******************************************************************** CFP: IEEE Wireless Communications Magazine Special Issue on Security and Privacy in Emerging Wireless Networks http://www.comsoc.org/livepubs/pci/info/cfp/cfpwireless1010.htm ******************************************************************** (Apologies if you receive multiple copies of this message)
Rapid advances in wireless ad hoc networking have extended its application from mobile ad hoc networks and wireless sensor networks to emerging wireless networks including wireless mesh networks, delay-tolerant networks, vehicular networks, and urban sensing networks. While facilitating ubiquitous network access and also social interactions, these emerging networks are particularly vulnerable to numerous privacy and security threats. For example, attackers may jeopardize the privacy of users in vehicular and urban sensing networks; the adversary may also compromise selected nodes in a tactical delay-tolerant network and thus fail the critical mission of the network. There is clearly an urgent need to protect emerging wireless networks from various security and privacy threats, thereby eliminating a major impediment to their widespread adoption of such networks.
Scope of Contributions
This special issue is to disseminate cutting-edge research results, highlight research challenges and open issues, and promote further research interests and activities on security and privacy in emerging wireless networks. We are more interested in contributions on wireless mesh networks, delay-tolerant networks, vehicular networks, and urban sensing networks, but we also welcome submissions related to mobile ad hoc networks and wireless sensor networks. We seek original and unpublished contributions on topics including, but not limited to:
- - Authentication and access control - - Secure routing and MAC protocols - - Privacy and anonymity - - Secure localization - - Secure time synchronization - - Secure data aggregation - - Secure location services - - Key management - - Intrusion detection and tolerance - - Performance and security/privacy tradeoffs - - Secure data storage and queries - - Novel threats and attacks - - Cross-layer security/privacy designs - - Security and privacy under resource constraints
Submission Instructions
Articles should be tutorial in nature and should be written in a style comprehensible to readers outside the specialty of the article. However, papers presenting original contributions will also be considered, as long as the presentation is accessible and the paper length is kept within the appropriate limits. Articles should have no more than 4500 words, no more than 6 tables/figures, and the abstract should have no more than 250 words. With regard to both the content and formatting style of the submissions, prospective contributors should follow the IEEE WCM guidelines for authors, which can be found at: http://www.comsoc.org/livepubs/pci/info/pub_guidelines.html. Authors should submit a PDF format of their complete papers via the EasyChair Conference Management System at http://www.easychair.org/conferences/?conf=wcmwisec10
Important Dates
Manuscript Submission: December 31, 2009 Acceptance Notification: May 1, 2010 Final Manuscript: June 1, 2010 Publication Date: October, 2010
Guest Editors
Guohong Cao Professor Department of Computer Science and Engineering Pennsylvania State University, USA gcao@cse.psu.edu
Jean-Pierre Hubaux Professor School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne (EPFL), Switzerland jean-pierre.hubaux@epfl.ch
Yongdae Kim Associate Professor Department of Computer Science and Engineering University of Minnesota, USA kyd@cs.umn.edu
Yanchao Zhang Assistant Professor Department of Electrical and Computer Engineering New Jersey Institute of Technology, USA yczhang@njit.edu _______________________________________________ Tccc mailing list Tccc@lists.cs.columbia.edu https://lists.cs.columbia.edu/cucslists/listinfo/tccc