Special lssues
Table of Content

Computational Intelligence Techniques for Securing Systems and Networks beyond 5G

Submission Deadline: 30 June 2022 (closed)

Guest Editors

Prof. Muhammad Asghar Khan, Hamdard University, Pakistan
Prof. Yu-Chen Hu, Providence University, Taiwan
Prof. Justyna Żywiołek, Czestochowa University of Technology, Poland

Summary

The Fifth-Generation (5G) mobile network has made it possible to envision cellular networks beyond 5G (B5G) and Sixth-Generation (6G), capable of incorporating autonomous services to systems and networks such as the Internet of Things (IoT), Industrial IoT (IIoT), Internet of Drones (IoD), Internet of Medical Things (IoMT), and others.  They provide capacity expansion strategies to resolve the issue of massive connectivity and provide ultra-high throughput, even in extreme or emergency situations where there may be varying system densities, bandwidth as well as traffic patterns. However, deploying connected devices on such a large scale will exacerbate security and privacy concerns, as well as communication and computational costs associated with managing the massive data generated by their integrated sensors. To this aim, the systems connected to cyberspace on a large scale face the most unprecedented constraints of lower computational cost, faster speed, and enhanced security attributes. Furthermore, with the rise in known and unknown cyber-attacks and privacy vulnerabilities in Internet-connected systems and networks, cybersecurity and privacy has become a difficult discipline to acquire. As a result, advanced Computational Intelligence (CI) approaches are extremely useful.

Computational intelligence is a powerful tool for solving complex security problems when traditional modelling or mathematics are inadequate. These approaches are known for their great accuracy and low computational cost, which is the prime objective of modelling any security scheme. Artificial Neural Networks (ANNs), expert systems, evolutionary computation, fuzzy systems, and learning systems are examples of CI-based methods that can help with network security and privacy.

Therefore, the focus of this Special Issue is on using computational intelligence to construct security and privacy schemes. The issue will offer new guidance to relevant scholars and broaden the scope of computational intelligence study. Both original research and review articles are encouraged to submit.

 

The topics of interest for this special issue include, but are not limited to:

 

• CI-based security and privacy-preserving schemes for systems and networks beyond 5G   

 

• Evolutionary computing and swarm intelligence-based trust control in systems and networks beyond 5G  

 

• Advanced deep learning cyberspace intrusion detection algorithms for systems and networks beyond 5G  

 

• Security and privacy t solutions in reconfigurable intelligent surfaces for 6G enabled UAV networks.

 

• Blockchain-based security protocols for 6G enabled systems and networks

 

• Novel frameworks and algorithms based on computational intelligence to enhance the scalability and security for 6G enabled systems and networks

 

• Machine learning algorithms for intelligent sensing in 6G enabled systems and networks

 

• Advanced intelligent big data analytics in 6G enabled networks

 

• Reinforcement-Learning based intelligent applications in 6G enabled systems and networks

 

• CI-based resilience models for advanced security and privacy threats in cyberspace.

 

• Applications of innovative CI techniques for systems and networks beyond 5G;



Published Papers


  • Open Access

    ARTICLE

    A Color Image Encryption Scheme Based on Singular Values and Chaos

    Adnan Malik, Muhammad Ali, Faisal S. Alsubaei, Nisar Ahmed, Harish Kumar
    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 965-999, 2023, DOI:10.32604/cmes.2023.022493
    (This article belongs to this Special Issue: Computational Intelligence Techniques for Securing Systems and Networks beyond 5G)
    Abstract The security of digital images transmitted via the Internet or other public media is of the utmost importance. Image encryption is a method of keeping an image secure while it travels across a non-secure communication medium where it could be intercepted by unauthorized entities. This study provides an approach to color image encryption that could find practical use in various contexts. The proposed method, which combines four chaotic systems, employs singular value decomposition and a chaotic sequence, making it both secure and compression-friendly. The unified average change intensity, the number of pixels’ change rate, information entropy analysis, correlation coefficient analysis,… More >

  • Open Access

    ARTICLE

    PSAP-WSN: A Provably Secure Authentication Protocol for 5G-Based Wireless Sensor Networks

    Xuanang Li, Shuangshuang Liu, Saru Kumari, Chien-Ming Chen
    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.1, pp. 711-732, 2023, DOI:10.32604/cmes.2022.022667
    (This article belongs to this Special Issue: Computational Intelligence Techniques for Securing Systems and Networks beyond 5G)
    Abstract Nowadays, the widespread application of 5G has promoted rapid development in different areas, particularly in the Internet of Things (IoT), where 5G provides the advantages of higher data transfer rate, lower latency, and widespread connections. Wireless sensor networks (WSNs), which comprise various sensors, are crucial components of IoT. The main functions of WSN include providing users with real-time monitoring information, deploying regional information collection, and synchronizing with the Internet. Security in WSNs is becoming increasingly essential because of the across-the-board nature of wireless technology in many fields. Recently, Yu et al. proposed a user authentication protocol for WSN. However, their design is vulnerable… More >

Share Link