colleagues. Thanks!
-----------------------------------------------------------------------
CALL FOR PAPERS
Wiley's Security and Communication Networks Journal
Special Issue on Security in Mobile Wireless Networks
Security has become a primary concern in order to provide protected
communication in mobile networks. Unlike the wired networks, the unique
characteristics of mobile networks pose a number of nontrivial
challenges to security design, such as open peer-to-peer network
architecture, shared wireless medium, stringent resource constraints,
highly dynamic network topology and absence of a trusted infrastructure.
Ubiquitous roaming impacts on a radio access system by requiring that it
supports handover between neighbouring cells and different networks.
Also, mobile networks are more exposed to interferences than wired
networks. There are several components that contribute to this: adjacent
channels, co-channels, Doppler shifts, multipath, and fading.
This SI aims to identify and explore the different issues and challenges
related to security aspects in mobile networks. What are the impacts
(benefits or inconvenience) of mobility on security? What are the
appropriate mobility models to have a good level of security? Are
Classical IDS approaches appropriate for mobile environments? How can be
managed security when Mobility pattern and/or behaviour prediction?
Topics of Interest:
The complete security solution should span both layers, and encompass
all three security components of prevention, detection, and reaction.
Topics of interest include, but are not limited to, the following as
they relate to mobile networks:
- Secure mobile PHY/MAC protocols
- Secure mobile routing protocols
- Security under resource constraints (e.g., energy, bandwidth,
memory, and computation constraints)
- Performance and security tradeoffs in mobile networks
- Secure roaming across administrative domains
- Key management in mobile scenarios
- Cryptographic Protocols
- Authentication and access control in mobile networks
- Intrusion detection and tolerance in mobile network
- Trust establishment, negotiation, and management
- Secure mobile location services
- Secure clock distribution
- Privacy and anonymity
- Denial of service in mobile networks
- Prevention of traffic analysis
Important Dates:
Papers submission deadline: September 30, 2008
Notification of decisions: February 28, 2009
Final Manuscript Due: March 31, 2009
Publication: The 4th quarter of 2009
Instructions for Authors and Review Process:
Papers must represent high-quality and previously unpublished work.
Original research papers are solicited in all areas of Wireless and
Networks Security. All submissions will be peer reviewed by at least
three experts working in the areas.
The guidelines for prospective authors can be found on-line at
http://www.interscience.wiley.com/journal/security). Prospective authors
should submit their papers online at http://mc.manuscriptcentral.com/scn.
When submitting the papers, the authors should make sure to choose the
Manuscript type as "Special Issue", and enter the "Running Head" and the
"Special Issue title" as "SCN-SI-007" and "SecureMobile", respectively.
Guset Editors:
Abderrahim Benslimane, University of Avignon, France,
abderrahim.benslimane@univ-avignon.fr
Chadi Assi, Concordia University, Montreal, Canada, assi@ciise.concordia.ca
Stamatios V. Kartalopoulos, University of Oklahoma, USA,
kartalopoulos@ou.edu
Fred Nen-Fu Huang, National Tsing Hua University, Taiwan,
nfhuang@cs.nthu.edu.tw
_______________________________________________
Mycolleagues mailing list
Mycolleagues@grid.lrg.ufsc.br
http://grid.lrg.ufsc.br/mailman/listinfo/mycolleagues
No comments:
Post a Comment