Special Issue on:

Privacy and Security in 5G and beyond the Internet of Things

    

Security and privacy have become the central concern in most telecommunication sectors in this digital era, as risks can lead to significant consequences. Different cloud-computing technologies became crucial with the development of various technologies, such as 5G networks and beyond the Internet of Things. Cloud computing enables intensive information processing and warehousing solutions. This makes it fit with the features of IoT networks. However, leveraging such technology develops particular new security and privacy challenges, which could be a significant obstacle against performing some primary tasks. Two diverse new cloud technologies that inherit some of the conventional cloud-computing paradigms are edge computing and fog computing. It is intended to unravel some of the complications of cloud computing and leverage the computing potentialities within the community network to execute computation processes instead of performing them in the clouds.

Since cloud-computing technology has been adopted within varying degrees of different industries, it faces other cybersecurity challenges throughout the primary processes. Several challenges, such as misconfigurations, unauthorized access, insecure interfaces, external sharing of data, data loss/leakage, data confidentiality, legal and regulatory compliance, among many others, have been affecting business infrastructures critically. Further, from an auditing context, multiple-point to multiple-point checks will require monitoring a substantial volume of changes altogether with the significant amount of change to these structures. Automated scaling and dynamic updating of the elements will increase more security issues. This volatile situation will set a considerable risk of data losses and expose service providers to a much more significant threat to revenue security. Hence, with the advances of edge and fog computing, organizations must achieve near real-time compliance-driven security monitoring, threat and attack prevention, detection and mitigation solutions. Therefore, the integration of technologies has undeniably widened the attack surface of these systems, jeopardizing the reliability, practicability and accessibility of the complete system architecture. In addition, these technological devices are more vulnerable to several attacks than others, including device theft, information eavesdropping, device manipulation, among many others, causing severe impacts in fog-edge computing systems. Hence, developing advanced strategies, such as user-access control and surveillance to improve physical security at the edge computing, controlling fog and edge operation and customization from key IT functions and monitoring the overall edge activity, specifically activity concerning operation, can prevent privacy and security issues.

In this context, this special issue intends to explore privacy and security in 5G and beyond the Internet of Things: data sharing, threats, liability, audit and compliance concerns for cloud-supported 5G, fog and edge computing. We invite researchers, practitioners and scholars from various technology disciplines to present novel and innovative solutions for this special issue.

Suggested topics include, but are not limited to, the following:

  • Edge and fog computing for 5G networks: data threats and liability risks;
  • Blockchain-based 5G networks for privacy and security;
  • Privacy and security preservation for 5G-enabled Internet of Things;
  • Security management for cloud-based Internet of Things in the future era;
  • IoT-blockchain and AI for cybersecurity in emerging business applications;
  • Edge-computing approach for reliable, cognitive and trustworthy connected systems;
  • AI-supported privacy-protecting reliable computation and communication in 5G-enabled IoT;
  • Cybersecurity and privacy for the transformative technologies beyond 5G;
  • Intelligence and privacy of the IoT for 5G and beyond 5G networks;
  • 5G networks and edge computing: challenges, risks and opportunities;
  • Mitigating cybersecurity challenges with 5G and edge computing in the future digital era;
  • IoT security concerns in 5G networks: current trends & future advances;
  • 5G technology for secure health Internet of Things;
  • Realizing the potential of 5G-enabled IoT: emerging trends & advances;

Important dates:

Papers’ Submission Deadline

July 15, 2023

First Decision Notification (Revise/Reject)

September 1, 2023

Revised Papers’ Submission Deadline

October 1, 2023

Final Decision Notification

November 1, 2023

Special Issue Publication

December 1, 2023

Special Issue Guest Editors

  • Jian Su, Nanjing University of Information Science and Technology.
  • Ahmad Hiasat, Princess Sumaya University for Technology.

 

 

 

 

 

 

 

 

 

Special Issue Guest Editors:

  • Prof. Jian Su, Nanjing University of Information Science and Technology, Nanjing, ChinaEmail: 002811@nuist.edu.cn
  • Prof. Ahmad Hiasat, Princess Sumaya University for Technology, Amman, Jordan. Email: a.hiasat@psut.edu.jo

Paper Submission

All other information is available on JJCIT website: jjcit.org