WISEC: Wireless Network Security

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2024 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
WISEC 2023 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks
May 29, 2023 - Jun 1, 2023 Guildford, Surrey, United Kingdom Nov 17, 2022
WiSec 2022 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks
May 16, 2022 - May 19, 2022 San Antonio, Texas, USA Feb 12, 2022
WiSec 2018 ACM Conference on Security and Privacy in Wireless and Mobile Networks
Jun 18, 2018 - Jun 20, 2018 Stockholm, Sweden Mar 1, 2018
WiSec 2016 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Jul 18, 2016 - Jul 20, 2016 Darmstadt, Germany Mar 4, 2016 (Feb 26, 2016)
WiSec 2015 The 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks (deadline extended)
Jun 22, 2015 - Jun 26, 2015 New York City, NY, USA Feb 17, 2015 (Feb 10, 2015)
WiSec 2014 ACM Conference on Security and Privacy in Wireless and Mobile Networks
Jul 21, 2014 - Jul 25, 2014 Oxford, United Kingdom Mar 10, 2014 (Mar 3, 2014)
WiSec 2013 The Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks
Apr 17, 2013 - Apr 19, 2013 Budapest, Hungary Nov 11, 2012
WiSec 2012 The Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks
Apr 16, 2012 - Apr 18, 2012 Tucson, Arizona, USA Dec 2, 2011
WiSec 2010 The Third ACM Conference on Wireless Network Security
Mar 22, 2010 - Mar 24, 2010 Hoboken, NJ, USA Sep 21, 2009
WISEC 2009 Second ACM Conference on Wireless Network Security
Mar 16, 2009 - Mar 18, 2009 Zurich, Switzerland Sep 22, 2008
WISEC 2008 First ACM Conference on Wireless Network Security
Mar 31, 2008 - Apr 2, 2008 Alexandria, VA, USA Sep 21, 2007
 
 

Present CFP : 2023

The 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2023)
will be held physically from May 29 to June 1, 2023 in Guildford, UK. It is planned to be a fully in-person event if the COVID-19 pandemic situation allows this. Otherwise, the conference will be moved to the virtual space.

ACM WiSec is the leading ACM and SIGSAC conference dedicated to all aspects of security and privacy in wireless and mobile networks and their applications. In addition to the traditional ACM WiSec topics of physical, link, and network layer security, we welcome papers focusing on the increasingly diverse range of mobile or wireless applications such as Internet of Things, Cyber-Physical Systems, as well as the security and privacy of mobile software platforms, usable security and privacy, biometrics, and cryptography.

Topics of interest for WiSec include the following, concerning systems in the next second list below:

- Confidentiality, integrity, availability
- Authentication, identity, authorization, access control models and policies, localization,
key management (agreement or distribution),
- Privacy of systems, devices, users, their locations and other attributes
- Exploitation of systems, including through reverse engineering, fuzzing, hardware or
software vulnerabilities, protocol vulnerabilities, side channels, fault injection, resource
exhaustion, jamming, or other means.
- Abuse of and through systems, including messaging abuse (spam, robocalls, etc.), theft
of service, and fraud
- Defenses for exploitation and abuse
- Experiences developing, testing, and deploying production-ready or large-scale secure
wireless systems
- Formal analysis, formal verification, and proof-based security approaches
- Information theoretical approaches for security
- Usable security and privacy, human factors
- Application of Machine Learning, e.g., for attack detection or privacy violations
- Economic and social impacts to security and privacy


