SCRN 2014 - International Workshop on Security in Cognitive Radio Networks
Topics/Call fo Papers
Security in cognitive radio networks is increasingly attracting the attention of researchers from both academia and industry, due to the open and dynamic nature of the cognitive networking architecture where various unknown and malicious devices could participate in the spectrum sensing and access, leading the legitimate cognitive users to be exposed to much more internal and external attacks than ever before. For example, cognitive radio is supposed to be capable of learning its surrounding environment and adapting its operating parameters to any changes in the radio environment, which, however, could be utilized by malicious users for illegal attacks. More specifically, the malicious users may emit interference signals to intentionally modify the radio environment in which the cognitive radio operates, misleading legitimate users and even compromising them or causing them to malfunction. It is thus of high importance to launch this workshop to identify and address the security vulnerabilities and risks in cognitive radio networks.
This workshop aims to serve as a venue to bring together researchers from academia and industry to identify and discuss technical challenges and recent results in cognitive radio security. The topics of interest include, but are not limited to:
Spectrum sensing attack and countermeasures
Spectrum access attack and countermeasures
Spectrum management attack and countermeasures
Denial-of-service attack modeling and analysis in cognitive radio networks
Eavesdropping attack modeling and analysis in cognitive radio networks
Byzantine attack modeling and analysis in cognitive radio networks
Information-theoretical secrecy capacity of cognitive transmissions
Tradeoff designs for secure and reliable cognitive radio networks
Cooperative relaying for cognitive radio security
Multiple antenna techniques for cognitive radio security
Beamforming techniques for cognitive radio security
Artificial noise design for cognitive radio security
Physical-layer security in cognitive radio networks
MAC layer vulnerabilities and counter measures
Cross-layer security design, implementation, and analysis
Emerging cognitive radio networking standards and the impact of cognitive radio security
Experimental results on cognitive radio security
Important Dates
Paper submission: June 20, 2014
Acceptance Notification: July 31, 2014
Camera-ready Paper Due: August 31, 2014
Workshop co-chairs
Prof. Yulong Zou, Nanjing University of Posts & Telecomm., China (yulong.zou-AT-njupt.edu.cn)
Prof. Chengwen Xing, Beijing Institute of Technology, China (chengwenxing-AT-ieee.org)
Prof. Feifei Gao, Tsinghua University, China (feifeigao-AT-tsinghua.edu.cn)
Prof. Zhu Han, University of Houston, Texas, USA (zhan2-AT-uh.edu)
This workshop aims to serve as a venue to bring together researchers from academia and industry to identify and discuss technical challenges and recent results in cognitive radio security. The topics of interest include, but are not limited to:
Spectrum sensing attack and countermeasures
Spectrum access attack and countermeasures
Spectrum management attack and countermeasures
Denial-of-service attack modeling and analysis in cognitive radio networks
Eavesdropping attack modeling and analysis in cognitive radio networks
Byzantine attack modeling and analysis in cognitive radio networks
Information-theoretical secrecy capacity of cognitive transmissions
Tradeoff designs for secure and reliable cognitive radio networks
Cooperative relaying for cognitive radio security
Multiple antenna techniques for cognitive radio security
Beamforming techniques for cognitive radio security
Artificial noise design for cognitive radio security
Physical-layer security in cognitive radio networks
MAC layer vulnerabilities and counter measures
Cross-layer security design, implementation, and analysis
Emerging cognitive radio networking standards and the impact of cognitive radio security
Experimental results on cognitive radio security
Important Dates
Paper submission: June 20, 2014
Acceptance Notification: July 31, 2014
Camera-ready Paper Due: August 31, 2014
Workshop co-chairs
Prof. Yulong Zou, Nanjing University of Posts & Telecomm., China (yulong.zou-AT-njupt.edu.cn)
Prof. Chengwen Xing, Beijing Institute of Technology, China (chengwenxing-AT-ieee.org)
Prof. Feifei Gao, Tsinghua University, China (feifeigao-AT-tsinghua.edu.cn)
Prof. Zhu Han, University of Houston, Texas, USA (zhan2-AT-uh.edu)
Other CFPs
- The Second IEEE ICCC International Workshop on Internet of Things (IOT 2014)
- International Workshop on Office Ergonomics
- International Workshop on Transforming research into insights for product design
- International Workshop on How to Design Great Products and Services
- International Workshop on Visual Analytics for Investigative Analysis
Last modified: 2014-05-06 23:31:23