Journal Information
IEEE Network
http://www.comsoc.org/netmag
Impact Factor:
8.808
Publisher:
IEEE
ISSN:
0890-8044
Viewed:
15266
Tracked:
27
Call For Papers
IEEE Network covers topics which include: network protocols and architecture; protocol design and validation; communications software; network control, signaling and management; network implementation (LAN, MAN, WAN); and micro-to-host communications.
Last updated by Dou Sun in 2021-04-08
Special Issues
Special Issue on Managing Next-Generation Networks for Intelligent Services and Applications
Submission Date: 2021-09-30

Next-Generation Networks (NGNs) integrate the functionalities of a plethora of established and emerging technologies such as 5G, Artificial Intelligence (AI), edge intelligence, network softwarization, and data-plane programmability. NGNs promise to achieve ultra-fast data rates and minimal latency in wireless communication and networking. It enables smart and autonomous services and applications through AI and Machine Learning (ML). Coupled with advances in user end-devices, NGNs enable a plethora of smart services and user-defined applications. Given the rise in system complexity and the exponential increase in the amount of data exchanged through networks, new state-of-the-art NGN management solutions are needed. By adapting cooperative and distributed management solutions, more reliable and efficient services and applications are conveyed to the end-users. Moreover, with distributed learning solutions, NGNs could be optimized to support the dynamic nature in network configuration and enable end-to-end system automation. For instance, the integration of Federated Learning (FL), Deep Reinforcement Learning (DRL), and Blockchain to NGNs can support scalable, secure and diversified services and applications. Furthermore, through data plane programmability, network intelligence could be implemented directly on programmable devices with the network core. An intelligent forwarding plane would enable a faster reaction to network events without depending on a time-consuming exchange between the data and control planes. In this Special Issue, we welcome original research that approaches novel and state-of-the-art future network and system management solutions that will ensure reliable, secure, efficient and autonomous services and applications. Researchers, practitioners, developers, and industry experts are invited to contribute to one of the scopes of the Special Issue, including, but not limited to, the following: - Intelligent service orchestration and management. - Secure application and service provisioning in next-generation networks. - Smart management architectures for next-generation routing and switching. - Intelligent network and service virtualization. - Intelligent network slicing. - Distributed intelligence for next-generation network orchestration and management. - Distributed and federated learning on edge devices to support NGN management. - Blockchain solutions to support service delivery in NGN. - Secure and trustworthy operations and management for next-generation networks. - Big and real-time data management and analytics for network operations. - Federated Learning-aided next-generation multiple access. - Architectures for next-generation routing and switching. - FL-aided next generation circuit and packet switching. - Emerging services and applications management for connected vehicles technologies. - Applications and services using UAVs to support autonomous vehicles in B5G networks.
Last updated by Dou Sun in 2021-07-29
Special Issue on Networking Technologies for Harsh Environments
Submission Date: 2021-11-30

Networks deployed in in harsh environments, such as high-speed trains, subways, deserts, trenches, forests, and underground mining, should be specially constructed to withstand extreme conditions such as high or low temperatures, corrosive humidity, extreme weather or excessive dust and dirt. Such applications require specially designed wireless networks, sensor networks, fiber-optic networks, or satellite networks, that can perform under extreme conditions and meet QoS, security, and reliability requirements. Quite often, networks in harsh environments have an extremely low signal-to-noise ratio (SNR), high doppler shift, and long latency, and often consume more power and energy. Bandwidth limitations in harsh environments require spectrum efficient communications. The current state of the art technologies such as edge computing, massive MIMO, advanced modulation and channel coding, artificial intelligence, and signal processing, provide different venues to explore this challenging area. Although 3GPP provides some standards for certain networks, such as 5G wireless networks and satellite networks, they are for general purpose networks; networks in harsh environments need further investigation. The goal of this Special Issue is to publish the most recent results of networking technologies for harsh environments. We invite survey and tutorial articles directed to the Special Issue. Potential topics include but are not limited to the following: - Network science foundation for networking in harsh environments - Edge computing for networking in harsh environment - Massive MIMO for networking in harsh environments - MAC of networking in harsh environments - Network layer design in harsh environments - Spectrum and energy efficiency for networks in harsh environments - New multiple access techniques for networks in harsh environments - Artificial intelligence for networks in harsh environments
