Collection
Special Issue on Security in Next-Generation Communication Networks
- Submission status
- Closed
Network attacks show a trend of increased intensity, enhanced diversity, and more concealed attack methods, which put forward higher requirements for the performance of network security management strategies. One characteristic of conventional network management is the lack of global visibility of the network state, which hinders the deployment and maintenance of coherent network-wide policies. This complexity in integration makes it worse for maintaining stable and robust network security; changing or updating security policies in these systems in the wake of changes in traffic behavior or intrusions is very difficult to manage and implies high costs.
Software-defined networking (SDN) is an overarching new networking paradigm that can be instantiated with controller-centered approaches (e.g., OpenFlow), programmable data planes (e.g., P4, NPL, programmable ASICs, etc.), and Network Functions Virtualization (NFV). These next-generation network management technologies are changing how networks are planned, configured, deployed, and managed. They exhibit a rapid evolution that has turned them into key enablers for future implementations in heterogeneous network scenarios, such as 5G and 6G, data centers, ISPs, corporate, academic, and home networks. One of the main advantages of SDN is the logical centralization of the network control plane and the introduction of programmability, which enables security automation and runtime deployment of security procedures and policies.
A twofold research context has been identified: on the one hand, the creation of security countermeasures strategies that leverage the advantages of next-generation technologies. On the other hand, the same next generation features that can be used to provide quick and efficient security countermeasures can also be a target for attackers. Therefore, one must pursue a secure architecture design when these next-generation networking management technologies (e.g., SDN and NFV) are enabled.
This Special Issue encourages researchers and experts to submit their recent advances in both contexts: 1) leveraging next-gen technologies to improve network security and 2) providing solutions to intrinsic security faults and risks in next-generation network management technologies. Topics of interest for this Special Issue include but are not limited to:
--Security, reliability, and privacy through next-generation communication networks
--Management and orchestration of next-generation technologies elements for security
--Secure design of SDN/NFV solutions, security enablers
--Security threats and vulnerabilities introduced by next-generation communication networks
--Threat detection and mitigation through SDN/NFV
--Security policy specification and management in next-generation communication networks
--Security-related monitoring and analytics in SDN and NFV
--Authentication, authorization, and accounting in communication networks
--Secure SDN/NFV with Blockchain
--Security of applying next-generation technologies to IoT, cloud computing, wireless and mobile networks
--Risk and compliance issues in next-generation communication networks
--Securing networks through data-plane programmability
--Collaboration between programmable data and control planes to increase security
--Securing next-generation management infrastructures
--Security architecture for next-generation communication networks
--Security standards of next-generation technologies
--Security of routing in SDN
--Security of network slicing
--Security as a service for SDN
--Next-generation communication network security using artificial intelligence
Guest EditorsJuan Felipe Botero, University of Antioquia, Colombia – email: juanf.botero@udea.edu.co
Luis Alejandro Fletscher, University of Antioquia, Colombia – email: luis.fletscher@udea.edu.co
Nur Zincir-Heywood, Dalhousie University, Canada – email: zincir@cs.dal.ca
Abdelkader Lahmadi, Université de Lorraine, Loria, Inria, France – email: abdelkader.lahmadi@loria.fr
Adrian Lara, University of Costa Rica, Costa Rica – email: adrian.lara@ucr.ac.cr
Carol Fung, Concordia University, Canada – email: carol.fung@concordia.ca
Miguel Camelo, University of Antwerpen, Belgium – email: Miguel.Camelo@uantwerpen.be
Open Submission ScheduleWe use an “open” submission schedule, which means that you can submit your paper at any time before we close the call (see below) and that we will start the review process right after receiving the submission.
