* *
Call for Papers IEEE Workshop on Security and Privacy in Wireless Networks
(http://personal.stevens.edu/~ksubbala/CFP/SPAWN/spawn-08.htmhttp://personal.stevens.edu/%7Eksubbala/CFP/SPAWN/spawn-08.htm )
in
IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, (WoWMoM) 2008
(****NEW****: *Authors of **selected papers will be invited to expand their work into full length journal paper for submission to a special issue of the International Journal of Security and Networks** **(IJSN)****)*
*Organizers*
* *
Chair: K.P. (Suba) Subbalakshmi, Stevens Institute of Technology, USA
Co-Chair Yingying (Jennifer) Chen, Stevens Institute of Technology, USA
* *
*Call for Papers*
* *
Recent years have seen an increase in the number of wireless devices as well as number of applications that run on these devices. It is fairly common to expect to use these devices to check e-mails and stock quotes as well as pay bills on line. Given the sensitive nature of the information that is currently being exchanged over these networks, it is essential to make sure that high levels of security and privacy be maintained.
This workshop aims to bring together research work in the areas of security and privacy in wireless networks. The workshop aims to attract research work that not only address the major research issues involved in achieving a high level of security and privacy for existing applications, but also research work that envisages new applications for wireless networks and the security and privacy challenges unique to these applications.
The workshop solicits papers describing recent, unpublished research in the general areas of security and privacy in wireless networks. *Authors of **selected papers will be invited to expand their work into full length journal paper for submission to a special issue of the International Journal of Security and Networks** **(IJSN).* Details of the special issue will be published shortly. Example topics include:
- Cross-layer approaches to security - Mobile network security - Key exchange, distribution and management in ad-hoc/sensor networks - Location aware security in mobile networks - Security in large scale networks - Throughput-Security trade-offs in wireless networks - Secure group communications - Secure PHY/MAC/routing protocols - Distributed systems security - Secure cooperation in wireless networks - Pricing issues - Jamming and counter measures - Attacks on security and vulnerability analysis - Application layer encryption - Capacity and security analysis of covert channels - Light-weight cryptography and protocols - Ad hoc network security - Cognitive radio network security - Intrusion detection, localization, and avoidance - Key distribution and management - 3G, 4G security - Encryption standards - Power-reliability-security trade-offs in wireless networks
*Submission Information:*
Manuscripts must be limited to 6 pages in IEEE 8.5x11 conference format, and formatted using the IEEE Computer Society author guidelines. All submissions will be handled electronically. Accepted papers will be published by the IEEE Computer Society Press in the proceedings of the WoWMoM 2008 workshop.
*Important Dates*
Paper submission: February 20, 2008
Notification of Acceptance: March 20, 2008
Camera Ready Paper due: March 31, 2008