Collection

Special Issue on AI Driven Security for 5G/6G-enabled Next Generation Decision Support Systems

5G/6G-enabled Next Generation Decision Support Systems (5G/6G-enabled NG-DSS) is expected to be a promising technology in the future with exponential growth. Following the emergence of this technology and its estimated productivity, many stakeholders would extend its applicability in various industrial applications to enhance their productivity. To achieve optimal results and maintain trust among all involved entities, including clients, the security aspect of this technology cannot be ignored at any stage. Therefore, the security concerns of this emerging technology need considerable attention from the research and industry communities to design cost-effective authentication, data privacy, and preservation models to combat external and internal threats. Keeping in view the unstructured deployment followed by an open communication environment of 5G/6G-enabled NG-DSS, it is crucial to design reliable security techniques that could be capable to ensure the data privacy, preservation, and authentication of legitimate devices cost-effectively. Following this, the special issue aims to provide a platform to academia and industry experts to exchange their ideas, and publish the latest research trends and results related to 5G/6G-enabled NG-DSS security such as machine-to-machine authentication, data privacy, and preservation during transmission. With this objective, the Special Issue will empower researchers to devise new authentication and data preservation concepts that would lead to effective, secure, and performance-oriented communication. Original research and review articles are welcome. The topics of interest include, but are not limited to: Data Privacy and preservation in 5G/6G-enabled NG-DSS; Decentralized key management in 5G/6G-enabled NG-DSS; Privacy aware routing protocols for 5G/6G-enabled NG-DSS; AI enabled authentication schemes of 5G/6G-enabled NG-DSS; Cryptography in 5G/6G-enabled NG-DSS; Security Challenges in 5G/6G-enabled NG-DSS; Machine-to-Machine Authentication in 5G/6G-enabled NG-DSS; Integrity, confidentiality, and availability in 5G/6G-enabled NG-DSS.

Editors

  • Muhammad Adil

    Department of Electrical and Computer Engineering, School of Applied Sciences, University at Buffalo, USA

  • Muhammad Khurram Khan

    King Saud University, Riyadh, Kingdom of Saudi Arabia

  • Houbing Song

    Department of Electrical, Computer, Software, and Systems Engineering, Director, Security and Optimization for Networked Globe Laboratory, Embry-Riddle Aeronautical University,

Articles (1 in this collection)