posted by organizer: mandreoni || 3824 views || tracked by 1 users: [display]

USWC 2022 : Unconventional Security for Wireless Communications (USWC)

FacebookTwitterLinkedInGoogle

Link: https://www.tii.ae/workshop/uswc
 
When Oct 3, 2022 - Oct 3, 2022
Where Linz/Austria
Submission Deadline Jun 1, 2022
Notification Due Jul 1, 2022
Final Version Due Aug 8, 2022
Categories    security   networking   wireless   communication
 

Call For Papers

Unconventional Security for Wireless Communications (USWC 2022): Call for Papers

------------------------------------------------------------------------------
The 1st Workshop on Unconventional Security for Wireless Communications
(UWSC 2022) -- https://www.tii.ae/workshop/uswc
Co-located with EWSN 2022 -- October 3, 2022
------------------------------------------------------------------------------

Recent advances in wireless communications have supported an increasingly interconnected world: from ultra high-throughput and scalable 5G Massive MIMO systems, to batteryless embedded sensor devices capable of running for years on limited or scavenged power. Behind these networks, the revolution in cloud computing has enabled softwarization of services and unprecedented global access to data. Governments and companies are leveraging these technologies in ways that ensure modern wireless communication networks increasingly permeate all aspects of our everyday lives: from managing power grids, to delivering your pizza.

Unfortunately, despite several recent high-profile cases of industrial espionage and embarrassing public data leaks, security is still often considered as an afterthought, even as everything from car journeys, to infrastructure monitoring, to delivering your pizza is increasingly automated. Even when security is prioritized, the pace of technological change and inherent novelty of use cases can expose unforeseen weaknesses – sometimes to dire consequences.

The Workshop on Unconventional Security in Wireless Communications (USWC) aims to bring together researchers from fields such as Networking, AI, ML, Telecoms, and Digital Security, and invites them to “think outside the box”. Not only on how wireless communications and networks should, and could, be secured, but how unconventional attacks may circumvent established security dogma. We welcome submissions with unusual takes on existing techniques, proposals for novel security solutions, exposure of atypical weaknesses, and the application of unconventional approaches to solve next-generation wireless security challenges.

UWSC provides a venue for researchers from diverse backgrounds to apply novel technologies and techniques in unusual and surprising ways – whether to solve current challenges, or expose inherent weaknesses. Above all, UWSC aims to be a forum for lively discussion and engaged debate on past, present, and future of communication security in an interconnected world.

*** Call for Papers ***
We invite researchers and practitioners from academia and industry to submit papers (up to 6 pages, double-column) focusing on topics such as:
- Wireless security for cyber-physical systems (e.g., factory automation).
- Wireless security for critical infrastructures (e.g., healthcare, smartgrid).
- AI / Machine Learning for malware and attack detection at the network layer.
- AI / Machine Learning assisted security and privacy, at the physical, MAC, or networking layers.
- Security protocols for wireless communications and networking.
- RF Jamming attacks and defenses for wireless networks.
- Localization and positioning privacy (GPS, UWB, BLE 5.2, etc.).
- Physical tracking security and privacy.
- Ultra low-power security for RF backscatter.
- Side-channel and fault attacks on multi-radio devices (e.g., LTE/Wi-Fi/BLE chipsets).
- Side-channel attacks on IoT devices (e.g., Dolphin Attack).
- Security and possible weaknesses in 6G cellular networks (3GPP, ETSI, IEEE, etc.).
- Reverse engineering of and tampering with wireless communications.
- Testbed and experimental platforms for wireless security.
- Resilience and dependability for wireless networks.
- Vehicular networks security (e.g., drones, automotive, avionics, autonomous driving).
- Security for UAV swarms (i.e., distributed, highly-mobile systems).
- Key management (agreement or distribution) for highly-mobile networks.
- Wireless network security in satellite systems.
- NFC and smart payment applications.
- Cryptography primitives and lightweight protocols for embedded IoT devices.
- Reconfigurable Intelligent Surfaces (RIS).
- Physical Layer Security based secret key generation schemes.
- Physical Unclonable Functions (PUFs).
- Theoretical and formal approaches for wireless security.
- Internet of the Things (IoT) security.
- Mobile Security.
- Cellular communication security.
- Adversarial Machine Learning and Unlearning for wireless communication.
- Smart Contracts and Blockchain for wireless communication.

In following with the theme of this workshop, we especially encourage submissions which aim to broaden the discussion outside of traditional security challenges and approaches. Examples could include, but are not limited to:
- Bio-inspired security solutions.
- Visual/movement-based security solutions.
- Security techniques based on multi-modal sensor fusion.
- Underwater communications security.
- Visual Light Communication (VLC)-based security.
- Quantum-based security.


Well reasoned arguments or preliminary evaluations are sufficient for this workshop.

*** Submission Instructions ***
Submitted papers must contain at most 6 pages (US letter, 9pt font size, double-column format, following the ACM master article template), including all figures, tables, and references. All submissions must be written in English and should contain the authors' names, affiliations, and contact information. The submission website is available at https://uswc2022.hotcrp.com/.

Accepted papers will be published in ACM as part of the EWSN 2022 proceedings. Authors of accepted papers are expected to present their work in a plenary session as part of the main workshop program.

*** Important Dates ***
Paper submission: June 1, 2022
Notification of acceptance: July 1, 2022
Camera-ready: August 8, 2022
Workshop day: October 3, 2022

*** Workshop Organizers ***
- Michael Baddeley (Technology Innovation Institute, UAE)
- Carol Fung (Concordia University, Canada)
- Aisha Kanwal Junejo (Imperial College London, UK)
- Martin Andreoni Lopez (Technology Innovation Institute, UAE)
- Willian Tessaro Lunardi (Technology Innovation Institute, UAE)
- Diogo Menezes Ferrazani Mattos (Fluminense Federal University, Brazil)

Related Resources

ICCNS 2024   ACM--2024 14th International Conference on Communication and Network Security (ICCNS 2024)
ACM-Ei/Scopus-CCISS 2024   2024 International Conference on Computing, Information Science and System (CCISS 2024)
ACM ICCNS 2024   ACM--2024 14th International Conference on Communication and Network Security (ICCNS 2024)
GreeNet Symposium - SGNC 2024   15th Symposium on Green Networking and Computing (SGNC 2024)
ACM ICNCC 2024   ACM--2024 The 13th International Conference on Networks, Communication and Computing (ICNCC 2024)
CSITY 2024   10th International Conference on Computer Science, Engineering and Information Technology
ICCC 2024   IEEE--2024 the 10th International Conference on Computer and Communications (ICCC 2024)
SPIE-Ei/Scopus-ITNLP 2024   2024 4th International Conference on Information Technology and Natural Language Processing (ITNLP 2024) -EI Compendex
ICCIP 2024   ACM--2024 10th International Conference on Communication and Information Processing (ICCIP 2024)
CSW 2024   2024 3rd International Conference on Cyber Security