CRESS 2014 - First International Workshop on Cognitive Radio and Electromagnetic Spectrum Security
Topics/Call fo Papers
The First International Workshop on Cognitive Radio and Electromagnetic Spectrum Security (CNS-CRESS 2014)
In conjunction with 2014 IEEE Conference on Communications and Network Security (IEEE CNS 2014)
29 October 2014, San Francisco, CA, USA
PDF Version (360 kb)
Cognitive radio enables access to broader pools of spectrum and more efficient utilization of current wireless resources and thus plays a key role for the next generation of mobile broadband. Legacy static spectrum allocation, although simple, poses a major obstacle for efficient use of limited wireless resources across time, space, and frequency. This challenge has promoted substantial research and development into cognitive radio technologies with network-level perception, learning, adaptation, and optimization for efficient spectrum utilization. In fact, the latest advances in cognitive radio technology have already started to appear in numerous military and public safety applications, connected vehicle prototypes, and cellular telephony deployments such as 4G LTE-Advanced, e.g., Self-Organizing Network (SON) engines. However, the autonomous manner in which cognitive radio systems make decisions fora wide range of wireless communications and networking functions, as well as its total dependency on environmental sensory information in order to reach these decisions, makes this technology highly susceptible to attack by a malicious, external entity. At the same time, research activities into identifying potential vulnerabilities in cognitive radio technology and developing robust countermeasures to mitigate these attacks is only now beginning to increase. Consequently, the purpose of this workshop is to bring together members of the cognitive radio and electromagentic spectrum security community from around the world in order for them to share the latest research findings in this emerging and critical area, as well as exchange ideas and foster research collaborations, in order to further advance the state-of-the-art in security techniques, architectures, and algorithms for cognitive radio communications and networks. Topics of interests include (but are not limited to) the following:
General security architecture for CR networks
Cross-layer security design of CR networks
Secure routing in multi-hop CR networks
Physical layer security for CR networks
Geo-location for security in CR networks
Defending and mitigating jamming-based DoS attacks in CR networks
Defending against energy depletion attacks in resource-constrained CR networks
Attack modeling, prevention, mitigation, and defense in CR systems
Primary user emulation attacks and countermeasures
Authentication methods of primary users
Spectrum sensing data falsification and countermeasures
Spectrum misusage and selfish misbehaviors and countermeasures
Unauthorized use of spectrum bands and countermeasures
Methods for detecting, isolating and expelling misbehaving cognitive nodes
Eavesdropping attack modeling and analysis in cognitive radio
Security policies, standards and regulations for CR networks
Implementation and testbed for security evaluation in CR systems
Information-theoretical secrecy capacity of cognitive transmissions
Privacy protection in CR networks
Security issues for database-based CR networks
Security in CR networks for the smart grid
Intrusion detection systems in CR networks
Truthful Spectrum Auctions
Important Dates:
Paper Submission Deadline: 1 June 2014
Paper Acceptance Notification: 1 July 2014
Camera-Ready Paper Submission (Accepted & Invited): 11 July 2014
Workshop Event: 29 October 2014
Paper Submission Instructions:
Manuscript Format: All paper submissions should follow the IEEE 8.5″ x 11″ two-column format. Paper submissions can have 10 pages plus up to 2 over-length pages. If the paper is accepted for publication, an over-length fee will be charged to each of the over-length pages, at $200 per page in the final camera-ready version.
Electronic Submission: Submission URL to be provided
IEEE and IEEE Communications Society Policies: To ensure appropriate consideration of conflicts of interest during the review process, the ComSoc prohibits changes to the list of authors once a paper has been submitted for review during review, revision, or (if accepted) final publication. The author list may be changed only prior to the submission deadline.
Additional paper submittal instructions can be found on the conference web site http://www.ieee-cns.org/.
To be published in the IEEE CNS 2014 Conference Proceedings and submitted to IEEE Xplore®, an author of an accepted paper is required to register for the workshop at the full (member or non-member) rate and the paper must be presented by an author of that paper at the conference unless the Workshop Chair grants permission for a substitute presenter.
Non-refundable registration fees must be paid prior to uploading the final IEEE formatted, publication-ready version of the paper. For authors with multiple accepted papers, one full registration is valid for up to 3 papers. Accepted and presented papers will be published in the IEEE CNS 2014 conference proceedings and submitted to IEEE Xplore®.
