IEEE Global Communications Conference
7–11 December 2021 // Madrid, Spain // Hybrid: In-Person and Virtual Conference
Connecting Cultures around the Globe

Call for Papers

Trustworthiness is established in technologies such as trusted network architecture, cryptography, wireless technologies, AI, privacy preservation, etc. The definition and KPI of trustworthiness, the measurement model of trust, and related solutions to building trustworthy networks have become hot topics in industries. But they have not yet been customized for 6G.

As a cross-cutting field, 6G trustworthiness needs to combine telecommunication, security, privacy, and many other disciplines. The trustworthy 6G is targeting to achieve the best balance in practical applications in both telecom networks and trustworthiness.

It's time to research 6G-oriented trustworthiness technologies. This workshop provides the opportunity for attendees from both academia and industry to exchange views on the trustworthiness in technology regarding 6G trustworthiness. The topics of include, but are not limited to:

  1. 6G Blockchain
  • Distributed Consensus Algorithms and Fault-Tolerant Algorithms
    • New Algorithms and New technologies
    • Performance and Scalability Issues
    • AI-based Consensus algorithms
  • Security, Privacy and Reliability in Blockchain
    • Security, Privacy and Reliability studies
    • Cryptography research
    • New types of Attacks, and Forensics studies
    • Blockchain operational security studies
    • The threat of new technologies to blockchain
  • Industrial Blockchain Architecture and applications
    • Distributed Database Technologies for Blockchain
    • Decentralized Internet Infrastructure
    • Cross-chain
    • Blockchain Platforms and software development Tools
    • Smart Contracts
    • Distributed Trust and Attestation
    • Threat information management and sharing
    • Other applications in industries
  1. 6G Quantum-safe Technologies
  • PQC-based 6G security architecture
  • Cryptosystem for 6G, not limited to code-based, hash-based, isogeny-based, lattice-based, and multivariate constructions.
  • Quantum key distribution
  • Attacks on quantum-safe system
  1. Physical Layer Security
  • Fundamental principles of physical layer security for 6G
  • Physical layer security in Intelligent Reflecting Surface (IRS) systems
  • Integration of physical layer security into FD systems
  • AI for physical layer security
  • Advance in physical layer encryption
  • Prototype experiment of key generation using physical layer characteristics
  1. AI Trustworthiness in 6G Era
  • AI models security and privacy
  • Privacy preservation of big data mining
  • AI systems for security and privacy
  • AI-driven attacks and mitigation methods
  1. More topics towards 6G trustworthiness, formal security analysis, attack and defense, attestation, security evaluation…