posted by user: dbrawat || 5842 views || tracked by 11 users: [display]

Mobile and Wireless Communications 2013 : Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications

FacebookTwitterLinkedInGoogle

Link: http://people.eku.edu/rawatd/books/wireless/
 
When N/A
Where N/A
Abstract Registration Due Oct 30, 2012
Submission Deadline Jan 31, 2013
Notification Due Mar 15, 2013
Final Version Due May 15, 2013
Categories    wireless systems   mobile and wireless security   trust and privacy in wireless   resource allocation in wireles
 

Call For Papers

CALL FOR BOOK CHAPTERS

--------------------------------------------
Synopsis
--------------------------------------------

After successful deployment of Wi-Fi and cellular networks in the past decade, wireless and mobile communication systems became the fastest growing sectors of the communication industry. Almost all businesses which rely on wireless and mobile networks expect the same or the like level of security, privacy and trust as the ones that exist in wired networks to ensure the integrity and confidentiality of communications among terminals, networks, applications, and services. Security is of vital importance to ensure integrity of communications in wireless and mobile networks. Yet, it is very challenging to ensure security, privacy, trust and resource management because of the mobility of network nodes. The process of collecting and conveying wireless and mobile network security, privacy and trust knowledge is possible through the creation of a comprehensive book which provides current status and future trends on the topic. Unfortunately, such a collection of research on wireless and mobile network security/privacy/trust does not exist. The forthcoming book on Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications is devoted to putting together all the latest developments and rigorous studies of the foundations in these topics so that new breakthroughs and directions can be fostered. The contents of the book will provide state-of-the-art of research results and future trends related to security, privacy, trust and resource management in wireless and mobile networks including Wireless Personal Area Networks (WPANs), Wireless Local Area Networks (WLANs), Worldwide interoperable Microwave Access (WiMAX) networks, Wireless Wide Area Networks (WWANs), cellular networks, IP-based mobile networks and security issues in mobile apps and other emerging topics such as vehicular ad hoc networks, cognitive radios networks, wireless sensor networks, mobile ad hoc networks, healthcare and smart grid. This book will cover fundamental to advance concepts necessary for the grasp of current issues, challenges and solutions to future trends for wireless and mobile network in one place.

--------------------------------------------
Topics include (but are not limited to):
--------------------------------------------

This book will include (but will not be limited to) the following topics. Any other related topics in the area of wireless and mobile network security are also welcome.

- Resource Allocation in Mobile and Wireless Systems
- Privacy, Trust and Security Architectures and Protocols
- Resource Allocation and Interference Mitigation in Mobile and Wireless Systems
- Information Theoretic Approaches for Security and Resource Management
- Security, privacy, and resource management in Wireless Access Networks (WPAN, WLAN, WLL, etc.)
- Security, Privacy, and Resource Management in Broadband Wireless Technologies (HSDPA, HSUPA, LTE, WiMAX, WiRAN, etc.)
- Security and Resource Management in Mobile Telecommunication
- Security, Privacy, and Resource Management in IP-based Mobile Networks
- Security, Privacy, Trust and Resource Management in Mobil Ad hoc Networks, Vehicular Ad hoc Networks and Wireless Sensor Networks.
- Security and Privacy in Smart Grid Communications
- Security and Privacy issues with Mobile Applications
- Security, Privacy, Trust and Resource Allocation in Cognitive Radio Networks
- Security and Privacy in Next Generation Mobile Networks
- WAN/Internet Security
- Intrusion Detection System (IDS)/Intrusion Prevention System (IPS)
- Security and Privacy in E-Commerce, e-Business and e-Government and Enterprise
- Security in Collaboration Computing Systems
- Security, privacy, Trust and Resource Management in in Cloud and Cluster Computing Systems
- Security and Privacy in Mobile Cloud and Grid Computing
- Security, Privacy, Trust and Resource Management in Mobile Computing Systems
- Web and Web Services Security
- Cryptography for Wireless and Mobile Networks
- Cryptographic Protocols for Mobile and Wireless Networks
- Security and Privacy Models for Ambient Intelligence Environments
- Design and Analysis of Cryptographic Algorithms
- Location Privacy and Security
- Economics of Security and Privacy
- Security and Privacy in Pervasive/Ubiquitous Computing
- PHY/MAC/Routing/Transport/Application layer Protocols and Security
- Security, Privacy and Trust Management in Under Resource Constraints
- Security, Privacy and Resource Management in Underwater Communications
- Security and Resource Management in Satellite Communications
- Standardization, Testbbeds and Case Studies


--------------------------------------------
Submission Procedure:
--------------------------------------------

Researchers and practitioners are invited to submit on or before September 30, 2012, a 2-3 page chapter proposal clearly explaining the mission of his or her proposed chapter to db.rawat@ieee.org. Authors of accepted proposals will be notified by November 30, 2012 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by January 31, 2013. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.

--------------------------------------------
Full Book Chapter:
--------------------------------------------

Authors whose proposals are accepted will be required to submit a complete book chapter by January 31, 2013. A book chapter is required to be 15 to 25 pages (9,500 to 12,500 words).

--------------------------------------------
Important Dates:
--------------------------------------------

Proposal Submission Deadline: October 30, 2012
Notification of Acceptance: November 30, 2010
Full Chapter Submission: January 31, 2013
Review Results Returned: March 15, 2013
Final Chapter Submission: May 15, 2013
Anticipated Publication Date: Fall 2013


--------------------------------------------
Editorial Advisory Board Members:
--------------------------------------------

Akio Koyama, Yamagata University, Japan
Chotipat Pornavalai, King Mongkut's Institute of Technology Ladkrabang, Thailand
Farookh Khadeer Hussain, University of Technology, Sydney, Australia
Fatos Xhafa, Universitat Politècnica de Catalunya, Barcelona, Spain
Rajesh Kumar Sharma, Ilmenau University of Technology, Germany
Samiur Arif, Old Dominion University, USA
Shaharuddin Salleh, University Teknology Malaysia, Malaysia
Xu Li, Research scientist, Inria, France
Weiming Yang, Chongqing University, China


-------------------------------------------------------------------------
INQUIRIES and SUBMISSIONS can be forwarded electronically to the editor:
-------------------------------------------------------------------------

Danda B. Rawat, PhD (Corresponding Editor)
Eastern Kentucky University
521 Lancaster Ave, 307 Whalin
Richmond, KY 40475, USA
Tel.: +1 (859) 622- 6971
E-mail: db.rawat@ieee.org


Bhed B. Bista, PhD
Iwate Prefectural University
Takizawa, Iwate
Japan 020-0193
E-mail: bbb@iwate-pu.ac.jp


Gongjun Yan, PhD
Indiana University
Room Hunt Hall 206F
2300 S. Washington St
Kokomo, IN 46904, USA
E-mail: goyan@iuk.edu

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICCNS 2024   ACM--2024 14th International Conference on Communication and Network Security (ICCNS 2024)
PST 2024   The 21st Annual International Conference on Privacy, Security & Trust (PST2024)
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
S&P 2025   The 45th IEEE Symposium on Security and Privacy
EWSN 2024   International Conference on Embedded Wireless Systems and Networks
ICCC 2024   IEEE--2024 the 10th International Conference on Computer and Communications (ICCC 2024)
WiMob - CWN 2024   Eleventh International Workshop on Cooperative Wireless Networks (WiMob – CWN’24)
ACM ICCNS 2024   ACM--2024 14th International Conference on Communication and Network Security (ICCNS 2024)
ACM ICNCC 2024   ACM--2024 The 13th International Conference on Networks, Communication and Computing (ICNCC 2024)