Information Security in Telecommunication Systems

A special issue of Future Internet (ISSN 1999-5903). This special issue belongs to the section "Smart System Infrastructure and Applications".

Deadline for manuscript submissions: 10 April 2025 | Viewed by 122

Special Issue Editors


E-Mail Website
Guest Editor
School of Cyber Engineering, Xidian University, Xi’an 710126, China
Interests: network security; network measurement

E-Mail Website
Guest Editor
School of Automation, Qingdao University, Qingdao 266071, China
Interests: complex system modeling; intelligent control and optimization; machine learning

E-Mail Website
Guest Editor
School of Artificial Intelligence, OPtics and ElectroNics (iOPEN), Northwestern Polytechnical University (NWPU), Xi’an 710072, China
Interests: information computation; pattern recognition; image processing

Special Issue Information

Dear Colleagues,

Post-5G or 6G telecommunication infrastructure has become important in modern society, supporting the needs of daily communications. However, with the increasing complexity of network environments and the rapid influx of access devices, information security has gradually become a key factor restricting the development of telecommunication infrastructure. On the one hand, cyberattacks are becoming increasingly diverse and sophisticated. Hackers, malware, and other threats continue to launch attacks on telecommunication infrastructure, trying to steal important data and disrupt the normal operation of the system. This situation will lead to the disclosure of user privacy and may cause extensive communication failure, seriously affecting social and economic activities. On the other hand, the complexity of telecommunication infrastructure itself also brings difficulties to information security. Large network architectures, numerous access points, and constantly updated technologies can create new security vulnerabilities.

The goal of this Special Issue is to provide the latest research methods on information security in post-5G or 6G telecommunication infrastructures. Theoretical and technical methods related with big data analysis and encryption techniques in telecommunication infrastructure are also encouraged.

Topics of interest include, but are not limited to, the following:

  • Intrusion detection and attack defense in post-5G or 6G;
  • Privacy computing in post-5G or 6G;
  • Trust management and access control in post-5G or 6G;
  • Vulnerability discovery and patching in post-5G or 6G;
  • Edge computing in post-5G or 6G;
  • New data structure for big data analysis in post-5G or 6G;
  • Encryption techniques in post-5G or 6G;
  • Hardware security in post-5G or 6G;
  • Virtualized resource security in post-5G or 6G;
  • Experience reports on security and privacy issues of post-5G or 6G.

Dr. Xuyang Jing
Dr. Xian Li
Dr. Cong Wang
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • post-5G or 6G
  • information security
  • intrusion detection
  • privacy computing
  • trust management
  • big data analysis

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers

This special issue is now open for submission.
Back to TopTop