WSNS'09 2009 - The Fifth IEEE International Workshop on Wireless and Sensor Networks Security (WSNS'09)
Topics/Call fo Papers
The Fifth IEEE International Workshop on Wireless and Sensor Networks Security (WSNS'09)
held in conjunction with
The Sixth IEEE International Conference on
Mobile Ad-hoc and Sensor Systems
October 12th, 2009
Macau SAR, P.R.C.
Theme and scope:
Wireless networks have experienced an explosive growth during the last few years. Nowadays, there is a large variety of networks spanning from the well-known cellular networks to non-infrastructure wireless networks such as mobile ad hoc networks and sensor networks. The security issue is a central concern for achieving secured communication in these networks. This workshops aims to bring together researchers and practitioners from wireless and sensor networking, security, cryptography, and distributed computing communities, with the goals of promoting discussions and collaborations. We are interested in novel research on all aspects of security in wireless and sensor networks and their cost-effective solutions.
Topics of interest:
We are seeking papers that describe original and unpublished contributions addressing various aspects of secured wireless/sensor networks. Topics of interest include, but are not limited to:
Â? Attacks and Countermeasures
Â? Authentication and Access Control
Â? Computer-Aided Tool for Security
Â? Cross-layer Design for Security
Â? Cryptographic Protocol
Â? Denial of Service (DoS)
Â? Key Management
Â? Information Hiding
Â? Intrusion Detection and Response Â? Malicious Behavior Detection and Analysis
Â? Privacy and Anonymity
Â? Secure Localization and Synchronization
Â? Security and Performance tradeoff
Â? Security Policy and Enforcement Issues
Â? Security Protocols Analysis, Design, and Proof
Â? Secure Routing/MAC
Â? Surveillance and Monitoring
Â? Trust Establishment and Management
Paper Submission:
Submit a full paper of about 6 pages (IEEE two column, single-spaced format), including figures and references, using 10 font size, and number each page. Each submitted paper will be peer reviewed and the comments will be provided to the authors. Accepted papers will be published in the conference proceedings of the MASS'09.
Use the Author Guidelines (http://www.cs.cityu.edu.hk/mass09/submitguide.shtm...). Prepare your papers in PDF file only (Adobe format), paper title, names, affiliations, postal address, and e-mail address of the authors, about 100-150 word abstract, and at most five keywords.
Please submit your paper to EDAS (http://edas.info/newPaper.php?c=7461). Submission of a paper should be regarded as an undertaking that, should the paper be accepted, at least one of the authors will attend the workshop to present the work. Following the convention of past MASS conferences, there will be NO workshop-only or workshop-specific registration. A full conference registration is needed and will include the ability to attend any workshop and regular conference session.
Important Dates:
Manuscript Submission: 5/22/2009
Acceptance Notification: 6/28/2009
Final Manuscript Due: 7/14/2009
held in conjunction with
The Sixth IEEE International Conference on
Mobile Ad-hoc and Sensor Systems
October 12th, 2009
Macau SAR, P.R.C.
Theme and scope:
Wireless networks have experienced an explosive growth during the last few years. Nowadays, there is a large variety of networks spanning from the well-known cellular networks to non-infrastructure wireless networks such as mobile ad hoc networks and sensor networks. The security issue is a central concern for achieving secured communication in these networks. This workshops aims to bring together researchers and practitioners from wireless and sensor networking, security, cryptography, and distributed computing communities, with the goals of promoting discussions and collaborations. We are interested in novel research on all aspects of security in wireless and sensor networks and their cost-effective solutions.
Topics of interest:
We are seeking papers that describe original and unpublished contributions addressing various aspects of secured wireless/sensor networks. Topics of interest include, but are not limited to:
Â? Attacks and Countermeasures
Â? Authentication and Access Control
Â? Computer-Aided Tool for Security
Â? Cross-layer Design for Security
Â? Cryptographic Protocol
Â? Denial of Service (DoS)
Â? Key Management
Â? Information Hiding
Â? Intrusion Detection and Response Â? Malicious Behavior Detection and Analysis
Â? Privacy and Anonymity
Â? Secure Localization and Synchronization
Â? Security and Performance tradeoff
Â? Security Policy and Enforcement Issues
Â? Security Protocols Analysis, Design, and Proof
Â? Secure Routing/MAC
Â? Surveillance and Monitoring
Â? Trust Establishment and Management
Paper Submission:
Submit a full paper of about 6 pages (IEEE two column, single-spaced format), including figures and references, using 10 font size, and number each page. Each submitted paper will be peer reviewed and the comments will be provided to the authors. Accepted papers will be published in the conference proceedings of the MASS'09.
Use the Author Guidelines (http://www.cs.cityu.edu.hk/mass09/submitguide.shtm...). Prepare your papers in PDF file only (Adobe format), paper title, names, affiliations, postal address, and e-mail address of the authors, about 100-150 word abstract, and at most five keywords.
Please submit your paper to EDAS (http://edas.info/newPaper.php?c=7461). Submission of a paper should be regarded as an undertaking that, should the paper be accepted, at least one of the authors will attend the workshop to present the work. Following the convention of past MASS conferences, there will be NO workshop-only or workshop-specific registration. A full conference registration is needed and will include the ability to attend any workshop and regular conference session.
Important Dates:
Manuscript Submission: 5/22/2009
Acceptance Notification: 6/28/2009
Final Manuscript Due: 7/14/2009
Other CFPs
- MeshTech 2009 Third IEEE International Workshop on Enabling Technologies and Standards for Wireless Mesh Networking
- Seventh IACR Theory of Cryptography Conference TCC 2010
- The 5th International Conference on Internet and Distributed Computing Systems (IDCS 2012)
- System Support for Ubiquitous Computing Workshop (UbiSys 2009)
- Cyber Security and Information Intelligence Research Minitrack (CSIIRM)
Last modified: 2010-06-04 19:32:22