Wireless and Mobile Systems of Interest include:
- Wireless networking protocols, for example: 802.11, Bluetooth, 802.15.4-based protocols, cellular air protocols including LTE and 5G-NR, Vehicle and industrial device protocols (e.g., LoRA), wireless for critical infrastructure (e.g., ADS-B, GPS, rail, satellites), NFC and smart payment applications
- Cryptographic primitives and protocols for wireless and mobile systems, including: WPA2, AKA, ...
- Wireless physical layer technologies: transmission, reception, modulation, localization, remote sensing (e.g., radar, mmWave sensing), jammers, dynamic spectrum reuse and cognitive radio systems
- Wireless and mobile device hardware and software, for example: embedded devices, wearables (e.g., watches), smartphones, mobile sensors, home and industrial automation devices (e.g., IoT, Smart Home, utilities, etc.), healthcare devices, vehicles (e.g., drones, automotive, avionics, satelites), and payment systems
- Wireless and mobile adjacent topics, including voice interfaces, visible light communications, sonic, underwater communications, legacy telecommunications, ...

The proceedings of ACM WiSec, sponsored by SIGSAC, will be published by the ACM.

## Important dates

Please note: in 2023, WiSec will introduce two rounds of submission deadlines. In previous years, WiSec has had a tradition of announcing deadline extensions. Due to the change in submission process, there will be no extensions this year.

- First submission round
- Paper submission deadline: November 17th, 2022 (23:59 AoE) (no extensions)
- Author notification: December 20th, 2022
- Camera-ready deadline: January 14th, 2023
- Second submission round
- Paper submission deadline: February 17th, 2023 (23:59 AoE) (no extensions)
- Author notification: March 29th, 2023
- Camera-ready deadline: April 17th, 2023
- WiSec conference: May 29th to June 1st, 2023

Papers rejected in the first round can be resubmitted to the second round. For such resubmissions, authors can choose to have the same reviewers and should provide a letter detailing revisions in that case.

Full, short, and SoK papers
---------------------
Full paper submissions to ACM WiSec 2023 can be up to 10 pages in the ACM conference style excluding the bibliography and well-marked appendices, and up to 12 pages in total. ACM WiSec also encourages the submission of short papers with a length of up to 6 pages (including bibliography and appendices), which describe mature work of a more succinct nature. All papers must be thoroughly anonymized for double-blind reviewing. Detailed submission instructions will be made available on the WiSec 2023 website.

In addition to regular papers that present novel contributions in the field, we solicit Systematization of Knowledge (SoK) papers that evaluate, systematize, and contextualize existing knowledge on any of the above topics. Suitable papers provide an important new viewpoint on an established research area, support or challenge long-held beliefs with compelling evidence, present a convincing new taxonomy of such an area, and/or identify research gaps with evidence and a structured approach. Survey papers without such contributions are not suitable. SoK submissions will be distinguished by the prefix "SoK:" in the title and a checkbox on the submission form. They can be up to 10 pages in the ACM conference style excluding the bibliography and well-marked appendices, and up to 15 pages overall. They will be reviewed by the program committee and held to the same standards as regular research papers, except instead of emphasizing novel research contributions the emphasis will be on value to the community. Accepted papers will be presented at the symposium and included in the proceedings.

Opinion papers
-----------------
ACM WiSec 2023 invites papers (ACM conference style, up to 3 pages excluding references) that present personal perspectives on all aspects of security and privacy in wireless and mobile networks.

Opinion papers could also criticize previous research or research directions, as well as highlight possible promising research directions. The opinions expressed in these papers are expected to be anyway corroborated by theoretical foundations, experiments, or experiences. Like the regular papers, the opinion papers will be reviewed by the WiSec Technical Program Committee. The selected opinion papers will be a part of the WiSec technical program and will be published in the conference proceedings. Opinion papers should be submitted using the same submission procedure adopted for the full papers. The title of these papers must have the prefix "OPINION: ".

Posters and demos
-----------------
WiSec will solicit submission of posters and demos. The instructions to submit posters/demos will be made available on the WiSec 2023 website.

