IEEE.orgIEEE Xplore Digital Library IEEE Standards IEEE SpectrumMore Sites
W8: Emerging Physical-layer Security Technologies and Applications for B5G and 6G - VTC2021-Fall

W8: Emerging Physical-layer Security Technologies and Applications for B5G and 6G

Workshop Organizer: Eduard Axel Jorswieck, Technische Universitaet Braunschweig, Germany
Workshop Organizer: Guyue Li, Southeast University, China
Workshop Organizer: Junqing Zhang, University of Liverpool, UK

Keynote Speaker: Xianbin Wang, Western University, Canada

Abstract: The workshop aims at sharing the advancements in the physical-layer security (PLS) field and spreading the adoption in scenarios of future beyond fifth-generation (B5G) and sixth-generation (6G) networks. Various emerging applications in these future networks trigger high demand for trust, security and privacy. Meanwhile, the emergence of new disruptive technologies, such as reconfigurable intelligent surfaces (RIS), terahertz (THz), Non-Orthogonal Multiple Access (NOMA), Massive MIMO and so on, presents new opportunities and challenges for PLS. The combination of PLS and these new techniques, which realizes the integrated development of transmission and security, promises lightweight, trustworthy and reliable secure communication. In order to spark more ideas and future research, we invite experts and scholars in relevant fields around the world to share their insights into the topics of models, mechanisms and applications of PLS in B5G and 6G networks. We hope to foster an exchange of research results, experiences, and products in the physical layer security domain from both a theoretical and practical perspective.

 

Eduard Axel Jorswieck Bio: Eduard Axel Jorswieck (Fellow, IEEE) received the Diplom-Ingenieur (M.S.) degree and the Doktor-Ingenieur (Ph.D.) degree, both in electrical engineering and computer science, from the Technische Universitaet Berlin, Berlin, Germany, in 2000 and 2004, respectively. He was with the Broadband Mobile Communication Networks Department, Fraunhofer Institute for Telecommunications, Heinrich-Hertz-Institut, Berlin, Germany, from 2000 to 2008. From 2005 to 2008, he was a Lecturer with the Technische Universitaet Berlin. From 2006 to 2008, he was with the Department of Signals, Sensors and Systems, Royal Institute of Technology, as a Postdoctoral Researcher and an Assistant Professor. From 2008 until 2019, he was the head of the Chair of Communications Theory and Full Professor at Dresden University of Technology (TUD), Germany. Since August 2019, he has been the head of the Chair for Communications Systems and Full Professor at Technische Universitaet Braunschweig, Germany. Since April 2020, he acts as managing director for the Institute of Communications Technology. Eduard’s main research interests are in the broad area of communications. He has published more than 140 journal papers, 13 book chapters, 3 monographs, and some 290 conference papers on these topics.

Guyue Li Bio: Guyue Li (Member, IEEE) received the B.S. degree in information science and technology and the Ph.D. degree in information security from Southeast University, Nanjing, China, in 2011 and 2017, respectively. From June 2014 to August 2014, she was a Visiting Student with the Department of Electrical Engineering, Tampere University of Technology, Finland. She is currently an Associate Professor with the School of Cyber Science and Engineering, Southeast University. Her research interests include physical-layer security, secret key generation, radio frequency fingerprint, and link signature.

Junqing Zhang Bio: Junqing Zhang (Member, IEEE) received the B.Eng. and M.Eng. degrees in electrical engineering from Tianjin University, China, in 2009 and 2012, respectively, and the Ph.D. degree in electronics and electrical engineering from Queen’s University Belfast, U.K., in 2016. From February 2016 to January 2018, he was a Post-Doctoral Research Fellow with Queen’s University Belfast. Since February 2018, he has been a Tenure Track Fellow (an Assistant Professor) with the University of Liverpool, U.K. His research interests include Internet of Things, wireless security, physical-layer security, key generation, and radio frequency fingerprinting identification.

Xianbin Wang Bio: Dr. Xianbin Wang (S’98-M’99-SM’06-F’17) is a Professor and Tier-1 Canada Research Chair at Western University, Canada. His current research interests include 5G/6G technologies, Internet-of-Things, communications security, machine learning and intelligent communications. Dr. Wang has over 450 highly cited journal and conference papers, in addition to 30 granted and pending patents and several standard contributions. Dr. Wang is a Fellow of Canadian Academy of Engineering, a Fellow of Engineering Institute of Canada, a Fellow of IEEE and an IEEE Distinguished Lecturer. He has received many awards and recognitions, including Canada Research Chair, CRC President’s Excellence Award, Canadian Federal Government Public Service Award, Ontario Early Researcher Award and six IEEE Best Paper Awards. He currently serves/has served as an Editor-in-Chief, Associate Editor-in-Chief, Editor/Associate Editor for over 10 journals. He was involved in many IEEE conferences including GLOBECOM, ICC, VTC, PIMRC, WCNC and CWIT, in different roles such as symposium chair, tutorial instructor, track chair, session chair, TPC co-chair and keynote speaker. He has been nominated as an IEEE Distinguished Lecturer several times during the last ten years. Dr. Wang is currently serving as the Chair of IEEE London Section and the Chair of ComSoc Signal Processing and Computing for Communications Technical Committee.

Workshop Program

Part 1 – Opening / Welcome

Part 2 – Keynote Speaker – Xianbin Wang, Western University; IEEE Distinguished Lecturer

Part 3 – Technical Paper – A Lightweight Protocol for Validating Proximity in UHF RFID Systems

Part 4 – Technical Paper – Virtual Private Mobile Network with Multiple Gateways for B5G Location Privacy

Part 5 – Technical Paper – Data desensitization mechanism of Android application based on differential privacy

Part 6 – Technical Paper – ROLIG3A: Protecting Group Secret Key Generation Procedures against Malicious Attackers 

Part 7 – Technical Paper – On the Security of RIS-assisted Manipulating Attack in MISO systems

Part 8 – Technical Paper – Secure UAV-enabled OFDMA Communications

Part 9 – Technical Paper – CSI Measurement and Reciprocity Evaluation Method Based on Embedded Platform

Part 10 – Closing Remarks