SEMINAR: Intelligent Communication Security

#5G-and-beyond #security #privacy #trust
Share

The 5G-and-beyond networks will provide broadband access to a massive number of heterogeneous devices with complex interconnections to support a wide variety of vertical IoT applications. Any potential security risk in such complex systems could lead to catastrophic consequences and even system failure of critical infrastructures, particularly for applications relying on tight collaborations among distributed devices and facilities. This seminar will focus on security provisioning methods with the help of AI to protect the legitimate communications. 



  Date and Time

  Location

  Hosts

  Registration



  • Add_To_Calendar_icon Add Event to Calendar
If you are not a robot, please complete the ReCAPTCHA to display virtual attendance info.
  • London, Ontario
  • Canada

  • Contact Event Host
  • Starts 10 August 2020 05:36 PM UTC
  • Ends 12 August 2020 03:55 AM UTC
  • No Admission Charge


  Speakers

Miss He Fang of Western University

The 5G-and-beyond networks will provide broadband access to a massive number of heterogeneous devices with complex interconnections to support a wide variety of vertical IoT applications. Any potential security risk in such complex systems could lead to catastrophic consequences and even system failure of critical infrastructures, particularly for applications relying on tight collaborations among distributed devices and facilities. While security is the cornerstone for such applications, trust among entities and information privacy are becoming increasingly important. To effectively support future IoT systems in vertical industry applications, security, trust and privacy should be dealt with integratively due to their close interactions. However, conventional technologies always treat these aspects separately, leading to tremendous security loopholes and low eciency. Existing solutions often feature various distinctive weaknesses, including drastically increased latencies, communication and computation overheads, as well as privacy leakage, which are extremely undesirable for delay-sensitive, resource constrained, and privacy-aware communications. This talk will focus on security provisioning methods with the help of AI to protect the legitimate communications. 

Email: