WiComSec-Phy 2015 - 2015 Workshop on Wireless Communication Security at the Physical Layer
Topics/Call fo Papers
As wireless systems become pervasive and are used to track and/or convey information to and about individuals, devices and products, security and privacy in these environments becomes of the utmost importance. These systems have always been a target for a number of different attacks that, more than often, are capable of breaching the security mechanisms implemented and threaten the reliability, safety and robustness of communications. Most of current solutions to these problems imply the use of sophisticated encryption or diversity techniques to fend off some types of attackers, such as eavesdroppers or jammers, but usually depend on a shared secret, which may be hard to establish in spontaneous and decentralized networks.
Physical-layer security is gaining interest as a means to provide an extra layer of security that does not depend on computational intractability of operations, but takes advantage of the inherent varying characteristics of wireless channels. While security at the physical-layer has its roots in early contributions from the 70s, wireless networks brought a renewed interest in this area by providing sources of advantage over an adversary eavesdropper from (a) a better signal quality due to the varying nature of wireless channels, (b) the use of cooperative relays or (c) friendly jammers to improve the signal quality of the legitimate receiver or cause interference to an eavesdropper that can possibly be removed at the legitimate receiver.
Accepted and presented papers will be included in the adjunct proceedings of the MobiQuitous Conference and will be accessible via the ACM digital library.
TOPICS
We solicit technical papers describing original, previously unpublished research, not currently under review by another conference or journal pertaining physical-layer security and how it can be used to strengthen next generation wireless communications, deemed crucial to the envisioned Internet of Things and the promise of ubiquitous and pervasive connectivity.
Topics of interest include, but are not limited to, the following:
Practical code designs for physical-layer security
Physical-layer security techniques for spontaneous/decentralized networks
Cooperative security in opportunistic and device-centric next generation wireless networks
Secure beamforming and interference generation/cancellation techniques
Physical-layer security techniques for large-scale/multi-user networks
Advanced signal processing techniques for physical-layer security
Secret key generation/agreement
Interdisciplinary approaches for security (game theory, stochastic geometry)
Routing, scheduling and power control for secure communications
Security, reliability and throughput-aware physical-layer security techniques
Implementation approaches and experimental validation
Physical-layer security is gaining interest as a means to provide an extra layer of security that does not depend on computational intractability of operations, but takes advantage of the inherent varying characteristics of wireless channels. While security at the physical-layer has its roots in early contributions from the 70s, wireless networks brought a renewed interest in this area by providing sources of advantage over an adversary eavesdropper from (a) a better signal quality due to the varying nature of wireless channels, (b) the use of cooperative relays or (c) friendly jammers to improve the signal quality of the legitimate receiver or cause interference to an eavesdropper that can possibly be removed at the legitimate receiver.
Accepted and presented papers will be included in the adjunct proceedings of the MobiQuitous Conference and will be accessible via the ACM digital library.
TOPICS
We solicit technical papers describing original, previously unpublished research, not currently under review by another conference or journal pertaining physical-layer security and how it can be used to strengthen next generation wireless communications, deemed crucial to the envisioned Internet of Things and the promise of ubiquitous and pervasive connectivity.
Topics of interest include, but are not limited to, the following:
Practical code designs for physical-layer security
Physical-layer security techniques for spontaneous/decentralized networks
Cooperative security in opportunistic and device-centric next generation wireless networks
Secure beamforming and interference generation/cancellation techniques
Physical-layer security techniques for large-scale/multi-user networks
Advanced signal processing techniques for physical-layer security
Secret key generation/agreement
Interdisciplinary approaches for security (game theory, stochastic geometry)
Routing, scheduling and power control for secure communications
Security, reliability and throughput-aware physical-layer security techniques
Implementation approaches and experimental validation
Other CFPs
Last modified: 2015-02-28 15:48:13