The 3rd International Workshop on 5G Security and Machine Learning
(IW5GS-2017)
Helsinki, Finland, 21-23 August, 2017
This is the third 5G Security Workshop. The first 5G Security Workshop focused on trust in 5G, in 2016 the focus was on security and media in 5G, this year focus will be machine learning and security in 5G. The goal of this workshop is to bring experts on machine learning and mobile network security together to bring forward research that can be utilized, applied and extended for practical machine learning for IoT devices and 5G network.
There is a fast on-going change in the technical architectures and topologies of the Internet: 5G and upgraded 4G/LTE networks will be based on or migrated to Software Defined Networking (SDN) and Network Functions Virtualization (NFV) based nodes in the cloud. Many aspects of network and user management are automated, data is stored and managed in many places. Many connected devices will be IoT devices / machines that are non-supervised and rely on automated security management that is based on their retrieved data. Systems learn typical behavior and differentiate it from abnormal behavior. For this large amounts of data is retrieved from nodes, processed and used e.g. for filtering, indexing, clustering and classification. This introduces new and novel security and privacy challenges. Aspects such as security of orchestration, management functionality as well as surveillance, content handling and privacy are brought to the fore. At the same time they introduce new ways of dealing with trust, attack prevention, management and recovery.
Scope and Topics of Interest
We solicit papers and demonstrations in the following areas related to 5G/LTE security:
- Core Network Security
- Cellular security
- Security Management and Orchestration of NFV and SDN elements
- Trusted Computing with NFV and SDN
- Malware and (targeted) attack detection and prevention techniques
- Machine learning methods with potential application to security
- Non-supervised learning methods and data reduction approaches (incl clustering, metrics, models, semantics, indexing)
- Internet of Things security and privacy (incl. D2D and V2X)
- Content/Semantic processing, inc. anonymisation of (meta*-) data
- Honeypot and Firewall Technologies
- Malware protection
- Protocol security: Diameter, SS7, BGP, etc
- Formal Specification and Analysis of Protocols and Attacks, eg: model checking etc.
Important Dates
Submission Deadline extended to: 15 May, 2017
Paper submission deadline: 15 April, 2017
Internal Reviews to be completed: 1 June, 2017
Author notification: 3 June, 2017
Camera-ready and Registration: 18 June, 2017
Conference dates: 21-23 August, 2017
Submission Instructions
Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 10 pages (extra pages will be charged), including tables, figures, references and appendixes, in Springer LNCS Format with Portable Document Format (.pdf). Please submit your paper via: https://easychair.org/conferences/?conf=nssiw5gs2017
Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. The workshop paper will be involved into the NSS2017 proceedings published by Springer Lecture Notes in Computer Science (LNCS, EI indexed). Excellent Papers will be recommended to high-quality journal special issues (SCI/SCIE indexed).
Program Co-Chairs
- Dr. Ian Oliver, Nokia Bell Labs, Finland
- Dr. Silke Holtmanns, Nokia Bell Labs, Finland
- Dr. Yoan Miche, Nokia Bell Labs, Finland
PC Members (In alphabetical order)
Please email enquiries to Ian Oliver (ian.oliver@nokia.com) and Silke Holtmanns (silke.holtmanns@nokia.com) and Yoan Miche (Yoan.Miche@nokia.com)
- Dr. Rolf Blom (Security Researcher), SICS Security Lab, Sweden
- Dr. Aidan Delaney, University of Brighton, UK
- Prof. Thanh van Do, Telenor, Norway
- Dr. Philip Ginzboorg (Senior Researcher), Huawei, Finland
- Prof. Barbara Hammer, University of Bielefeld, Germany
- Associate Prof. Andreas Holzinger, Institute for Medical Informatics/Statistics, Medical University Graz. Visiting Prof. for Machine Learning in Health Informatics at TU Vienna
- Prof. John Howse, University of Brighton, UK
- Prof. Theo Kanter, Stockholm University, Sweden
- Alexey Kirichenko, F-Secure, Finland
- Dr. Kari Kostiainen (Senior Researcher), ETH Zürich, Switzerland
- Prof Ulrike Meyer (Security Expert), RWTH University of Aachen, Germany
- Prof. Chris Mitchell, Royal Holloway, University of London, UK
- Dr. Anand Prasad (3GPP Security Chair), NEC, Japan
- Prof. Fabrice Rossi, Université Paris 1 Panthéon-Sorbonne, France
- Bengt Sahlin, Security Research, Ericsson, Finland
- Prof. Ralf Tönjes, University of Applied Science, Osnabrueck, Germany
- Prof. Thomas Villmann, Mittweida University of Applied Science, Germany
- Prof. Alf Zugenmaier, Munich University of Applied Science, Germany