Last updated by Dou Sun in 2021-09-21
Special Issue on Trust, Security and Privacy of 6G
Submission Date: 2021-12-15

6G follows the footsteps of 5G and pursues the integration of communications and sensing. Through sensing the physical world and human-beings, 6G should be capable of programming to offer automation systems that span a rich variety of devices, several types of network and communication technologies and humans. 6G should timely offer user expected and satisfied networking services. It will embrace emerging technologies, such as quantum communication, molecular communication, real-time intelligent edge, Internet of everything, etc. As a consequence, personal and national safety will highly depend on network and information security. But sensing human-beings and the physical world brings serious concerns about privacy preservation, which, however, conflicts with trust. Another view of 6G is it is a large-scale heterogeneous network (LS-HetNet) by integrating terrestrial networks, space satellite networks, and marine networks. Such an integrated network can seamlessly support anywhere and anytime networking. But high Quality-of-Trust should be offered by LS-HetNets to meet mobile user expectations. By integrating with cloud computing and edge computing, network resources can be economically arranged with high flexibility across multiple domains according to user demands. But this requests virtual collaboration among multiple network operators in a trustworthy way with privacy preservation at both the operator level and user level. Anticipating future development, ITU-T specifies that Trustworthy networking should be provided. Trustworthy networking in 6G should ensure security and overcome privacy leakage in an integrated way. In short, 6G is expected to hold such attractive features as trustworthy and autonomous networking based on effective sensing to automatically satisfy user demands through integration of heterogeneous communication and networking technologies. However, such promising features introduce new challenges on trust, security and privacy, which motivate research and practice. This Special Issue aims to bring together recent advances on trust, security and privacy in 6G networks. It welcomes original and innovative perspectives on theories, methodologies, schemes, algorithms, and systems related to 6G trust, security and privacy, from academia, industry, and government. We invite survey and tutorial articles directed to the Special Issue. Potential topics include but are not limited to the following: - Theories, architectures and applications of 6G trustworthy networking - Trustworthy and intelligent routing - Trust modeling, trust policies and trust mechanisms - Network trust evaluation and measurement - 6G network security architecture - Machine learning for network trust, security and privacy - Blockchain and 6G trustworthy networking - End-to-end communication security, privacy and trust - Cryptography and trustworthy networking - Smart handover with security and privacy - Network resource arrangement for trustworthy networking - Intrusion detection in integrated HetNets - Security and privacy protection in 6G - Trust management of 6G - Network data collection, classification and trust analytics - Incentive mechanisms of trust management - Physical security and trust of 6G - 6G positioning and its trust, security and privacy - 6G service trust, security and privacy - Post-quantum cryptography for 6G - Embedded trust and distributed trust - Distributed ledger technologies and differential privacy approaches - Regulation and standardization of 6G security, privacy and trust - Credibility authentication in 6G - Edge intelligence/IoT security - Trust, security and privacy of promising communication technologies in 6G - Sensing with privacy preservation - Analysis and design of 6G protocol security - Domain specific security, privacy and trust in 6G - Trust, security and privacy of digital twin in 6G
Last updated by Dou Sun in 2021-07-29
Special Issue on Zero Touch Networks: Opportunities, Challenges and Potential Applications
Submission Date: 2022-01-15

The introduction to virtualized networks was motivated by the explosive growth of mobile devices and service innovation. Virtual networks are destined to play a vital role when it comes to the service agility and elasticity of 5G networks incorporating Internet of Things (IoT) devices. It has been predicted by analysts that by the end of 2021, there will be more than 22 billion IoT devices. Hence, the management and connection of those devices through manual means seems impractical. Zero Touch Networks fully utilize virtualization functionality by transitioning from hardware platforms to off-the-shelf software-based solutions. The purpose of Zero Touch Networks is to provide a wide range of autonomous Information and Communications Technology (ICT) services, infrastructure and capabilities with zero touch based on fully integrated Self-X life cycle operations (self-serving, self-fulfilling, self-assuring) to automatically meet and respond to customer demands and resources available. Over the last few years, business and social practices digitized with the evolution of new enabling technologies such as Artificial Intelligence (AI), Machine Learning (ML), Deep Learning (DL), Distributed Ledger Technology (DLT), 6G, etc. The ad-hoc emergence of disruptive