Cybersecurity and Mobility in 5G and beyond II

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: 15 May 2024 | Viewed by 3569

Special Issue Editor

Institute of Telecommunications, Warsaw University of Technology, 15/19 Nowowiejska Str., 00-665 Warsaw, Poland
Interests: network security; mobile networks; cryptography; discrete chaotic cryptography
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

A 5G network places high demands on the network’s operating conditions: performance, scalability, latencies, mobile access, a variety of services, etc. To fulfill its tasks, the network is based on three pillars: programmability, virtualization, and the application of edge servers in the cloud. This translates to the usage of three technologies: software-defined networking (SDN), network function virtualization (NFV), and multi-access edge computing (MEC). While guaranteeing network security and mobility, all these extreme requirements and the technological solutions proposed to meet them lead to a complicated network of dependencies and connections between hardware components and expected network functionalities.

This Special Issue is planned as a forum for the exchange of experience in the development of technology, good practices, and prospective visions for security and mobility in 5G networks, guaranteeing the equal and beneficial coexistence of all partners in the network: network providers, service providers, and end users.

Potential topics include, but are not limited to, the following:

  • 5G MEC networks: threats, vulnerabilities, attacks and countermeasures;
  • E2E security in 5G;
  • Cyber intelligence in 5G and beyond;
  • Hard and soft security in 5G;
  • Verticals and enterprise cybersecurity;
  • Slicing and multi-tenancy;
  • Isolation of slices in 5G RAN and CN;
  • Privacy protection in RAN and CN;
  • Secure and reliable interfacing in RAN and CN;
  • Security measures for virtualized networks;
  • Secure access technologies;
  • Access management in verticals;
  • Security-oriented management and orchestration in contemporary networks;
  • Modern industrial networks security;
  • Secure multi-tenancy in sliced networks;
  • Tenants privacy protection;
  • Regulation, compliance, and forensics for 5G MEC applications;
  • Developing security solutions;
  • New cryptographic algorithms for 5G MEC and cloud edge services;
  • Future network sovereignty.

Prof. Dr. Zbigniew Kotulski
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • 5G networks’ mobile edge computing security and privacy cyber intelligence 
  • modern cryptographic algorithms 
  • network slicing 
  • slices isolation 
  • E2E security 
  • 5G verticals

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

24 pages, 897 KiB  
Article
Implementation of a Lossless Moving Target Defense Mechanism
by Mariusz Żal, Marek Michalski and Piotr Zwierzykowski
Electronics 2024, 13(5), 918; https://doi.org/10.3390/electronics13050918 - 28 Feb 2024
Viewed by 446
Abstract
The contemporary world, dominated by information technologt (IT), necessitates sophisticated protection mechanisms against attacks that pose significant threats to individuals, companies, and governments alike. The unpredictability of human behavior, coupled with the scattered development of applications and devices, complicates supply chain maintenance, making [...] Read more.
The contemporary world, dominated by information technologt (IT), necessitates sophisticated protection mechanisms against attacks that pose significant threats to individuals, companies, and governments alike. The unpredictability of human behavior, coupled with the scattered development of applications and devices, complicates supply chain maintenance, making it impossible to develop a system entirely immune to cyberattacks. Effective execution of many attack types hinges on prior network reconnaissance. Thus, hindering effective reconnaissance serves as a countermeasure to attacks. This paper introduces a solution within the moving target defense (MTD) strategies, focusing on the mutation of Internet protocol (IP) addresses in both edge and core network switches. The idea of complicating reconnaissance by continually changing IP addresses has been suggested in numerous studies. Nonetheless, previously proposed solutions have adversely impacted the quality of service (QoS) levels. Implementing these mechanisms could interrupt Transmission Control Protocol (TCP) connections and result in data losses. The IP address mutation algorithms presented in this study were designed to be fully transparent to transport layer protocols, thereby preserving the QoS for users without degradation. In this study, we leveraged the benefits of software-defined networking (SDN) and the Programming-Protocol-Ondependent Packet Processors (P4) language, which specifies packet processing methodologies in the data plane. Employing both SDN and P4 enables a dynamic customization of network device functionalities to meet network users’ specific requirements, a feat unachievable with conventional computer networks. This approach not only enhances the adaptability of network configurations but also significantly increases the efficiency and effectiveness of network management and operation. Full article
(This article belongs to the Special Issue Cybersecurity and Mobility in 5G and beyond II)
Show Figures

Figure 1

28 pages, 1174 KiB  
Article
Rule-Based System with Machine Learning Support for Detecting Anomalies in 5G WLANs
by Krzysztof Uszko, Maciej Kasprzyk, Marek Natkaniec and Piotr Chołda
Electronics 2023, 12(11), 2355; https://doi.org/10.3390/electronics12112355 - 23 May 2023
Cited by 5 | Viewed by 1591
Abstract
The purpose of this paper is to design and implement a complete system for monitoring and detecting attacks and anomalies in 5G wireless local area networks. Regrettably, the development of most open source systems has been stopped, making them unable to detect emerging [...] Read more.
The purpose of this paper is to design and implement a complete system for monitoring and detecting attacks and anomalies in 5G wireless local area networks. Regrettably, the development of most open source systems has been stopped, making them unable to detect emerging forms of threats. The system provides a modular framework to create and add new detection rules as new attacks emerge. The system is based on packet analysis modules and rules and incorporates machine learning models to enhance its efficiency. The use of rule-based detection establishes a strong basis for the identification of recognized threats, whereas the additional implementation of machine learning models enables the detection of new and emerging attacks at an early stage. Therefore, the ultimate aim is to create a tool that constantly evolves by integrating novel attack detection techniques. The efficiency of the system is proven experimentally with accuracy levels up to 98.57% and precision as well as recall scores as high as 92%. Full article
(This article belongs to the Special Issue Cybersecurity and Mobility in 5G and beyond II)
Show Figures

Figure 1

19 pages, 2323 KiB  
Article
SURE: A Smart Failover Blockchain-Based Solution for the Recycling Reuse Process
by Krzysztof Sosnowski and Mariusz Sepczuk
Electronics 2023, 12(10), 2201; https://doi.org/10.3390/electronics12102201 - 12 May 2023
Viewed by 1047
Abstract
Currently, human activity has a substantial impact on the environment, and we are responsible for determining what it will look like in a few or a dozen decades. Numerous IT solutions are being developed to reduce the negative influence on the environment. In [...] Read more.
Currently, human activity has a substantial impact on the environment, and we are responsible for determining what it will look like in a few or a dozen decades. Numerous IT solutions are being developed to reduce the negative influence on the environment. In particular, the main problem is the amount of plastic found in circulation and its recycling. Unfortunately, only few solutions exist that, on the one hand, support the reuse of the raw material and, on the other hand, give tangible benefits to users. In this work, we present a blockchain-based system for monitoring the recycling process of plastic bottles. The solution was described by technical, social, and performance characteristics. It should be emphasized that the adopted features of the new blockchain, such as a simplified code or complete decentralization, distinguish the solution from those currently created. Moreover, performance and fraud detection tests were performed. The results present that the solution for a PoW difficulty level of 3 still achieves decent times when generating a block with transactions (from the point of view of the recycling process). In addition, fraud detection tests have proven the ability to detect forged transactions. The outcomes from performed experiments show that the proposed concept can be used as an efficient and fraud-resilient solution in the case of the plastic recycling process. Full article
(This article belongs to the Special Issue Cybersecurity and Mobility in 5G and beyond II)
Show Figures

Figure 1

Back to TopTop