Organizing Committee:
Workshop Chairs
Xiuzhen (Susan) Cheng, George Washington University, cheng-AT-gwu.edu
Yalin E. Sagduyu, Intelligent Automation Inc., ysagduyu-AT-i-a-i.com
Yi Shi, Intelligent Automation Inc., yshi-AT-i-a-i.com
Shabnam Sodagari, Oblon LLP, shabnam-AT-ieee.org
Alexander M. Wyglinski, Worcester Polytechnic Institute, alexw-AT-wpi.edu
In conjunction with 2014 IEEE Conference on Communications and Network Security (IEEE CNS 2014)
29 October 2014, San Francisco, CA, USA
PDF Version (360 kb)
Cognitive radio enables access to broader pools of spectrum and more efficient utilization of current wireless resources and thus plays a key role for the next generation of mobile broadband. Legacy static spectrum allocation, although simple, poses a major obstacle for efficient use of limited wireless resources across time, space, and frequency. This challenge has promoted substantial research and development into cognitive radio technologies with network-level perception, learning, adaptation, and optimization for efficient spectrum utilization. In fact, the latest advances in cognitive radio technology have already started to appear in numerous military and public safety applications, connected vehicle prototypes, and cellular telephony deployments such as 4G LTE-Advanced, e.g., Self-Organizing Network (SON) engines. However, the autonomous manner in which cognitive radio systems make decisions fora wide range of wireless communications and networking functions, as well as its total dependency on environmental sensory information in order to reach these decisions, makes this technology highly susceptible to attack by a malicious, external entity. At the same time, research activities into identifying potential vulnerabilities in cognitive radio technology and developing robust countermeasures to mitigate these attacks is only now beginning to increase. Consequently, the purpose of this workshop is to bring together members of the cognitive radio and electromagentic spectrum security community from around the world in order for them to share the latest research findings in this emerging and critical area, as well as exchange ideas and foster research collaborations, in order to further advance the state-of-the-art in security techniques, architectures, and algorithms for cognitive radio communications and networks. Topics of interests include (but are not limited to) the following:
General security architecture for CR networks
Cross-layer security design of CR networks
Secure routing in multi-hop CR networks
Physical layer security for CR networks
Geo-location for security in CR networks
Defending and mitigating jamming-based DoS attacks in CR networks
Defending against energy depletion attacks in resource-constrained CR networks
Attack modeling, prevention, mitigation, and defense in CR systems
Primary user emulation attacks and countermeasures
Authentication methods of primary users
Spectrum sensing data falsification and countermeasures
Spectrum misusage and selfish misbehaviors and countermeasures
Unauthorized use of spectrum bands and countermeasures
Methods for detecting, isolating and expelling misbehaving cognitive nodes
Eavesdropping attack modeling and analysis in cognitive radio
Security policies, standards and regulations for CR networks
Implementation and testbed for security evaluation in CR systems
Information-theoretical secrecy capacity of cognitive transmissions
Privacy protection in CR networks
Security issues for database-based CR networks
Security in CR networks for the smart grid
Intrusion detection systems in CR networks
Truthful Spectrum Auctions
Important Dates:
Paper Submission Deadline: 1 June 2014
Paper Acceptance Notification: 1 July 2014
Camera-Ready Paper Submission (Accepted & Invited): 11 July 2014
Workshop Event: 29 October 2014
Paper Submission Instructions:
Manuscript Format: All paper submissions should follow the IEEE 8.5″ x 11″ two-column format. Paper submissions can have 10 pages plus up to 2 over-length pages. If the paper is accepted for publication, an over-length fee will be charged to each of the over-length pages, at $200 per page in the final camera-ready version.
Electronic Submission: Submission URL to be provided
IEEE and IEEE Communications Society Policies: To ensure appropriate consideration of conflicts of interest during the review process, the ComSoc prohibits changes to the list of authors once a paper has been submitted for review during review, revision, or (if accepted) final publication. The author list may be changed only prior to the submission deadline.
Additional paper submittal instructions can be found on the conference web site http://www.ieee-cns.org/.
To be published in the IEEE CNS 2014 Conference Proceedings and submitted to IEEE Xplore®, an author of an accepted paper is required to register for the workshop at the full (member or non-member) rate and the paper must be presented by an author of that paper at the conference unless the Workshop Chair grants permission for a substitute presenter.
Non-refundable registration fees must be paid prior to uploading the final IEEE formatted, publication-ready version of the paper. For authors with multiple accepted papers, one full registration is valid for up to 3 papers. Accepted and presented papers will be published in the IEEE CNS 2014 conference proceedings and submitted to IEEE Xplore®.
Organizing Committee:
Workshop Chairs
Xiuzhen (Susan) Cheng, George Washington University, cheng-AT-gwu.edu
Yalin E. Sagduyu, Intelligent Automation Inc., ysagduyu-AT-i-a-i.com
Yi Shi, Intelligent Automation Inc., yshi-AT-i-a-i.com
Shabnam Sodagari, Oblon LLP, shabnam-AT-ieee.org
Alexander M. Wyglinski, Worcester Polytechnic Institute, alexw-AT-wpi.edu
Other CFPs
- IEEE CNS 2014 Workshop on Physical-layer Methods for Wireless Security
- Theory and Applications of Nature-Inspired Optimization Algorithms
- ACM International Workshop on Serious Games
- The 3rd ACM Int'l Regular and Data Challenge Workshop on Multimedia Analysis for Ecological Data
- RIT Cross-Media Innovation Center (CMIC) Summit 2014
Last modified: 2014-04-09 11:08:00