Skip to main content
Publications lead hero image abstract pattern


Publication Date

Manuscript Submission Deadline

Special Issue

Call for Papers

6G follows the footsteps of 5G and pursues the integration of communications and sensing. Through sensing the physical world and human-beings, 6G should be capable of programming to offer automation systems that span a rich variety of devices, several types of network and communication technologies and humans. 6G should timely offer user expected and satisfied networking services. It will embrace emerging technologies, such as quantum communication, molecular communication, real-time intelligent edge, Internet of everything, etc. As a consequence, personal and national safety will highly depend on network and information security. But sensing human-beings and the physical world brings serious concerns about privacy preservation, which, however, conflicts with trust. Another view of 6G is it is a large-scale heterogeneous network (LS-HetNet) by integrating terrestrial networks, space satellite networks, and marine networks. Such an integrated network can seamlessly support anywhere and anytime networking. But high Quality-of-Trust should be offered by LS-HetNets to meet mobile user expectations. By integrating with cloud computing and edge computing, network resources can be economically arranged with high flexibility across multiple domains according to user demands. But this requests virtual collaboration among multiple network operators in a trustworthy way with privacy preservation at both the operator level and user level. Anticipating future development, ITU-T specifies that Trustworthy networking should be provided. Trustworthy networking in 6G should ensure security and overcome privacy leakage in an integrated way. In short, 6G is expected to hold such attractive features as trustworthy and autonomous networking based on effective sensing to automatically satisfy user demands through integration of heterogeneous communication and networking technologies. However, such promising features introduce new challenges on trust, security and privacy, which motivate research and practice.

This Special Issue aims to bring together recent advances on trust, security and privacy in 6G networks. It welcomes original and innovative perspectives on theories, methodologies, schemes, algorithms, and systems related to 6G trust, security and privacy, from academia, industry, and government. We invite survey and tutorial articles directed to the Special Issue. Potential topics include but are not limited to the following:

  • Theories, architectures and applications of 6G trustworthy networking
  • Trustworthy and intelligent routing
  • Trust modeling, trust policies and trust mechanisms
  • Network trust evaluation and measurement
  • 6G network security architecture
  • Machine learning for network trust, security and privacy
  • Blockchain and 6G trustworthy networking
  • End-to-end communication security, privacy and trust
  • Cryptography and trustworthy networking
  • Smart handover with security and privacy
  • Network resource arrangement for trustworthy networking
  • Intrusion detection in integrated HetNets
  • Security and privacy protection in 6G
  • Trust management of 6G
  • Network data collection, classification and trust analytics
  • Incentive mechanisms of trust management
  • Physical security and trust of 6G
  • 6G positioning and its trust, security and privacy
  • 6G service trust, security and privacy
  • Post-quantum cryptography for 6G
  • Embedded trust and distributed trust
  • Distributed ledger technologies and differential privacy approaches
  • Regulation and standardization of 6G security, privacy and trust
  • Credibility authentication in 6G
  • Edge intelligence/IoT security
  • Trust, security and privacy of promising communication technologies in 6G
  • Sensing with privacy preservation
  • Analysis and design of 6G protocol security
  • Domain specific security, privacy and trust in 6G
  • Trust, security and privacy of digital twin in 6G

Submission Guidelines

Manuscripts should conform to the standard format as indicated in the ‘Information for Authors’ section of the Paper Submission Guidelines.

All manuscripts to be considered for publication must be submitted by the deadline through Manuscript Central. Select ‘July 2022/ Trust, Security and Privacy of 6G’ from the drop-down menu of topic titles.

Important Dates

Manuscript Submission Deadline: 15 December 2021
Initial Decision Notification: 1 February 2022
Revised Manuscript Due: 1 March 2022
Final Decision Notification: 1 April 2022
Final Manuscript Due: 15 April 2022
Publication Date: July 2022

Guest Editors

Zheng Yan
Xidian University, China, Aalto University, Finland

Laurence T. Yang
St Francis Xavier University, Canada

Tieyan Li
Huawei, Singapore

Yoan Miche
Nokia, Finland

Shui Yu
University of Technology Sydney, Australia

Stephen Yau
Arizona State University, USA