May 20, 2019 - May 24, 2019
Conference Description (submitted by organizer)
Traditional communication networks were designed without considering security in mind and most of the security solutions developed are like patches to protect the network from loopholes or backdoors. Future wireless systems will require a paradigm shift in how they are networked, organized, configured, optimized, and recovered automatically based on their operating situations. The emerging Internet of Things (IoT) and Cyber-Physical Systems (CPS) applications aim to bring people, data, processes, and things together to fulfill the needs of our everyday lives. With the emergence of software defined networks, adaptive services and applications are gaining much attention since they allow automatic configuration of devices and their parameters, systems, and services to user’s context change. It is expected that the upcoming Fifth Generation (5G) wireless network, which is also known as more than the extended version of 4G/3G, will be the backbone of IoT and CPS, and it will support CPS/IoT systems by expanding the coverage, reducing the latency and enhancing the data rate. However, there are several challenges to be addressed to provide resilient connections to support massive number of wireless devices including resource-constrained IoT devices. Due to several unique features of emerging applications such as low latency, low cost, low energy consumption, resilient and reliable connections, high failure rate and data transiency, the traditional communication protocols and techniques are not suitable for security among others. In this regard, it is crucial to have security by design in 5G wireless network by considering the constraints imposed by heterogeneous IoT systems to have resilient communication in emerging wireless networks. Our aim is to promote the development of 5G security by design. The proposed ICC workshop 5G-Security will serve as a forum for researchers from academia, government and industries to exchange ideas, present new results and provide future visions on these topics. It is worth noting that the major funding agencies including NSF are investing research funding in these areas. In addition, other closely related workshops and conferences focus on purely security and privacy or cybersecurity in general but do not consider security by design in emerging 5G networks with unique features such as low latency, low cost, low energy consumption, resilient and reliable connections, high failure rate and data transiency. Thus, this workshop is unique, timely and covers emerging topics for future networks.