume 2021
  • - Article ID 6644326
  • - Research Article

A Secure Distance-Bounding Protocol with Mutual Authentication

Weiwei Liu | Hua Guo | Yangguang Tian
  • Special Issue
  • - Volume 2021
  • - Article ID 6697155
  • - Research Article

A Composable Multifactor Identity Authentication and Authorization Scheme for 5G Services

Yurong Luo | Hui Li | ... | Zhenyang Guo
  • Special Issue
  • - Volume 2021
  • - Article ID 8855341
  • - Research Article

CP-ABE-Based Secure and Verifiable Data Deletion in Cloud

Jun Ma | Minshen Wang | ... | Yongjin Hu
  • Special Issue
  • - Volume 2021
  • - Article ID 6684456
  • - Research Article

A Sensitive File Abnormal Access Detection Method Based on Application Classification

Hui Liu | Hanxing Xue | Hui Lu
  • Special Issue
  • - Volume 2021
  • - Article ID 6672911
  • - Research Article

Nowhere to Hide: A Novel Private Protocol Identification Algorithm

Jiantao Shi | Xiangzhan Yu | Zechao Liu
  • Special Issue
  • - Volume 2021
  • - Article ID 6694058
  • - Research Article

Fast and Universal Inter-Slice Handover Authentication with Privacy Protection in 5G Network

Zhe Ren | Xinghua Li | ... | Jianfeng Ma
  • Special Issue
  • - Volume 2021
  • - Article ID 6688489
  • - Research Article

A Lightweight SDN Fingerprint Attack Defense Mechanism Based on Probabilistic Scrambling and Controller Dynamic Scheduling Strategies

Tao Wang | Hongchang Chen
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
Acceptance rate31%
Submission to final decision85 days
Acceptance to publication42 days
CiteScore4.200
Impact Factor1.791
 Submit

Article of the Year Award: Outstanding research contributions of 2020, as selected by our Chief Editors. Read the winning articles.