posted by user: dsoldani || 1371 views || tracked by 3 users: [display]

JICT STD 2023 : Special Issue on Cloud Native Security for 5G, 5G-A and 6G

FacebookTwitterLinkedInGoogle

Link: https://www.riverpublishers.com/journal/special_issue.php?si=82
 
When N/A
Where N/A
Submission Deadline Nov 15, 2022
Notification Due Feb 20, 2023
Final Version Due Mar 31, 2023
Categories    cloud native security   5G   5GA   6G
 

Call For Papers

Journal of ICT Standardization

Special Issue on Cloud Native Security for 5G, 5G-A and 6G

With 5G already being deployed globally, 5G-Advanced standards being progressed and 6G research initiatives underway, the investments provide a fascinating prospect for our future. Such technology advances will enable the shift from the Internet of Things to the Internet of Intelligence. Specifically, 6G Wireless aims at bridging the “physical” and “cyber” worlds, enabling the paradigm shift from connected people and things to connected intelligence. 6G Wireless is expected to be built on an open & unified cloud native security and networking platform – such as Kubernetes (K8s) and its evolution – which will host containerized 6G workloads secure by design.
Disaggregated architectures and emerging technologies such as containerization, container orchestration and artificial intelligence (AI) are part of the 6G fundamentals. This will in turn bring inevitable and significant changes to the threat landscape by introducing new security challenges. These security concerns, among other issues, need to be seriously assessed, and the potential risks (threats*vulnerabilities) to disruption and hostile interference must be mitigated through concrete security measures. Also, the mixture of new possible risks and reduced residual risk tolerance – especially with 5G, 5G-Advanced and 6G expected to be deployed on critical infrastructures – demands for the adoption and implementation of a defense in-depth strategy augmented by a zero-trust model to make the network resilient to any potential internal or external attack vector. All these together further strengthens the importance of a secure and resilient cloud native platform and having in place adequate countermeasures for the protection of information and communication systems, in relation to national and individual security.
This special issue aims at presenting the most relevant scenarios, use-cases, target security architectures, best practices, prominent new revolutionary safeguards, and state-of-the-art advances of security measures for cloud native platforms, augmented by trustworthy AI for detecting the undetectable and predicting unknown threats and secure the intangible.


Technical papers describing previously unpublished, original, state-of-the-art research, and not currently under review by a conference or a journal, will be considered. Specifically, the special issue welcomes two categories of papers: 1) invited articles from qualified experts, and 2) contributed papers from the open call with a list of addressed topics.


Suggested Topics
We solicit articles on a variety of topics related to cloud native security (CNS) for 5G, 5G-Advanced and for future 6G services. Topics of interest include, but not be limited to, the following:

CI/CD pipeline security (DevSecOps).
Secure secrets data, cluster data and identity store.
Secure communication between services – within a cluster and between clusters.
Secure access to K8s cluster using role-based access control and K8s network policies.
Attestation for cloud services.
Unified Zero-Trust Identity, Authentication, Authorization and Admission control (IAAA) for any “subject” requesting access to any “object”.
Continuous security posture assessments of subjects connected to objects.
Observability and security tooling, e.g., based on eBPF/XDP
Blockchain and Distributed Ledger Technology (DTL) for CNS.
Post Quantum Cryptography (PQC) for CNS.
Management approaches for multi-stakeholder cloud native networks.
Hardware Accelerators for CNS.
Hardware-based roots-of-trust and trusted execution environments for CNS.
Privacy Preserving Technologies in Cloud-native.
Submission Procedure

Submitted papers should not be under consideration elsewhere for publication and manuscripts should conform to the standard format as indicated in the Information for Authors section of the Paper Submission Guidelines.
Please do not hesitate to contact the Guest Editors if you would like to know whether other related topics fit this special issue
More information can be found on the journal website: https://journals.riverpublishers.com/index.php/JICTS/



Important Dates:

Paper Submission: November 15, 2022
First Revisions/Reject Notification: Dec 30, 2022
Revision submission deadline: January 31, 2023
Final notification of Acceptance/Reject: Feb 20, 2023
Final Manuscript Due: March 31, 2023


Submission Guideline

Papers should be submitted via: https://journals.riverpublishers.com/index.php/JICTS/submissions

Author kit is available at https://www.riverpublishers.com/authors.php


Guest Editors:

David Soldani*, Rakuten Mobile, Australia
Email: dr.david.soldani(@)gmail.com

Rahim Tafazollli, University of Surrey, UK
Email: r.tafazolli(@)surrey.ac.uk

Silke Holtmanns, PwC, Finland
Email: silke.holtmanns(@)pwc.com

Devaki Chandramouli, Nokia Bell Labs, USA
Email: devaki.chandramouli(@)nokia.com

*corresponding editor

Related Resources

BDE 2025   2025 7th International Conference on Big Data Engineering (BDE 2025)
IEEE ICC'25 NextG-WiSec 2025   The 11th IEEE Workshop on NextG (6G and beyond) Wireless Security in conjunction with IEEE ICC 2025
ICICSE 2025   IEEE--2025 the 5th International Conference on Information Communication and Software Engineering (ICICSE 2025)
ICDPA 2025   2025 The 11th International Conference on Data Processing and Applications (ICDPA 2025)
ICTC 2024   The 15th International Conference on ICT Convergence
IEEE WiMob - CWN 2024   Eleventh International Workshop on Cooperative Wireless Networks (IEEE WiMob – CWN’24)
MobiSec 2024   The 8th International Conference on Mobile Internet Security
IOTBS 2025   5th International Conference on IOT, Big Data and Security
IOTBS 2025   5th International Conference on IOT, Big Data and Security
eHPWAS 2024   WiMob - eHPWAS’24 - e-Health Pervasive Wireless Applications and Services - Rank B