IEEE Future Networks World Forum
13–15 November 2023 // Baltimore, MD, USA
Imagining the Network of the Future

S12 Symposium on Security in Future Networks


Symposium Paper Submission: 21 July 2023 8 September 2023 02 October 2023 (FINAL)
Symposium Paper Acceptance Notification: 1 September 2023 Rolling
Camera-Ready Submission: 10 October 2023



5G and Future Networks technologies provide ubiquitous connectivity while also addressing the demands of both individual consumers and businesses. In order to support various use-cases and applications, there is a critical need to design a secure and trusted end-to-end network. 5G and Future Networks need to be flexible, adaptive, scalable and able to dynamically react to the changes in the network quite rapidly The long term vision is to “turn the network into an energy-efficient distributed computer system that enables agile and dynamic creation, move and suppression of processes and services in response to changing customer demands and information flows, and that supports interaction with humans through new communication modes, such as gestures, facial expressions, sound, and haptics. To make this vision a reality, a shift towards a full automation of network and service management and operation is a necessity. However, a major challenge facing full automation is the protection of the network and system assets (i.e., services, data and network infrastructure) against potential cybersecurity risks introduced by the unprecedented evolving 5G threat landscape. Indeed, the risk of full automation is the ability to replicate a small isolated error or attack broadly and rapidly, putting the entire critical ecosystem (multi-party/tenant/technologies) into peril.

Although 5G and beyond-5G offer a multitude of benefits to the emerging applications, they are susceptible to the malicious or inadvertent introductions of vulnerabilities, such as malicious software or hardware, counterfeit components, and poor designs. Even worse, these new technologies are facing a series of inherent security and privacy threats, which intensify the vulnerabilities of the 5G networks. In addition, vastly increased numbers of devices and an elevated use of virtualization result in more 5G security threats and a broader, multifaceted attack surface. To realize strong and healthy communication networks, exploring the approaches to address the security and privacy threats are vital for both industry and academia. To address the aforementioned challenges in beyond 5G or 6G telecommunication infrastructure and services, the inherent support of full automation operations in network and service management is a necessity. One of the most critical areas of application for zero touch automation is the protection of the network and system assets against potential cybersecurity risks introduced by the unprecedented evolution of the 5G and Future Networks threat landscape. 

The goal of this symposium is to investigate innovative and advanced approaches to improve 5G and Future Networks security and privacy. For 5G and Future networks to enable continued innovation, trustworthiness needs to be considered in the different layers to enable effective security and risk management.


We invite submissions on a wide range of research topics, spanning both theoretical and systems research, including results from industry and academic/industrial collaborations, related but not restricted to the following topics:

  • 5G and Beyond architecture with security and privacy considerations
  • Advances in 5G networks security domains 
  • Security for new service delivery models
  • AI and Machine Learning for 5G and Beyond security
  • Verticals and business (non-technical) 5G and Beyond security requirements and solutions
  • Big data analytics tools and techniques in 5G and Beyond Security
  • Advances in lightweight cryptography and IoT security
  • Wireless virtualization and slicing security
  • Authentication, authorization, and accounting (AAA) for 5G and Beyond security
  • Diameter security in 5G and Beyond
  • Tera-Hertz communication and security for 5G and Beyond
  • Millimeter wave and security for 5G and Beyond
  • Quantum Safe Cryptography for 5G and Beyond
  • Secure Integration of IoT and Cloud Computing
  • Secure Device-to-Device communications in 5G and Beyond
  • Secure integration of IoT and other networks
  • Intrusion Detection/Prevention Techniques and System Integrity
  • Secure data storage, communications and computing
  • Energy efficient security in IoT
  • Heterogeneous system modeling for 5G and Beyond security
  • Secure sensing and computing techniques in 5G and Beyond
  • Big data analytics for 5G and Beyond security
  • Secure, privacy-aware and trustworthy IoT communications
  • Trust models and trust handling/propagation for 5G and Beyond security
  • Physical layer security for 5G and Beyond
  • 5G and Beyond security standardization
  • Emerging and open technologies such as adversarial ML, GAN, RNN, O-RAN as core components of 5G networks
  • Emerging privacy-preserving Machine Learning or Deep Learning in 5G and Beyond, e.g. machine unlearning
  • Adversarial Machine Learning or Deep Learning in 5G and Beyond
  • Trustworthiness and Fairness in Artificial Intelligence for 5G and Beyond
  • Security and Privacy for Blockchain Technology in 5G and Beyond
  • Security and Privacy for Data-centric Networks in 5G and Beyond
  • Security and Privacy for Fog Computing in 5G and Beyond
  • Security and Privacy for Software-Defined Networks
  • Security and Privacy for Network Function Virtualization
  • Security and Privacy for Drone Communications in 5G and Beyond
  • Security and Privacy constraints considering fairness issues
  • Security and Privacy in Sensors as a Service for 5G and Beyond

Symposium Paper Submission

All papers should be submitted via EDAS, Symposium on Security in Future Networks track. Full instructions on how to submit papers are provided on the IEEE FNWF 2023 website:



Financial Co-Sponsors

Technical Co-Sponsors