technologies, whether networking and virtualization of network functions identified in the field of software, or increasing demands for decoupled Information Technology (IT) functionality, such as cloud computing and storage, or major new network technologies, such as 6G, helps ICT users to not only evolve their companies, but also to create new ones. In fact, 6G and zero touch networks are quite related when it comes to the end goals. For instance, both types of networks heavily rely on AI technology for developing autonomous, cost effective, and efficient systems while reducing human intervention. This evolution is driven by the motivation that end-users are rapidly driving the demands imposed on networks. Whichever type of customer is considered, everyone requires a fusion of a fast and context-aware network and service configuration, flexible new service generation, and dynamic and efficient resource allocation. The use of zero touch networks implicitly provides the security for network management systems. However, most recent security threats are associated with the increasing number of IoT devices, cloud-based and mobile-based services. Therefore, zero touch network services need to be safeguarded by additional security measures to not only secure the network but also preserve data privacy and integrity. Another key enabling technology, i.e. DLT, when integrated, can provide a level of security that is needed for the realization of zero touch networks. In order to offer seamless automated end-to-end services, existing networks are made up of a diverse series of heterogeneous devices that need to be integrated. Until very recently the planning, implementation and management of this mix of services has been a largely manual activity with some automated assistance. In short, no matter the degree of refinement, it is recognized that these services can no longer be managed using such approaches. The fresh demands need a transformation supported by the integration of new technologies, such as virtualization, 6G, Blockchain, AI/ML/DL, etc., to attain a new level of automation and intelligence to efficiently manage the networks. This Special Issue is targeted at the above issues related to Zero Touch Networks: QoS Provision and Resource Management. Authors are invited to submit previously unpublished papers to this Special Issue. Topics include, but are not limited to: - ML/DL for Zero Touch Networks - SDN/Network Slicing for Zero Touch Networks - Blockchain for Zero Touch Networks - Edge Computing for Zero Touch Networks - Big Data Analytics for Zero Touch Networks - Federated Learning for Zero Touch Networks - IoT for Zero Touch Networks - Dynamic Resource Allocation Techniques - Quantum Computing for Zero Touch Networks - Decentralized AI for Zero Touch Networks - Zero Touch Network architectures and protocol designs - Quality of Service (QoS) issues such as Dynamic Resource Allocation, Spectrum Allocation, Energy Efficiency - Enabling trust for Zero Touch Networks - Futuristic paradigms for advanced use cases; adopting blockchain, quantum communication, etc - Parameters such as Interoperability, heterogeneity, and bandwidth in congested networks - Optimization techniques (e.g. Harris Hawk) for Zero Touch Networks - Intrusion detection for Zero Touch Networks - Network Service Monitoring for Zero Touch Networks - Privacy issues of Zero Touch Networks - Network slicing for Zero Touch Networks - Network as a Service (NaaS) based autonomous networks - Intent-based Networking
Last updated by Dou Sun in 2021-09-21
Related Journals
CCFFull NameImpact FactorPublisherISSN
cSecurity and Communication Networks1.288Hindawi1939-0122
aIEEE/ACM Transactions on Networking3.597IEEE/ACM1063-6692
bNeural Networks5.535Elsevier0893-6080
bACM Transactions on Sensor Networks ACM1550-4859
cAd Hoc Networks3.490Elsevier1570-8705
New Ideas in Psychology1.550Elsevier0732-118X
bComputer Networks3.111Elsevier1389-1286
cWireless Networks0.958Springer1022-0038
Networking Science Springer2076-0310
IEEE Communications Surveys & Tutorials22.97IEEE2373-745X
Full NameImpact FactorPublisher
Security and Communication Networks1.288Hindawi
IEEE/ACM Transactions on Networking3.597IEEE/ACM
Neural Networks5.535Elsevier
ACM Transactions on Sensor Networks ACM
Ad Hoc Networks3.490Elsevier
New Ideas in Psychology1.550Elsevier
Computer Networks3.111Elsevier
Wireless Networks0.958Springer
Networking Science Springer
IEEE Communications Surveys & Tutorials22.97IEEE
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
AI & FLInternational Conference of Artificial Intelligence and Fuzzy Logic2021-10-022021-10-202021-12-24
NETCODInternational Symposium on Network Coding2015-03-062015-04-242015-06-22
b1NetGamesInternational Workshop on Network and Systems Support for Games2015-09-252015-10-312015-12-03
SC2International Symposium on Cloud and Service Computing2019-08-052019-08-312019-11-18
AsiaPESAsian Conference on Power and Energy Systems2013-01-142013-02-042013-04-10
ASYNCIEEE International Symposium on Asynchronous Circuits and Systems2020-01-062020-02-202020-05-17
SNSPInternational Conference on Sensor Networks and Signal Processing2018-10-08 2018-10-28
ICVATInternational Conference on Virtualization Application and Technology2020-10-152020-10-302020-11-13
cICIMPInternational Conference on Internet Monitoring and Protection2021-03-202021-04-122021-05-30
CACInternational Conference on Cloud and Autonomic Computing2015-05-082015-06-152015-09-21
Recommendation