Dear Colleagues,

We apologize in advance if you receive multiple copies of this CFP. We will
greatly appreciate your help if you forward this CFP to your colleague and
email lists.

*Call for Paper*

*Special Issues on “Security architecture and technologies for 5G”*

*IET Networks*



5G security challenges come from many aspects. Firstly, secure network
architectures are required as the basis for 5G to support a huge number of
connected devices. Secondly, 5G will migrate or bring in many promising
network technologies, such as Software Defined Networking (SDN), Network
Functions Virtualization (NFV), Information Centric Network (ICN), Device
to Device (D2D), Network Slicing, Cloud Computing/Fog Computing and so on.
These technologies should also provide security guarantee for 5G
architecture. Thirdly, more and more user data and network traffic will be
carried in the 5G network. Big Data Security should be considered to
protect these data, including the data privacy, data sources, data
analytics and so on. Fourthly, 5G will promote many interesting
applications, which also require secure supports, such as Vehicular
Network, Internet of Energy (IoE) and VR/AR.

We call for survey and research papers in the 5G security scope. We aim to
provide a platform for researchers to further explore the security issues,
technologies, architecture for 5G networks.

Topics of interest include, but are not limited to:



•Innovative security architecture for 5G networks

•5G core network security

•Secure network slicing for 5G

•Access control security for 5G networks

•Security protocols for 5G networks

•DDoS protection in 5G

•SDN security in 5G networks

•Orchestration of NFV/SDN security in 5G networks

•ICN security

•Device to Device (D2D) security

•Terminal and edge computing security

•Malware attack detection and prevention techniques

•Information sharing and data protection in 5G networks

•Security management in heterogeneous 5G networks

•Big data security in 5G networks

•Securing big data environments

•Big data sources protecting

•Big data analytics safeguarding

•Cloud technologies security

•Security for new service delivery models

•Mechanisms to enforce privacy and trust

•Trust models for 5G services

•Security for 5G applications, *i.e.,* vehicular network, Internet of
Energy and VR/AR



*Submission Deadline*: *June 30, 2017*

*Publication Data:** May, 2018*



All papers must be submitted through the Journal’s Manuscript Central

Guest Editors:

Lead Guest Editor: Hongke Zhang, Beijing Jiaotong University, China

                              Email: [log in to unmask]

Co-Guest Editor: Chi-Yuan Chen, National Ilan University, Taiwan

                              Email: [log in to unmask]

Co-Guest Editor: Shui Yu, Deakin University, Australia

                              Email: [log in to unmask]

Co-Guest Editor: Wei Quan, Beijing Jiaotong University, China

                              Email: [log in to unmask]

    For news of CHI books, courses & software, join CHI-RESOURCES
     mailto: [log in to unmask]

    To unsubscribe from CHI-ANNOUNCEMENTS send an email to
     mailto:[log in to unmask]

    For further details of CHI lists see