Special Issues
Table of Content

Security and Privacy Issues in Systems and Networks Beyond 5G

Submission Deadline: 31 December 2021 (closed) View: 306

Guest Editors

Prof. Ilsun You, Soonchunhyang University, South Korea.
Prof. Antonio F. Skarmeta, University of Murcia, Spain.
Prof. Isaac Woungang, Ryerson University, Canada.
Prof. Yuanlong Cao, Jiangxi Normal University, China.

Summary

5G's capabilities and flexibility hold the promise of further facilitating the society's digitalization by enabling new services (e.g., remote surgery, advanced industrial applications) and communication modes (e.g., gestures, facial expressions and haptics). Current wireless communication systems do not meet the performance requirements of these new services, such as bandwidth, latency and reliability. Furthermore, the current COVID-19 crisis has fundamentally changed the way the world communicates and operates, accelerating the shift towards a more digital world. Such transformation and the new requirements make the need of secure, reliable and high-quality digital services promised by 5G more crucial than ever. Moreover, these fundamental drivers are expected to amplify and become even more prominent in future 6G networks.

 

For Systems and Networks Beyond 5G (SysNetB5G), there are two main technologies: Beyond 5G mobile communications and Industrial Internet of Things (IIoT) Obviously, IIoT and SysNetB5G, if not well protected, are vulnerable to critical security and privacy problems. Compared to traditional networks, IIoT and SysNetB5G have a much broader scope of security concerns. Moreover, in IIoT and SysNetB5G, various kinds of massive data are quickly generated by many heterogeneous nodes, which makes it so difficult to preserve privacy. In order to counter such problems, research has increased tremendously in recent years. Nevertheless, many security and privacy issues remain open to IIoT and SysNetB5G.

 

This special issue aims to bring together the current state of-the-art research and future directions for security and privacy issues in IIoT and SysNetB5G. Especially, it focuses on discussing innovative concepts for security management of IIoT and SysNetB5G from a holistic high-level architecture perspective to reach a fully-automated and secured B5G infrastructure. For this goal, we cordially invite researchers and engineers from both academia and industry to submit their original and novel work for inclusion in this Special Issue. Additionally, high-quality review and survey papers are also welcome.

 

The topics of interests include, but are not limited to:

- Emerging privacy and security issues in IIoT and SysNetB5G

- Secure and privacy-perserving communications in IIoT and SysNetB5G

- Developing secure communication systems or environments

- Secure and private mobility solutions for IIoT and SysNetB5G

- Future authentication and key exchange protocols in IIoT and SysNetB5G

- Formal security analysis on security protocols for IIoT and SysNetB5G

- Physical security solutions in IIoT and SysNetB5G

- Trustworthiness mechanism in IIoT and SysNetB5G

- Balancing security, privacy and trust and QoS in IIoT and SysNetB5G

- Zero-touch network and Service Management (ZSM) for secure IIoT and SysNetB5G

- Intrusion and malware detection for secure IIoT and SysNetB5G

- Software-Defined Security (D-SEC) models

- AI/ML driven security network management

- Cyber-attacks detection for IIoT and SysNetB5G


Keywords

Security, privacy, 5G and Beyond (5GB), Industrial IoT (IIoT)

Published Papers


  • Open Access

    ARTICLE

    Towards Fully Secure 5G Ultra-Low Latency Communications: A Cost-Security Functions Analysis

    Borja Bordel, Ramón Alcarria, Joaquin Chung, Rajkumar Kettimuthu, Tomás Robles, Iván Armuelles
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 855-880, 2023, DOI:10.32604/cmc.2023.026787
    (This article belongs to the Special Issue: Security and Privacy Issues in Systems and Networks Beyond 5G)
    Abstract Future components to enhance the basic, native security of 5G networks are either complex mechanisms whose impact in the requiring 5G communications are not considered, or lightweight solutions adapted to ultra-reliable low-latency communications (URLLC) but whose security properties remain under discussion. Although different 5G network slices may have different requirements, in general, both visions seem to fall short at provisioning secure URLLC in the future. In this work we address this challenge, by introducing cost-security functions as a method to evaluate the performance and adequacy of most developed and employed non-native enhanced security mechanisms in… More >

  • Open Access

    ARTICLE

    Aging Analysis Framework of Windows-Based Systems through Differential-Analysis of System Snapshots

    Eun-Tae Jang, Sung Hoon Baek, Ki-Woong Park
    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5091-5102, 2022, DOI:10.32604/cmc.2022.026663
    (This article belongs to the Special Issue: Security and Privacy Issues in Systems and Networks Beyond 5G)
    Abstract When a Windows-based system is used for an exceedingly long time, its performance degrades, and the error occurrence rate tends to increase. This is generally called system aging. To investigate the reasons for system aging, various studies have been conducted within the range of the operating system kernel to the user application. However, finding an accurate reason for system performance degradation remains challenging research topic. In this study, system monitoring was conducted by dividing a system into ‘before software installation,’ ‘after software installation,’ and ‘after software removal.’ We confirmed that when a software installed in… More >

