Technical Program

Technical Program

The First IEEE ICC WORKSHOP ON 5G WIRELESS SECURITY (IEEE 5G-SECURITY)


THURSDAY, MAY 24, 08:30 - 08:45

W18-S0 5G-SECURITY: OPENING SESSION

Room: Empire A

Chairs: Danda B. Rawat (Howard University, USA), Oliver Holland (King's College London, United Kingdom (Great Britain))

THURSDAY, MAY 24, 08:45 - 10:15

W18-S1 5G-SECURITY: SESSION I

Room: Empire A

Secrecy Outage Analysis for Massive MIMO-enabled Multi-Tier 5G Hybrid HetNets

Anum Umer (National University of Sciences and Technology (NUST) & School of Electrical Engineering and Computer Science (SEECS), Pakistan); Syed Ali Hassan (National University of Sciences and Technology, Pakistan); Haris Bin Pervaiz (University of Surrey & Institute for Communication Systems (ICS), Home of 5GIC, United Kingdom (Great Britain)); Qiang Ni (Lancaster University, United Kingdom (Great Britain)); Leila Musavian (University of Essex, United Kingdom (Great Britain)); Syed Hassan Ahmed (University of Central Florida, USA)

Secrecy Performance Analysis in Downlink NOMA Systems with Cooperative Full-duplex Relaying

Chengpeng Liu (University of Electronic Science and Technology of China, P.R. China); Lin Zhang (University of Electronic Science and Technology of China & University of Sydney, P.R. China); Ming Xiao (Royal Institute of Technology, Sweden); Zhi Chen and Shaoqian Li (University of Electronic Science and Technology of China, P.R. China)

On Secrecy Performance of Relay Assisted Millimeter Wave C-RAN

Peixi Liu (Peking University, P.R. China); Hui Gao (Beijing University of Posts and Telecommunications, P.R. China); Wu Luo and Wei Jiang (Peking University, P.R. China)

Secure Beamformer Designs in MU-MIMO Systems: An Interference Exploitation Approach

Ming Li, Guangyu Ti, Xiaowen Tian, Zihuan Wang and Qian Liu (Dalian University of Technology, P.R. China)

Networking Break

THURSDAY, MAY 24, 11:00 - 11:45

W18-K: W18-K 5G SECURITY - KEYNOTE

Room: Empire A

Keynote Speaker: Dr. Wenjing Lou, Virginia Tech, USA

Keynote Title: Internet of Things and its Security Challenges (Abstract and Bio)

Chair: Danda B. Rawat (Howard University, USA)

THURSDAY, MAY 24, 11:45 - 12:30

W18-S2 5G-SECURITY: SESSION II

Room: Empire A

On Secrecy Analysis for D2D Networks over \alpha-\mu Fading Channels with Randomly Distributed Eavesdroppers

Long Kong (ETS & University of Quebec, Canada); Georges Kaddoum (ETS Engineering School, University of Qu├ębec, Canada); Satyanarayana Vuppala (University of Luxembourgh, Luxembourg)

Secure Communications with Secondary User Selection in Underlay Cognitive Radio Networks

Mian Qin, Shouyi Yang, Zhuo Han and Ruizhe Zhang (Zhengzhou University, P.R. China); Hao Deng (Henan University, P.R. China)

Lunch Break

THURSDAY, MAY 24, 14:00 - 15:00

W18-S-I 5G-SECURITY: INTERACTIVE SESSION

Room: Empire A

Network Intrusion Detection Based on Stacked Sparse Autoencoder and Binary Tree Ensemble Method

Baoan Zhang, Yanhua Yu and Jie Li (Beijing University of Posts and Telecommunications, P.R. China)

Secrecy Capacity of Indoor Visible Light Communication Channels

Jin-Yuan Wang (Nanjing University of Posts and Telecommunications, P.R. China); Sheng-Hong Lin (Nanjing Institute of Mechatronic Technology, P.R. China); Cheng Liu and Jun-Bo Wang (Southeast University, P.R. China); Bingcheng Zhu and Yuan Jiang (Nanjing University of Posts and Telecommunications, P.R. China)

Secured Satellite Down-link Transmission Scheme based on OSTBC-WFRFT-precoding

Ruiyang Xu (Information and Navigation College, P.R. China); Da Xinyu (Telecommunication Engineering Institute of Air Force Engineering University, P.R. China); Yuan Liang (Airforce Engineering University, P.R. China); Hang Hu (Air Force Engineering University, P.R. China); Lei Ni (Information and Navigation College, P.R. China)

Securing SC-FDE Uplink Transmissions Using Temporal Artificial Noise Under Three Detection Strategies

Mohamed Marzban (University of Texas at Dallas, USA); Ahmed El Shafie (Qualcomm Inc., USA); Rakan Chabaan (Hyundai, USA); Naofal Al-Dhahir (University of Texas at Dallas, USA)

THURSDAY, MAY 24, 15:00 - 15:45

W18-S3 5G-SECURITY: SESSION III

Room: Empire A

5G NR Jamming, Spoofing, and Sniffing: Threat Assessment and Mitigation

Marc Lichtman (Virginia Tech, USA); Raghunandan M Rao (Virgnina Tech & Wireless@Virginia Tech, USA); Vuk Marojevic and Jeffrey Reed (Virginia Tech, USA); Roger Piqueras Jover (Bloomberg Lp - Security Research Lab, USA)

Security Analysis of Key Extraction from Physical Measurements with Multiple Adversaries

Xiaoxue Wang and Yanzhao Hou (Beijing University of Posts and Telecommunications, P.R. China); Xueqing Huang (New York Institute of Technology, USA); Dongru Li, Xiaofeng Tao and Jin Xu (Beijing University of Posts and Telecommunications, P.R. China)

Networking Break

THURSDAY, MAY 24, 16:15 - 18:00

W18-S4 5G-SECURITY: SESSION IV

Room: Empire A

Secrecy Analysis of a Cloud-Fog Radio Access Network with Binomial Point Process

Xian Liu (University of Arkansas at Little Rock, USA)

Secrecy CPS Transmission Scheme for Slow Fading Independent Parallel Wiretap Channels with New SOP Constraint

Xia Wang (Xian Jiaotong University, P.R. China); Pengcheng Mu, Weile Zhang and Qinye Yin (Xi'an Jiaotong University, P.R. China)

Secure Transmission against Pilot Spoofing Attack: A Random Matrix Theory Based Scheme

Xizhu Nie, Hong Jiang and Minghang Zhang (Jilin University, P.R. China)

Exploring Challenge-Response Mechanism Designs for IoT Initial Trust Establishment

Tham T. Nguyen and Doan B Hoang (University of Technology Sydney, Australia); Aruna Seneviratne (University of New South Wales, Australia)

Reputation Value Ranking Based Sequential Cooperative Spectrum Sensing Against Byzantine Attack

Jun Wu (Southeast University, P.R. China); Tiecheng Song (National Mobile Communications Research Laboratory, Southeast University, P.R. China); Cong Wang and Jing Hu (Southeast University, P.R. China)