CRESS 2017 - Third International Workshop on Cognitive Radio and Electromagnetic Spectrum Security (CRESS'17)
Topics/Call fo Papers
Legacy static spectrum allocation poses a major obstacle for efficient use of limited wireless resources across time, space, and frequency. Cognitive radio enables flexible access to broader pools of spectrum and more efficient utilization of current wireless resources to overcome this challenge and thus plays a key role for the next generation of mobile wireless networks. There are substantial research and development into cognitive radio technologies with network-level perception, learning, adaptation, and optimization for efficient spectrum utilization. In fact, the latest advances in cognitive radio technology have already started to appear in numerous public safety and military applications, connected vehicle prototypes, cellular telephony deployments, and 5G networks, e.g., Self-Organizing Network (SON) engines. However, the autonomous manner in which cognitive radio systems make decisions for a wide range of wireless communications and networking functions, as well as its total dependency on environmental sensory information in order to reach these decisions, makes this technology highly susceptible to attack by malicious entities. At the same time, research activities into identifying potential vulnerabilities in cognitive radio technology and developing robust countermeasures to mitigate these attacks is only now beginning to increase. Consequently, the purpose of this workshop is to bring together members of the cognitive radio and electromagnetic spectrum security community from around the world in order for them to share the latest research findings in this emerging and critical area, as well as exchange ideas and foster research collaborations, in order to further advance the state-of-the-art in security techniques, architectures, and algorithms for cognitive radio communications and networks.
Topics of interests include (but are not limited to) the following:
General security architecture for CR networks
Cross-layer security design of CR networks
Secure routing in multi-hop CR networks
Physical layer security for CR networks
Geo-location for security in CR networks
Defending and mitigating jamming-based DoS attacks in CR networks
Defending against energy depletion attacks in resource-constrained CR networks
Attack modeling, prevention, mitigation, and defense in CR systems
Primary user emulation attacks and countermeasures
Authentication methods of primary users
Spectrum sensing data falsification and countermeasures
Spectrum misusage and selfish misbehaviors and countermeasures
Unauthorized use of spectrum bands and countermeasures
Methods for detecting, isolating and expelling misbehaving cognitive nodes
Eavesdropping attack modeling and analysis in cognitive radio
Security policies, standards and regulations for CR networks
Implementation and testbed for security evaluation in CR systems
Information-theoretical secrecy capacity of cognitive transmissions
Privacy protection in CR networks
Security issues for database-based CR networks
Security in CR networks for the smart grid
Intrusion detection systems in CR networks
Truthful Spectrum Auctions
Paper submission
A 2-page extended abstract submissions must be written in English and must be formatted in standard IEEE 2-column format.
Only Adobe PDF files will be accepted for the review process. All submissions must be made through the EDAS peer review system at
https://edas.info/newPaper.php?c=23806
Important Dates
Abstract Submission Deadline: June 30, 2017
Acceptance Notification: July 31 2017
Camera-Ready Paper Submission: August 15 2017
Workshop Event: October 11, 2017
Topics of interests include (but are not limited to) the following:
General security architecture for CR networks
Cross-layer security design of CR networks
Secure routing in multi-hop CR networks
Physical layer security for CR networks
Geo-location for security in CR networks
Defending and mitigating jamming-based DoS attacks in CR networks
Defending against energy depletion attacks in resource-constrained CR networks
Attack modeling, prevention, mitigation, and defense in CR systems
Primary user emulation attacks and countermeasures
Authentication methods of primary users
Spectrum sensing data falsification and countermeasures
Spectrum misusage and selfish misbehaviors and countermeasures
Unauthorized use of spectrum bands and countermeasures
Methods for detecting, isolating and expelling misbehaving cognitive nodes
Eavesdropping attack modeling and analysis in cognitive radio
Security policies, standards and regulations for CR networks
Implementation and testbed for security evaluation in CR systems
Information-theoretical secrecy capacity of cognitive transmissions
Privacy protection in CR networks
Security issues for database-based CR networks
Security in CR networks for the smart grid
Intrusion detection systems in CR networks
Truthful Spectrum Auctions
Paper submission
A 2-page extended abstract submissions must be written in English and must be formatted in standard IEEE 2-column format.
Only Adobe PDF files will be accepted for the review process. All submissions must be made through the EDAS peer review system at
https://edas.info/newPaper.php?c=23806
Important Dates
Abstract Submission Deadline: June 30, 2017
Acceptance Notification: July 31 2017
Camera-Ready Paper Submission: August 15 2017
Workshop Event: October 11, 2017
Other CFPs
Last modified: 2017-06-04 20:37:07