  • Open Access

    ARTICLE

    Mode of Operation for Modification, Insertion, and Deletion of Encrypted Data

    Taek-Young Youn, Nam-Su Jho
    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 151-164, 2022, DOI:10.32604/cmc.2022.026653
    (This article belongs to the Special Issue: Security and Privacy Issues in Systems and Networks Beyond 5G)
    Abstract

    Due to the development of 5G communication, many aspects of information technology (IT) services are changing. With the development of communication technologies such as 5G, it has become possible to provide IT services that were difficult to provide in the past. One of the services made possible through this change is cloud-based collaboration. In order to support secure collaboration over cloud, encryption technology to securely manage dynamic data is essential. However, since the existing encryption technology is not suitable for encryption of dynamic data, a new technology that can provide encryption for dynamic data is required

    More >

  • Open Access

    ARTICLE

    Two-Stage High-Efficiency Encryption Key Update Scheme for LoRaWAN Based IoT Environment

    Kun-Lin Tsai, Li-Woei Chen, Fang-Yie Leu, Chuan-Tian Wu
    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 547-562, 2022, DOI:10.32604/cmc.2022.026557
    (This article belongs to the Special Issue: Security and Privacy Issues in Systems and Networks Beyond 5G)
    Abstract Secure data communication is an essential requirement for an Internet of Things (IoT) system. Especially in Industrial Internet of Things (IIoT) and Internet of Medical Things (IoMT) systems, when important data are hacked, it may induce property loss or life hazard. Even though many IoT-related communication protocols are equipped with secure policies, they still have some security weaknesses in their IoT systems. LoRaWAN is one of the low power wide-area network protocols, and it adopts Advanced Encryption Standard (AES) to provide message integrity and confidentiality. However, LoRaWAN's encryption key update scheme can be further improved.… More >

  • Open Access

    ARTICLE

    Detecting IoT Botnet in 5G Core Network Using Machine Learning

    Ye-Eun Kim, Min-Gyu Kim, Hwankuk Kim
    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4467-4488, 2022, DOI:10.32604/cmc.2022.026581
    (This article belongs to the Special Issue: Security and Privacy Issues in Systems and Networks Beyond 5G)
    Abstract As Internet of Things (IoT) devices with security issues are connected to 5G mobile networks, the importance of IoT Botnet detection research in mobile network environments is increasing. However, the existing research focused on AI-based IoT Botnet detection research in wired network environments. In addition, the existing research related to IoT Botnet detection in ML-based mobile network environments have been conducted up to 4G. Therefore, this paper conducts a study on ML-based IoT Botnet traffic detection in the 5G core network. The binary and multiclass classification was performed to compare simple normal/malicious detection and normal/three-type More >

  • Open Access

    ARTICLE

    Impact Analysis of Resilience Against Malicious Code Attacks via Emails

    Chulwon Lee, Kyungho Lee
    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4803-4816, 2022, DOI:10.32604/cmc.2022.025310
    (This article belongs to the Special Issue: Security and Privacy Issues in Systems and Networks Beyond 5G)
    Abstract The damage caused by malicious software is increasing owing to the COVID-19 pandemic, such as ransomware attacks on information technology and operational technology systems based on corporate networks and social infrastructures and spear-phishing attacks on business or research institutes. Recently, several studies have been conducted to prevent further phishing emails in the workplace because malware attacks employ emails as the primary means of penetration. However, according to the latest research, there appears to be a limitation in blocking email spoofing through advanced blocking systems such as spam email filtering solutions and advanced persistent threat systems.… More >

  • Open Access

    ARTICLE

    Improving Method of Anomaly Detection Performance for Industrial IoT Environment

    Junwon Kim, Jiho Shin, Ki-Woong Park, Jung Taek Seo
    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5377-5394, 2022, DOI:10.32604/cmc.2022.026619
    (This article belongs to the Special Issue: Security and Privacy Issues in Systems and Networks Beyond 5G)
    Abstract Industrial Control System (ICS), which is based on Industrial IoT (IIoT), has an intelligent mobile environment that supports various mobility, but there is a limit to relying only on the physical security of the ICS environment. Due to various threat factors that can disrupt the workflow of the IIoT, machine learning-based anomaly detection technologies are being presented; it is also essential to study for increasing detection performance to minimize model errors for promoting stable ICS operation. In this paper, we established the requirements for improving the anomaly detection performance in the IIoT-based ICS environment by… More >

