ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

TrustWSN 2015 - International Workshop on Trust and Security in Wireless Sensor Networks

Date2015-08-20 - 2015-08-22

Deadline2015-04-15

VenueHelsinki, Finland Finland

Keywords

Websitehttps://research.comnet.aalto.fi/Trustco...

Topics/Call fo Papers

Wireless networks have experienced an explosive growth during the last few years. Nowadays, there is a large variety of networks spanning from the well-known cellular networks to non-infrastructure wireless networks such as mobile ad hoc networks and sensor networks. Communication security is essential to the success of wireless sensor network applications, especially for those mission-critical applications working in unattended and even hostile environments. However, providing satisfactory security protection in wireless sensor networks has ever been a challenging task due to various network & resource constraints and malicious attacks.
This Special Issue, we concentrate mainly on Trust and Security as well as the emerging applications of Wireless Sensor Network. Its aims to bring together researchers and practitioners from wireless and sensor networking, security, cryptography, and distributed computing communities, with the goals of promoting discussions and collaborations. We are interested in novel research on all aspects of security in wireless sensor networks and tradeoff between security and performance such as QoS, dependability, scalability, etc.
Scope and Interests
Topics covering industrial issues/applications and academic research into Trust and Security in Wireless Sensor Networks will be included, but not limited to:
Attacks and Countermeasures
Authentication and Access Control
Computer-Aided Tool for Security
Cross-layer Design for Security
Cryptographic Protocol
Key Management
Information Hiding
Intrusion Detection and Response
Malicious Behavior Detection and Analysis
Privacy and Anonymity
Secure Localization and Synchronization
Security and Performance tradeoff
Security Policy and Enforcement Issues
Security Protocols Analysis, Design, and Proof
Secure Routing/MAC
Surveillance and Monitoring
Trust Establishment and Management
Submission and Publication Instructions
Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 8 pages, including tables, figures, references and appendixes, in IEEE Computer Society proceedings format with Portable Document Format (.pdf). Please submit your paper here. Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. Selected best papers will be published in high quality international journals.

Last modified: 2015-01-20 23:30:08