ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Securenets 2011 - Securenets 2011 1st International ICST Workshop on Secure Wireless Networks

Date2011-05-20

Deadline2010-11-05

VenueParis, France France

Keywords

Websitehttp://www.valuetools.org/2011

Topics/Call fo Papers

Securenets 2011

1st International ICST Workshop on Secure Wireless Networks

May 20, 2011. Ecole Normale Supérieure de Cachan (South of Paris), France

Scope

The issues of privacy and security in wireless communication networks have taken on an increasingly important role as these networks continue to flourish worldwide. Traditionally, security is viewed as an independent feature addressed above the physical-layer and all widely used cryptographic protocols are designed and implemented assuming the physical-layer has already been established and provides an error free link. Therefore, there has been a recent attention on studying the fundamental ability of the physical-layer to provide secure wireless communications. Physical-layer security is an emerging research area that explores the possibility of achieving perfect-secrecy data transmission among intended network nodes, while possible malicious nodes that eavesdrop the communication obtain zero information. The breakthrough concept behind wireless physical-layer security is to exploit the characteristics of the wireless channel for improving the reliability of wireless transmissions The objective of the workshop is to stimulate interest for research in practical and theoretical aspects of physical-Layer security. The workshop will include one keynote lecture and a panel discussion to understand the applicability of the techniques in future wireless systems.

Workshop Topics

Solicited topics encompass all aspects of game-theoretical analysis as it applies to communication networks including (but not limited to) the following areas:
Opportunistic secrecy
The wiretap channel with feedback
Authentication over the wiretap channel
Information theoretic secrecy of fading channels
Secrecy through public discussion
Wireless key distribution
Multi-user channels with secrecy constraints
MIMO wiretap channels
Relay-eavesdropper channel
Scheduling for secure communications
Game theoretic approaches for secrecy
Codes for secure transmission
Secure compression
Cognitive approaches for secrecy

Last modified: 2010-09-19 10:35:14