  • Open Access

    ARTICLE

    Deobfuscating Mobile Malware for Identifying Concealed Behaviors

    Dongho Lee, Geochang Jeon, Sunjun Lee, Haehyun Cho
    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5909-5923, 2022, DOI:10.32604/cmc.2022.026395
    (This article belongs to the Special Issue: Security and Privacy Issues in Systems and Networks Beyond 5G)
    Abstract The smart phone market is continuously increasing and there are more than 6 billion of smart phone users worldwide with the aid of the 5G technology. Among them Android occupies 87% of the market share. Naturally, the widespread Android smartphones has drawn the attention of the attackers who implement and spread malware. Consequently, currently the number of malware targeting Android mobile phones is ever increasing. Therefore, it is a critical task to find and detect malicious behaviors of malware in a timely manner. However, unfortunately, attackers use a variety of obfuscation techniques for malware to… More >

  • Open Access

    ARTICLE

    Multi-Stream CNN-Based Personal Recognition Method Using Surface Electromyogram for 5G Security

    Jin Su Kim, Min-Gu Kim, Jae Myung Kim, Sung Bum Pan
    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2997-3007, 2022, DOI:10.32604/cmc.2022.026572
    (This article belongs to the Special Issue: Security and Privacy Issues in Systems and Networks Beyond 5G)
    Abstract As fifth generation technology standard (5G) technology develops, the possibility of being exposed to the risk of cyber-attacks that exploits vulnerabilities in the 5G environment is increasing. The existing personal recognition method used for granting permission is a password-based method, which causes security problems. Therefore, personal recognition studies using bio-signals are being conducted as a method to access control to devices. Among bio-signal, surface electromyogram (sEMG) can solve the existing personal recognition problem that was unable to the modification of registered information owing to the characteristic changes in its signal according to the performed operation.… More >

  • Open Access

    ARTICLE

    Ransomware Classification Framework Using the Behavioral Performance Visualization of Execution Objects

    Jun-Seob Kim, Ki-Woong Park
    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3401-3424, 2022, DOI:10.32604/cmc.2022.026621
    (This article belongs to the Special Issue: Security and Privacy Issues in Systems and Networks Beyond 5G)
    Abstract A ransomware attack that interrupted the operation of Colonial Pipeline (a large U.S. oil pipeline company), showed that security threats by malware have become serious enough to affect industries and social infrastructure rather than individuals alone. The agents and characteristics of attacks should be identified, and appropriate strategies should be established accordingly in order to respond to such attacks. For this purpose, the first task that must be performed is malware classification. Malware creators are well aware of this and apply various concealment and avoidance techniques, making it difficult to classify malware. This study focuses… More >

  • Open Access

    ARTICLE

    User Recognition System Based on Spectrogram Image Conversion Using EMG Signals

    Jae Myung Kim, Gyu Ho Choi, Min-Gu Kim, Sung Bum Pan
    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1213-1227, 2022, DOI:10.32604/cmc.2022.025213
    (This article belongs to the Special Issue: Security and Privacy Issues in Systems and Networks Beyond 5G)
    Abstract Recently, user recognition methods to authenticate personal identity has attracted significant attention especially with increased availability of various internet of things (IoT) services through fifth-generation technology (5G) based mobile devices. The EMG signals generated inside the body with unique individual characteristics are being studied as a part of next-generation user recognition methods. However, there is a limitation when applying EMG signals to user recognition systems as the same operation needs to be repeated while maintaining a constant strength of muscle over time. Hence, it is necessary to conduct research on multidimensional feature transformation that includes… More >

  • Open Access

    ARTICLE

    DAVS: Dockerfile Analysis for Container Image Vulnerability Scanning

    Thien-Phuc Doan, Souhwan Jung
    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1699-1711, 2022, DOI:10.32604/cmc.2022.025096
    (This article belongs to the Special Issue: Security and Privacy Issues in Systems and Networks Beyond 5G)
    Abstract Container technology plays an essential role in many Information and Communications Technology (ICT) systems. However, containers face a diversity of threats caused by vulnerable packages within container images. Previous vulnerability scanning solutions for container images are inadequate. These solutions entirely depend on the information extracted from package managers. As a result, packages installed directly from the source code compilation, or packages downloaded from the repository, etc., are ignored. We introduce DAVS–A Dockerfile analysis-based vulnerability scanning framework for OCI-based container images to deal with the limitations of existing solutions. DAVS performs static analysis using file extraction based More >

  • Open Access

    ARTICLE

    From Network Functions to NetApps: The 5GASP Methodology

    Jorge Gallego-Madrid, Ramon Sanchez-Iborra, Antonio Skarmeta
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 4115-4134, 2022, DOI:10.32604/cmc.2022.021754
    (This article belongs to the Special Issue: Security and Privacy Issues in Systems and Networks Beyond 5G)
    Abstract As the 5G ecosystem continues its consolidation, the testing and validation of the innovations achieved by integrators and verticals service providers is of preponderant importance. In this line, 5GASP is a European H2020-funded project that aims at easing the idea-to-market process through the creation of an European testbed that is fully automated and self-service, in order to foster rapid development and testing of new and innovative 5G Network Applications (NetApps). The main objective of this paper is to present the 5GASP's unified methodology to design, develop and onboard NetApps within the scope of different vertical More >

Share Link