CFP: IEEE Wireless Communications Magazine
Special Issue on Security and Privacy in Emerging Wireless Networks
http://www.comsoc.org/livepubs/pci/info/cfp/cfpwireless1010.htm
********************************************************************
(Apologies if you receive multiple copies of this message)
Rapid advances in wireless ad hoc networking have extended its application
from mobile ad hoc networks and wireless sensor networks to emerging
wireless networks including wireless mesh networks, delay-tolerant networks,
vehicular networks, and urban sensing networks. While facilitating
ubiquitous network access and also social interactions, these emerging
networks are particularly vulnerable to numerous privacy and security
threats. For example, attackers may jeopardize the privacy of users in
vehicular and urban sensing networks; the adversary may also compromise
selected nodes in a tactical delay-tolerant network and thus fail the
critical mission of the network. There is clearly an urgent need to protect
emerging wireless networks from various security and privacy threats,
thereby eliminating a major impediment to their widespread adoption of such
networks.
Scope of Contributions
This special issue is to disseminate cutting-edge research results,
highlight research challenges and open issues, and promote further research
interests and activities on security and privacy in emerging wireless
networks. We are more interested in contributions on wireless mesh networks,
delay-tolerant networks, vehicular networks, and urban sensing networks, but
we also welcome submissions related to mobile ad hoc networks and wireless
sensor networks. We seek original and unpublished contributions on topics
including, but not limited to:
- - Authentication and access control
- - Secure routing and MAC protocols
- - Privacy and anonymity
- - Secure localization
- - Secure time synchronization
- - Secure data aggregation
- - Secure location services
- - Key management
- - Intrusion detection and tolerance
- - Performance and security/privacy tradeoffs
- - Secure data storage and queries
- - Novel threats and attacks
- - Cross-layer security/privacy designs
- - Security and privacy under resource constraints
Submission Instructions
Articles should be tutorial in nature and should be written in a style
comprehensible to readers outside the specialty of the article. However,
papers presenting original contributions will also be considered, as long as
the presentation is accessible and the paper length is kept within the
appropriate limits. Articles should have no more than 4500 words, no more
than 6 tables/figures, and the abstract should have no more than 250 words.
With regard to both the content and formatting style of the submissions,
prospective contributors should follow the IEEE WCM guidelines for authors,
which can be found at:
http://www.comsoc.org/livepubs/pci/info/pub_guidelines.html. Authors should
submit a PDF format of their complete papers via the EasyChair Conference
Management System at http://www.easychair.org/conferences/?conf=wcmwisec10
Important Dates
Manuscript Submission: December 31, 2009
Acceptance Notification: May 1, 2010
Final Manuscript: June 1, 2010
Publication Date: October, 2010
Guest Editors
Guohong Cao
Professor
Department of Computer Science and Engineering
Pennsylvania State University, USA
gcao@cse.psu.edu
Jean-Pierre Hubaux
Professor
School of Computer and Communication Sciences
Ecole Polytechnique Fédérale de Lausanne (EPFL), Switzerland
jean-pierre.hubaux@epfl.ch
Yongdae Kim
Associate Professor
Department of Computer Science and Engineering
University of Minnesota, USA
kyd@cs.umn.edu
Yanchao Zhang
Assistant Professor
Department of Electrical and Computer Engineering
New Jersey Institute of Technology, USA
yczhang@njit.edu
_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc
--
=========================
Pietro Manzoni
http://www.disca.upv.es/pmanzoni
No hay comentarios:
Publicar un comentario