of Wireless Sensor Networks
International Journal of Communication Networks and Information Security
(Indexed by INSPEC, Scirus, Open J-Gate and others)
http://ijcnis.kust.edu.pk/index
ISSN: 2073-607X
Overview:
This special issue is devoted to composite and integrated security solutions
of Wireless Sensor Networks (WSNs). In WSNs, researchers have so far focuses
on the individual aspects (cryptography, privacy or trust) of security that
are capable of providing protection against specific types of attacks.
However, efforts on achieving completeness via a composite and integrated
solution are lacking. That is ultimate necessary to attain because of its
wide applicability in various sensitive applications, such as health-care,
military, habitat monitoring etc.
Current research so far seems to intensively focus on the
cryptographic-based security aspects of WSNs. Many cryptographic-based
security solutions have been proposed such as SPINS, TinySec, and LEAP etc.,
but surprisingly less importance
is given to privacy and trust issues of WSNs. Later two aspects contribute
in increasing the degree of completeness and reliability of a security
solution. However, incorporating privacy and trust features in a security
solution is not an easy task. This is due to the fact that the WSNs
generally consist of large number of tiny sized sensor nodes. And they
operate in highly resource-constraint environment in which nodes have
limited memory, energy, and computation power. Thus, lightweight privacy and
trust management schemes are needed to ensure completeness and reliability
in the security solution of WSNs. The objective of this special issue is to
gather recent advances in the area of composite and integrated security
solutions of wireless sensor networks. This special issue covers topics that
include, but are not limited to:
• Adaptive and Intelligent Defense Systems
• Authentication and Access control
• Data security and privacy
• Denial of service attacks and countermeasures
• Identity, Route and Location Anonymity schemes
• Intrusion detection and prevention techniques
• Cryptography, encryption algorithms and Key management schemes
• Secure routing schemes
• Secure neighbor discovery and localization
• Trust establishment and maintenance
• Confidentiality and data integrity
• Security architectures, deployments and solutions
Schedule:
Manuscript due date: September 15, 2009 (extended deadline)
First round notification: November 15, 2009
Revised paper due: December 30, 2009
Notification of acceptance: January 30, 2010
Submission of final manuscript: February 15, 2010
Tentative Publication date: April/August 2010
Submission & Review Instruction:
The submitted papers must be written in English and describe original
research which is not published nor currently under review by other journals
or conferences. Author guidelines for preparation of manuscript can be found
at
http://ijcnis.kust.edu.pk/about/submissions#onlineSubmissions . For more
information, please contact the guest editors.
Guest Editors:
Riaz Ahmed Shaikh (Corresponding Editor)
Room 351, Department of Computer Engineering,
Kyung Hee University, Yogin-si, Gyeonggi-do, Korea
Off. Tel No: +82-31-201-2950
Email: riaz289@acm.org<http://us.mc560.mail.yahoo.com/mc/compose?to=riaz289@acm.org>,
riaz289@gmail.com<http://us.mc560.mail.yahoo.com/mc/compose?to=riaz289@gmail.com>
Al-Sakib Khan Pathan
Department of Computer Engineering
Kyung Hee University, Yogin-si, Gyeonggi-do, Korea
Off. Tel No: +82-31-201-2493
Email: sakib.pathan@gmail.com<http://us.mc560.mail.yahoo.com/mc/compose?to=sakib.pathan@gmail.com>,
spathan@ieee.org<http://us.mc560.mail.yahoo.com/mc/compose?to=spathan@ieee.org>
Jaime Lloret
Department of Communications
Polytechnic University of Valencia, Valencia, Spain
Off. Tel No: +34-60-954-9043
Email: jlloret@dcom.upv.es<http://us.mc560.mail.yahoo.com/mc/compose?to=jlloret@dcom.upv.es>
_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc
No comments:
Post a Comment