IMPORTANT DATES

Paper submission (Extended): 31 January 2025   Acceptance notifications: 10 March 2025    Camera Ready: 31 March 2025 

This workshop aims to bring together practitioners and researchers from both academia and industry for discussion and technical presentations on wireless security. The focus is on fundamental and practically relevant questions related to the challenges arising on the way towards trustworthy and resilient wireless communications. It also aims to provide the industry with an insight into the development of practical security solutions for future wireless networks. In line with such objectives, original contributions are solicited in topics of interest to include, but not limited to, the following:

  • Physical layer security for 6G
  • Trust and trustworthiness in 6G
  • Secure signal processing
  • Information theoretic security
  • Security verification and performance metrics
  • Cross-layer security solutions
  • 5G/6G security (false base station attacks, sidelink security, integration of new services)
  • Zero-touch security solutions
  • Context-aware, semantic security
  • Covert wireless communications
  • Physical layer authentication and key agreement
  • Security and privacy for IoTs, HetNets, massive MIMO systems, and mm-wave, THz transmission
  • Security and privacy of joint communications and sensing / integrated sensing and communication
  • Interplay between emerging technologies (intelligent reflecting surface, joint communication and sensing, AI) and their role towards trustworthy communication
  • Hardware security
  • Attack/defense modelling (active and jamming attacks, man-in-the-middle attacks, etc.)
  • Post-Quantum security and cryptography
  • Security challenges for AI/ML technologies
  • Security of space information systems
  • Optical wireless technology for secure connectivity
  • Security mechanisms for zero-energy devices
  • Security-aware access control
  • AI-based security solutions for wireless systems
  • Prototype, practical testbeds, and performance evaluation

SUBMISSION GUIDELINE

Authors are invited to submit original papers of up to 6 pages including figures, tables, and references, in PDF format. Submission implies that at least one of the authors will register and present the paper at the conference. Electronic submission is accepted through EDAS. Prospective authors are invited to submit original technical papers — up to 6 pages of length, for possible publication in IEEE ICC 2025 Conference Proceedings, which will be included in IEEE Digital Library.

The full call for paper can be found here.

Submission link: https://edas.info/N33197

KEYNOTE

Markus Dillinge received his Diplom-Ing. degree in telecommunications in 1990. In 1991, he joined the Mobile Network Division at Siemens for the development of cellular base stations. At Siemens times he led European research projects for mobile communications. In 2010, he joined Huawei Germany and was director for enterprise solutions for several sectors.

In September 2016, he was appointed as Executive Committee member for the 5GAA and re-assigned in following years. These 3 Executive Committee members are responsible for the 5GAA operation. He was the initiator of 5GAA and leads the Munich team for their technical contributions to Working Groups in 3GPP / 5GAA and for 5G evolution and to 6G.

Title:

Security and Trust in 6G Era:

The talk will evaluate different approaches of different studies and proposals for trust and security integration in 6G. The challenges for Native AI in 6G networks will play a pivotal role and the pillars for trust and trust worthiness need to agreed upon in a broad societal consensus before any technical implementation can be standardized. Significant research gaps remain to be addressed to answer many questions:  How to design a trust framework for 6G? How to provide trustworthy autonomous network operations with embedded intelligence ? How do we integrate diverse components into a trustworthy 6G ecosystem? In particular, the challenges of the automotive industry will be addressed, and early 5GAA discussions will be elaborated.

Georges Kaddoum  is a professor and the research director of the Resilient Machine Learning Institute (ReMI) at École de Technologie Supérieure (ÉTS), Université du Québec, Montréal, Canada. He also holds an industrial research chair and a Tier 2 Canada Research Chair. He earned his Ph.D. in Signal Processing and Telecommunications with High Honors from the National Institute of Applied Sciences (INSA), University of Toulouse, France, in 2009. His research focuses on wireless communication networks, tactical communications, resource allocation, and network security. 

Prof. Kaddoum is a member of the Royal Society of Canada and has received multiple prestigious recognitions. His awards include several Best Paper Awards, the Université du Québec Research Excellence Award (2018), the ÉTS Research Excellence Award (2019, 2025), the IEEE TCSC Award for Excellence (2022), the MITACS Award for Exceptional Leadership (2023), and the ADRIQ Partnership Award (2024). He has served as an associate editor for IEEE Transactions on Information Forensics and Security and IEEE Communications Letters. Currently, he is an area editor for IEEE Transactions on Machine Learning in Communications and Networking and an editor for IEEE Transactions on Communications.

Title :

Adversarial Threats in Machine Learning-Driven Wireless Networks: Challenges, Defenses, and Future Directions

Abstract: The adoption of machine learning (ML) across multiple layers of modern wireless communication networks has significantly improved efficiency, adaptability, and automation. However, this integration has also introduced new vulnerabilities to adversarial attacks, where malicious actors exploit ML models to degrade performance, misclassify signals, and disrupt critical network operations. In this talk, we will explore the growing threat of adversarial attacks targeting ML-based signal processing, resource allocation, and security protocols in wireless networks. We will discuss key challenges associated with defending ML-driven systems, state-of-the-art mitigation techniques—including Bayesian learning, robust training, and adaptive defense mechanisms—and highlight open research directions for developing resilient and secure intelligent communication frameworks. This presentation will provide insights into defense strategies, and future research opportunities at the intersection of adversarial ML and wireless network security.

 

ACKNOWLEDGMENT

We would like to thank members of the COST Action CA22168 for their participation in organizing this Workshop. This Workshop is also endorsed by one6G.