Call closes: June 30th, 2022
Revision notification: 2 months after submission
Revised paper due: 1.5 months after the revision notification
Final notification: 1.5 months after the revision notification
Expected publication of the special issue: first quarter of 2022 (early accepted papers will be accessible online before the deadline)
Submission Format and Review GuidelinesThe submitted manuscripts must be written in English and describe original research neither published nor currently under review by other journals or conferences. Parallel submissions will not be accepted. All papers will undergo a similarity check using iThenticate, and the work similarity should be below 20%. All submitted papers, if relevant to the theme and objectives of the special issue, will go through an external peer-review process. Submissions should (i) conform strictly to the Instructions for Authors available on the JNSM website and (ii) be submitted through the Snapp system available at https://www.springer.com/journal/10922.
Articles (14 in this collection)
-
-
C3S-TTP: A Trusted Third Party for Configuration Security in TOSCA-Based Cloud Services
Authors
- Mohamed Oulaaffart
- Rémi Badonnel
- Olivier Festor
- Content type: OriginalPaper
- Published: 05 January 2024
- Article: 21
-
A CNN-Based SIA Screenshot Method to Visually Identify Phishing Websites
Authors
- Dong-Jie Liu
- Jong-Hyouk Lee
- Content type: OriginalPaper
- Published: 21 November 2023
- Article: 8
-
A Perspicacious Multi-level Defense System Against DDoS Attacks in Cloud Using Information Metric & Game Theoretical Approach
Authors
- M. Mohan
- V. Tamizhazhagan
- S. Balaji
- Content type: OriginalPaper
- Published: 03 October 2023
- Article: 85
-
MPC-ABC: Blockchain-Based Network Communication for Efficiently Secure Multiparty Computation
Authors (first, second and last of 6)
- Oscar G. Bautista
- Mohammad Hossein Manshaei
- Selcuk Uluagac
- Content type: OriginalPaper
- Published: 21 July 2023
- Article: 68
-
Security Evaluation of Authentication Requirements in IoT Gateways
Authors (first, second and last of 6)
- Diego R. Gomes
- Fernando A. Aires Lins
- Marco Vieira
- Content type: OriginalPaper
- Published: 21 July 2023
- Article: 67
-
Securing Software-Defined Networks Through Adaptive Moving Target Defense Capabilities
Authors (first, second and last of 6)
- Felipe S. Dantas Silva
- Emidio P. Neto
- Túlio Pascoal
- Content type: Research
- Published: 06 July 2023
- Article: 61
-
A Novel Two-Routers Model Based on Category Constraints Secure Data-Dissemination-Aware Scheduling in Next-Generation Communication Networks
Authors
- Mahdi Jemmali
- Abir Ben Hmida
- Akram Y. Sarhan
- Content type: Research
- Published: 30 June 2023
- Article: 59
-
SDNTruth: Innovative DDoS Detection Scheme for Software-Defined Networks (SDN)
Authors (first, second and last of 4)
- Tiago Linhares
- Ahmed Patel
- Marcial Fernandez
- Content type: Research
- Published: 17 June 2023
- Article: 55
-
4MIDable: Flexible Network Offloading For Security VNFs
Authors (first, second and last of 4)
- Benjamin Lewis
- Matthew Broadbent
- Nicholas Race
- Content type: Research
- Open Access
- Published: 15 June 2023
- Article: 52
-
Mitigating DoS Attack in MANETs Considering Node Reputation with AI
Authors (first, second and last of 4)
- Subrata Joardar
- Nilanjan Sinhababu
- Prasenjit Choudhury
- Content type: Research
- Published: 07 June 2023
- Article: 50
-
SECAP Switch—Defeating Topology Poisoning Attacks Using P4 Data Planes
Authors (first, second and last of 5)
- Dylan Smyth
- Sandra Scott-Hayward
- Donna O’Shea
- Content type: OriginalPaper
- Open Access
- Published: 21 January 2023
- Article: 28
-
An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking
Authors
- Bing Li
- Maode Ma
- Content type: Research
- Open Access
- Published: 17 November 2022
- Article: 13
-
Cyber Threat Intelligence Sharing Scheme Based on Federated Learning for Network Intrusion Detection
Authors (first, second and last of 4)
- Mohanad Sarhan
- Siamak Layeghy
- Marius Portmann
- Content type: OriginalPaper
- Open Access
- Published: 07 October 2022
- Article: 3