ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

MWC 2013 - Mobile and Wireless Communications 2013 : Call for Book Chapter: Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications

Date2013-10-01

Deadline2012-10-30

VenueOnline, Online Online

Keywords

Websitehttps://people.eku.edu/rawatd/books/wireless/

Topics/Call fo Papers

After successful deployment of Wi-Fi and cellular networks in the past decade, wireless and mobile communication systems became the fastest growing sectors of the communication industry. Almost all businesses which rely on wireless and mobile networks expect the same or the like level of security, privacy and trust as the ones that exist in wired networks to ensure the integrity and confidentiality of communications among terminals, networks, applications, and services. Security is of vital importance to ensure integrity of communications in wireless and mobile networks. Yet, it is very challenging to ensure security, privacy, trust and resource management because of the mobility of network nodes. The process of collecting and conveying wireless and mobile network security, privacy and trust knowledge is possible through the creation of a comprehensive book which provides current status and future trends on the topic. Unfortunately, such a collection of research on wireless and mobile network security/privacy/trust does not exist. The forthcoming book on Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications is devoted to putting together all the latest developments and rigorous studies of the foundations in these topics so that new breakthroughs and directions can be fostered. The contents of the book will provide state-of-the-art of research results and future trends related to security, privacy, trust and resource management in wireless and mobile networks including Wireless Personal Area Networks (WPANs), Wireless Local Area Networks (WLANs), Worldwide interoperable Microwave Access (WiMAX) networks, Wireless Wide Area Networks (WWANs), cellular networks, IP-based mobile networks and security issues in mobile apps and other emerging topics such as vehicular ad hoc networks, cognitive radios networks, wireless sensor networks, mobile ad hoc networks, healthcare and smart grid. This book will cover fundamental to advance concepts necessary for the grasp of current issues, challenges and solutions to future trends for wireless and mobile network in one place.
Topics include (but are not limited to):
This book will include (but will not be limited to) the following topics. Any other related topics in the area of wireless and mobile network security are also welcome.
Resource Allocation in Mobile and Wireless Systems
Privacy, Trust and Security Architectures and Protocols
Resource Allocation and Interference Mitigation in Mobile and Wireless Systems
Information Theoretic Approaches for Security and Resource Management
Security, privacy, and resource management in Wireless Access Networks (WPAN, WLAN, WLL, etc.)
Security, Privacy, and Resource Management in Broadband Wireless Technologies (HSDPA, HSUPA, LTE, WiMAX, WiRAN, etc.)
Security and Resource Management in Mobile Telecommunication
Security, Privacy, and Resource Management in IP-based Mobile Networks
Security, Privacy, Trust and Resource Management in Mobil Ad hoc Networks, Vehicular Ad hoc Networks and Wireless Sensor Networks.
Security and Privacy in Smart Grid Communications
Security and Privacy issues with Mobile Applications
Security, Privacy, Trust and Resource Allocation in Cognitive Radio Networks
Security and Privacy in Next Generation Mobile Networks
WAN/Internet Security
Intrusion Detection System (IDS)/Intrusion Prevention System (IPS)
Security and Privacy in E-Commerce, e-Business and e-Government and Enterprise
Security in Collaboration Computing Systems
Security, privacy, Trust and Resource Management in in Cloud and Cluster Computing Systems
Security and Privacy in Mobile Cloud and Grid Computing
Security, Privacy, Trust and Resource Management in Mobile Computing Systems
Web and Web Services Security
Cryptography for Wireless and Mobile Networks
Cryptographic Protocols for Mobile and Wireless Networks
Security and Privacy Models for Ambient Intelligence Environments
Design and Analysis of Cryptographic Algorithms
Location Privacy and Security
Economics of Security and Privacy
Security and Privacy in Pervasive/Ubiquitous Computing
PHY/MAC/Routing/Transport/Application layer Protocols and Security
Security, Privacy and Trust Management in Under Resource Constraints
Security, Privacy and Resource Management in Underwater Communications
Security and Resource Management in Satellite Communications
Standardization, Testbbeds and Case Studies
Submission Procedure:
Researchers and practitioners are invited to submit on or before October 30, 2012, a 2-3 page chapter proposal clearly explaining the mission of his or her proposed chapter to db.rawat-AT-ieee.org. Authors of accepted proposals will be notified by November 30, 2012 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by January 31, 2013. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.

Last modified: 2012-10-26 23:43:16