MobiPST 2012 - The 2nd Workshop on Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST)
Topics/Call fo Papers
The Second International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST 2012) will be held in conjunction with the 21th International Conference on Computer Communications and Networks (ICCCN 2012), in München, Germany. All papers presented in MobiPST 2012 will be published in the conference proceedings.
Outstanding papers will be invited to extend to full version for a special issue of Information - An International Interdisciplinary Journal (SCI(E)-indexed).
Scope and Topics
Recently, mobile wireless devices, such as wireless sensors, smart tags, smart pads, tablets, PDAs and smart phones, have become pervasive and attracted significant interests from academia, industry, and standard organizations. With the support of latest cloud computing technology, these mobile wireless devices will play a more and more important role in computing and communication systems. When these devices become pervasive, security, privacy and trust become critical components for the acceptance of applications build based on these devices. Moreover, several favourable characteristics of mobile and wireless devices, including portability, mobility, and sensitivity, further impose the challenge of security and privacy in those systems. Despite recent advances, many research issues still remain in the design of secure, privacy-preserving, or trust architectures, protocols, algorithms, services, and applications on mobile and wireless systems. For example, when mobile devices have more storage space, high bandwidth, and super sensing capability, more sensitive information will be stored in those devices. On the other hand, operating systems running on those devices are not as powerful and reliable as those on traditional computers. Both OS layer and higher-level layer protocols are expected to enhance the security and preserve the privacy of those devices. With more mobile devices being used in social networks and traditional web-based systems, novel trust models are essential for new applications. New cryptographic algorithms, key distribution schemes and access control policies are also encouraged by considering the special characteristics of mobile and wireless devices. With more and more attacks reported to mobile devices in last two years, threat detection and protection tools are highly expected to improve the security. Other issues such as malware, cyber threat, attack modeling, security analysis, identity management, attack tolerance, security recovery and anonymity techniques also need to be revisited in these critical systems.
This workshop aims to bring together the technologists and researchers who share interests in the area of security, privacy and trust in mobile and wireless systems, as well as explore new venues of collaboration. The main purpose is to promote discussions of research and relevant activities in the models and designs of secure, privacy-preserving, or trust architectures, protocols, algorithms, services, and applications, as well as analysis on cyber threat in mobile and wireless systems. It also aims at increasing the synergy between academic and industry professionals working in this area. We plan to seek papers that address theoretical, experimental research, and work in-progress for security, privacy and trust related issues in the context of mobile and wireless systems that include, but are not limited to, the following
Wireless Local Area Networks
Wireless Sensor Networks
Wireless Mesh Networks
Wireless Ad-hoc Networks
Vehicular Networks
Body-area Networks
Cellular Networks
Home Networks
Social Networks
Smart Grid
RFID-based Systems
Mobile Cloud
Cyber-Physical Systems
Internet of Things
Location-based Service Systems
http://ocu-stars.okcu.edu/ksha/mobipst2012.html
Important Dates
Paper submission due: March 9, 2012
Acceptance notification: April 25, 2012
Camera-ready due: May 10, 2012
Workshop: July 30 - August 2, 2012
Outstanding papers will be invited to extend to full version for a special issue of Information - An International Interdisciplinary Journal (SCI(E)-indexed).
Scope and Topics
Recently, mobile wireless devices, such as wireless sensors, smart tags, smart pads, tablets, PDAs and smart phones, have become pervasive and attracted significant interests from academia, industry, and standard organizations. With the support of latest cloud computing technology, these mobile wireless devices will play a more and more important role in computing and communication systems. When these devices become pervasive, security, privacy and trust become critical components for the acceptance of applications build based on these devices. Moreover, several favourable characteristics of mobile and wireless devices, including portability, mobility, and sensitivity, further impose the challenge of security and privacy in those systems. Despite recent advances, many research issues still remain in the design of secure, privacy-preserving, or trust architectures, protocols, algorithms, services, and applications on mobile and wireless systems. For example, when mobile devices have more storage space, high bandwidth, and super sensing capability, more sensitive information will be stored in those devices. On the other hand, operating systems running on those devices are not as powerful and reliable as those on traditional computers. Both OS layer and higher-level layer protocols are expected to enhance the security and preserve the privacy of those devices. With more mobile devices being used in social networks and traditional web-based systems, novel trust models are essential for new applications. New cryptographic algorithms, key distribution schemes and access control policies are also encouraged by considering the special characteristics of mobile and wireless devices. With more and more attacks reported to mobile devices in last two years, threat detection and protection tools are highly expected to improve the security. Other issues such as malware, cyber threat, attack modeling, security analysis, identity management, attack tolerance, security recovery and anonymity techniques also need to be revisited in these critical systems.
This workshop aims to bring together the technologists and researchers who share interests in the area of security, privacy and trust in mobile and wireless systems, as well as explore new venues of collaboration. The main purpose is to promote discussions of research and relevant activities in the models and designs of secure, privacy-preserving, or trust architectures, protocols, algorithms, services, and applications, as well as analysis on cyber threat in mobile and wireless systems. It also aims at increasing the synergy between academic and industry professionals working in this area. We plan to seek papers that address theoretical, experimental research, and work in-progress for security, privacy and trust related issues in the context of mobile and wireless systems that include, but are not limited to, the following
Wireless Local Area Networks
Wireless Sensor Networks
Wireless Mesh Networks
Wireless Ad-hoc Networks
Vehicular Networks
Body-area Networks
Cellular Networks
Home Networks
Social Networks
Smart Grid
RFID-based Systems
Mobile Cloud
Cyber-Physical Systems
Internet of Things
Location-based Service Systems
http://ocu-stars.okcu.edu/ksha/mobipst2012.html
Important Dates
Paper submission due: March 9, 2012
Acceptance notification: April 25, 2012
Camera-ready due: May 10, 2012
Workshop: July 30 - August 2, 2012
Other CFPs
- 1st Workshop on Cognitive and Resource-aware Wireless Communications (CRWC)
- Second Workshop on Cooperative Heterogeneous Networks (coHetNet)
- 1st Workshop on Flexibility in Broadband Wireless Access Network (FlexBWAN)
- 1st Workshop on Social Interactive Media Networking and Applications (SIMNA)
- The 2nd International Workshop on Context-aware QoS Provisioning and Management for Emerging Networks, Applications and Services (ContextQoS)
Last modified: 2011-12-23 23:40:27