Artifact Evaluation label
-------------------
In the spirit of open science, WiSec encourages authors of accepted papers to make software and data artifacts publicly available to the community.
Such artifacts will be evaluated by the artifact evaluation committee and corresponding papers will be granted an artifact evaluation label. While artifacts are optional, their availability will be positively considered during paper evaluation. Should the authors choose to submit their artifacts for evaluation, they should indicate their decision upon paper submission and follow the artifact submission guidelines in order to submit them upon paper acceptance. The detailed guidelines will be made available on the WiSec 2023 website.

Double submissions
------------------
It is a policy of the ACM to disallow double/simultaneous submissions, where the same (or substantially similar) paper is concurrently submitted to multiple conferences/journals. Any double submissions detected will be immediately rejected from all conferences/journals involved. Technical reports and pre-prints published online are allowed.

Workshops and Tutorial
------------------
ACM WiSec will host workshops/tutorials co-organized with the main conference. Details will be made available on the website.

Research Ethics
------------------
Ethical conduct of research is critical to ensuring the public trust and support of science. All submitted papers will be reviewed for ethical concerns, and if ethical practices were not followed a paper will be rejected regardless of any other merit. Ethical concerns vary from project to project, so there is no "one size fits all" approach. Rather, researchers should consider ethical analysis to be an integral part of the research, just as evaluation and method design are. Ethics should be considered early in a project, during a project, and as the project is prepared for publication.

While every situation is unique, there are principles that researchers should consider and apply during their projects. The Menlo Report provides guidance and examples for network security. Principally, all research should embody the concepts of beneficence, justice, respect for persons, and respect of law and public interest. This is just as true for technical research as human subjects research. For example, if it is possible that a research method could cause harm to systems or users (e.g., testing jamming) researchers should explicitly detail the measures taken to prevent harm.

Research ethics is also paramount in any study that could be classified as "human subjects." For WiSec, "human subject research" is defined as "research that involves interaction with identifiable humans or analysis of datasets containing data from one or more identifiable living humans." Researchers are expected to follow the laws and common practices regarding human subjects review of their relevant jurisdictions and institutions. For example, researchers in the United States must undergo review by an Institutional Review Board (IRB) before beginning human subjects research. Authors doing human subjects research should mention the review standards in their jurisdictions and if they were met.

Computer security and privacy research often studies and even advances tools and techniques with the capacity to harm others. In their submission, authors must convince reviewers that appropriate steps were taken to disclose newly discovered vulnerabilities to appropriate parties

Policy for Peer-Review Integrity
------------------
All SIGSAC sponsored conferences and workshops are required to follow ACM policies against harassment activities (https://www.acm.org/about-acm/policy-against-harassment) and ACM Code of Ethics and Professional Conduct (https://www.acm.org/code-of-ethics). Also all authors, PC members and non-PC reviewers are required to follow ACM Publications Policies (https://www.acm.org/publications/policies/toc). Particularly, we require all reviewers to uphold the integrity of the peer review process and avoid conflict of interest of any form (e.g., reviewer collusion ring). Those who violate these policies will be penalized according to ACM policies (https://www.acm.org/publications/policies/penalties-for-publication-violations). If you would like to report a violation, please contact program chairs of your conferences/workshops or SIGSAC officers. We are committed to protecting the confidentiality of your communication.
 

Related Resources

FNC 2023   The 18th International Conference on Future Networks and Communications
EICC 2023   European Interdisciplinary Cybersecurity Conference (EICC 2023)
blockchain_ml_iot 2023   Network (MDPI) Special Issue - Blockchain and Machine Learning for IoT: Security and Privacy Challenges
SI on ATD&IS II 2023   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI
IEEE/ACM ASONAM 2023   The 2023 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
CAIML 2023   4th International Conference on Artificial Intelligence and Machine Learning
EAI ADHOCNETS 2023   14th EAI International Conference on Ad Hoc Networks
NeTCoM 2023   15th International Conference on Networks & Communications
NCWMC 2023   8th International Conference on Networks, Communications, Wireless and Mobile Computing
IJASA 2023   The International Journal of Ambient Systems and applications