IEEE Wireless Communications and Networking Conference
10–13 April 2022 // Austin, TX, USA
Boosting Verticals into Wireless Orbit

Call for Papers

5G is the latest generation of cellular technology.  While 5G solves many of the security problems associated with 4G/LTE, the additional capabilities of 5G expand the potential attack surface.  Additionally, the anticipated ubiquity of 5G and the trend for taking all operations mobile, means that organizations such as government agencies, critical infrastructure providers and a wide range of key industries and non-profit organizations will be moving to 5G as an enabling infrastructure.  However, much 5G equipment across the world is produced by manufacturers that may be coerced into providing backdoors and monitoring capabilities for purposes of industrial or military espionage. 

5G security is a current topic of interest both academically and in practice.    However, the issue of securely “operating through” allied, neutral, or even potentially hostile 5G networks has only recently been identified as a problem.  Most approaches to network security focus on developing techniques that an operator can use to provide security on a network they own or operate in cooperation with their network provider. The challenge, then, is to provide technology that can guarantee private and secure 5G communications independent of the network operators or underlying components.

The focus of the workshop will be on technology to enable secure operations over any 5G network, even one that may be owned/operated by a potentially hostile entity.  The workshop will offer technical presentations on the latest research and development in 5G security including, but not limited to: physical (PHY) layer security; network layer security; securing the 5G core; secure interactions across different 5G network; human-machine interfaces; and secure edge computing.  The workshop will consist of multiple sessions, each with technical paper presentations followed by a panel discussion.


Topics of interest cover security challenges from the physical (PHY) layer to approaches to making security “user friendly.”  The worst case assumption is that an adversary controls all elements of the 5G network.  The workshop invites technical papers on topics including, but not limited to:

  • Zero-trust approaches
  • Encryption
  • Authentication
  • Interference detection and avoidance
  • Traffic obfuscation
  • Network configuration detection
  • Network monitoring and analytics
  • Human-machine interfaces and user interactions

Platinum Patrons

Gold Patrons

Silver Patrons

Bronze Patrons

Local Sponsors