ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

SelfNet 2016 - Workshop on Security in Self-Organizing Networks (SelfNet'16)

Date2016-09-21 - 2016-09-24

Deadline2016-04-30

VenueJaipur, India India

Keywords

Websitehttps://acn-conference.org/sscc2016/self...

Topics/Call fo Papers

In recent years huge number of new wireless applications have been developed and deployed to facilitate communication and to help people in their everyday lives. However, wireless networks are only as good as the information they produce. Due to the fact that individual nodes in the network communicate by radio, wireless self-organizing networks such as mobile ad-hoc networks (MANET), Wireless sensor networks (WSN), Wireless mesh networks (WMN), Vehicular ad-hoc networks (VANET) are inherently vulnerable to security attacks.
The main goal of International Workshop on Security in Self-Organizing Networks (SelfNet) is to bring together researchers and practitioners in an attempt to identify the fundamental security challenges and future prospects. Technical papers describing original, previously unpublished research, not currently under review, are solicited. The first two editons of SelfNet (2012 & 2014) were co-located with the International Conference on Security in Computer Networks and Distributed Systems (SNDS).
All papers that conform to submission guidelines will be peer reviewed and evaluated based on originality, technical and/or research content/depth, correctness, relevance to conference, contributions, and readability. Acceptance of papers will be communicated to authors by email. All accepted papers will be published in the Conference proceedings. Further instructions for submission are posted at http://acn-conference.org/sscc2016/submission.html
Topics of interest include but not limited to:
Authentication mechanisms
Capacity planning and admission control
Charging and secure payment
Cooperation and mitigating non-cooperative behavior
Cross-layer security
Cryptographic primitives for wireless communication
Security in Delay tolerant and Opportunistic networks
Economics of wireless security
Energy-efficient security protocols
Identity theft and phishing
Incentive-aware secure protocol design
Intrusion, attack and malicious behavior detection
Jamming and anti-jamming security protocols
Key management and trust establishment
Secure routing protocols
Monitoring and surveillance
Privacy and anonymity
Quantitative evaluation of wireless system security
Resilient virtual infrastructures
Secure localization and positioning
Secure PHY and MAC protocols
Security and performance tradeoff
Self-awareness and context-awareness
User and location privacy
Vulnerabilities, attacks and countermeasures
Wireless threat modeling and security analysis

Last modified: 2016-03-02 23:42:12