[ogsa-wg] IEEE WCM [Deadline Extended: 15/8] - SI: Zero Trust Security Methods for Wireless Networks

Moayad Aloqaily mzaloqaily at gmail.com
Wed Aug 2 03:52:42 PDT 2023


IEEE WCM
Zero Trust Security Methods for Wireless Networks
https://www.comsoc.org/publications/magazines/ieee-wireless-communications/cfp/zero-trust-security-methods-wireless

New Deadline: 15 August

Wireless networks have evolved significantly over time, enabling a wide
range of advanced services and applications in various areas, including
communications, healthcare, industry, and transportation. These
applications have a tremendous impact on our daily lives, making us overly
dependent on wireless technologies, hence, emphasizing the need for
security. Wireless networks are vulnerable to a wide range of security
threats and attacks that can compromise the confidentiality, integrity, and
availability of data. The complexity of these threats increases
exponentially as the current wireless network infrastructure evolves, such
that security attacks target network resources, and confidential data, and
exploit user privacy. For this reason, new security models are highly
needed to overcome these threats and provide a secure environment for
wireless applications.

Zero trust is a contemporary security model that provides a new
cybersecurity strategy to eliminate implicit trust. It assumes that all
users, devices, applications, and their network traffic, internal and
external, are untrusted and should be continuously verified and validated
at every stage of a digital interaction before granting admission to
network resources. Zero trust can be applied to various applications of
wireless networks as it is able to protect against unauthorized access.
This alliance can be seen in diverse methods, including network
segmentation, multi-factor authentication, device security, and autonomous
continuous monitoring. Implementing zero trust methods for wireless
networks can be challenging due to the lack of experience in this area, its
integration with existing system complexity, and its enduring maintenance.
These challenges increase with the complexity of the used technology as new
advanced attacks can be designed allowing for the exploitation of wireless
network resources.

The purpose of this Special Issue (SI) is to elaborate on and emphasize the
key aspects of zero-trust methods for wireless networks, understanding the
principles of Zero Trust Security and how they can be applied to wireless
networks, and implementation of Zero Trust Security in wireless networks -
best practices and challenges. It welcomes original research and innovative
solutions on the above subjects as well as case studies that explore the
potential exploitation of zero trust security and its applications in
wireless technology. Research may cover and focus on either the fundamental
methodological studies or the use-case and application demonstrations.

Topics of interest include, but are certainly not limited to:

   - Zero trust techniques, architectures, and models.
   - Network segmentation and micro-segmentation.
   - Zero-trust networks and modeling.
   - Decentralized zero trust models.
   - AI-based zero trust models.
   - Advanced authentication mechanisms using zero trust.
   - Identity and access management using zero trust.
   - Zero trust-enabled continuous monitoring and detection.
   - Advanced risk assessment and management using zero trust.
   - Machine learning and zero trust security in wireless networks.
   - Zero trust in mobile and satellite networks; and in the metaverse.
   - Zero trust in cloud/edge computing.
   - Cyberattacks in zero-trust environments.
   - Implementation of zero-trust security in wireless networks.
   - Scalability of zero trust.
   - Evaluation of zero trust deployment models for wireless networks.
   - Zero trust in various areas for wireless network applications.
   - Integration of zero trust with other security measures.
   - Industry efforts on zero trust techniques.
   - Understanding the standards of Zero Trust Security and wireless
   networks.
   - Network and energy overheads of zero trust techniques.
   - Challenges of zero trust implementation in MMTC environments.

Submission Guidelines

Prospective authors should prepare their submissions in accordance with the
rules specified in the "Information for Authors" of the *IEEE Wireless
Communications* guidelines
<https://www.comsoc.org/publications/magazines/ieee-wireless-communications/paper-submission>
.

Authors should submit a PDF version of their complete manuscript to Manuscript
Central <https://mc.manuscriptcentral.com/ieee-wcm>. The timetable is as
follows:

*Submit your paper at:* https://mc.manuscriptcentral.com/ieee-wcm
Important Dates

Manuscript Submission Deadline: 1 August 2023,  *15 August 2023*
Initial Decision Date: 1 October 2023

Revised Manu
script Due: 1 November 2023
Final Decision Date: 1 December 2023
Final Manuscript Due: 1 February 2024
Publication Date: April 2024
Guest Editors

Moayad Aloqaily <moayad.aloqaily at mbzuaia.c.ae>
MBZUAI, UAE

Helen Paik <h.paik at unsw.edu.au>
University of New South Wales Sydney, Australia

Willian Tessaro Lunardi <WillianTessaro.Lunardi at tii.ae>
Technology Innovation Institute, TII, UAE

Cihan Tunc <Cihan.Tunc at unt.edu>
University of North Texas, USA

He Fang <fanghe at suda.edu.cn>
Soochow University, China
*Best Regards*
*Moayad Aloqaily, Ph.D., SMIEEE, P.Eng.*
*http://icnetlab.org/MA/ <http://icnetlab.org/MA/>*
*http://artifitialleap.ai/ <http://artifitialleap.ai/>*
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 14019 bytes
Desc: not available
URL: <https://lists.ogf.org/pipermail/ogsa-wg/attachments/20230802/94fa8c78/attachment.txt>


More information about the ogsa-wg mailing list