posted by user: kamaljitcfp || 1919 views || tracked by 4 users: [display]

NGWNS 2014 : Handbook of Research on Next Generation Wireless Network Security and Privacy


When Nov 15, 2014 - Nov 15, 2014
Where USA
Abstract Registration Due Mar 30, 2014
Submission Deadline Jul 30, 2014
Notification Due Sep 30, 2014
Final Version Due Nov 15, 2014
Categories    wireless network security   privacy   security management   next generation wireless nw

Call For Papers

Call for Chapters: Handbook of Research on Next Generation Wireless Network Security and Privacy

Dr. Kamaljit I. Lakhtaria
Department of Computer Science & Engineering
Sir Padampat Singhania University
Udaipur - 313601, Rajasthan, India

Call for Chapters
Proposals Submission Deadline: March 30, 2014
Full Chapters Due: July 30, 2014

For release in the Advances in Information Security, Privacy, and Ethics (AISPE) Book Series.

ISSN: 1948-9730

The Advances in Information Security, Privacy, & Ethics (AISPE) Book Series is the source for this research, as the series provides only the most cutting-edge research on how information is utilized in the digital age.

Rapid advances in wireless communications and networking technologies are gradually making the dream of ubiquitous high-speed network access a reality. Next Generation Wireless Networks including communication networks Next Generation Networks (NGN), 3G, 4G, Long Term Evolution (LTE), Wireless LANs, PANs, WiMax, ad hoc networks, Mobile ad hoc networks (MANETs), Wireless Sensor Networks (WSNs). Unlike the wired networks, the unique characteristics of wireless networks pose a number of nontrivial challenges to security design, such as open peer-to-peer network architecture, shared wireless medium, stringent resource constraints, highly dynamic network topology, and absence of a trusted infrastructure. Ubiquitous roaming impacts on a radio access system by requiring that it supports handover between neighboring cells and different networks. Also, mobile networks are more exposed to interferences than wired networks. Such ubiquitous network access allows vandals and criminals to exploit vulnerabilities in networked systems on a widespread basis. This situation makes security and privacy designs for emerging wireless networks both critical and challenging. Security mechanism in wireless networks are indispensable to secure access control, authentication, authorization, confidentiality, data security, user confidentiality, quality of service and quality of experience for users. As a result, today research empowered towards wireless networks preserving trust, security and privacy at the same time.

This book looks to discuss research focuses on Next Generation Wireless Network security including network security, cryptography, user authentication, various types of attacks & their counter measures, secure routing algorithm, intrusion detection, security algorithms, performance analysis of various tools and proposed techniques, security issues, privacy management, smart phone application security, and key management.

Target Audience
Academicians, Research Supervisors, Researchers, Advanced level Students, Technology Developers and Corporate Organizations will find this Handbook useful for their Research, Advance Concept Study and Product Development. Topics in this Handbook will assist Researchers and technology developers to pertinent topics and assisting in their own research efforts in this field.

Recommended Topics
Contributors are welcome to submit chapters on the following topics relating to Next Generation wireless network security and privacy management:

Authentication Models in Next Generation Networks (NGNs)
Authorization Models in Next Generation Networks (NGNs)
Cross-layer design for trust, security and privacy in Next Generation wireless networks
Cryptographic Algorithms for Next Generation wireless networks Security
Economics of Next Generation wireless network security
Intrusion detection and tolerance in Next Generation Wireless Network
Key management in Next Generation wireless networks
Privacy management for Next Generation wireless networks
Research Models for Next Generation wireless networks security
Security challenges in Next Generation Wireless Networks
Secure roaming for Next Generation wireless communication networks
Secure Routing in Wireless Network
Security in ad-hoc networks (MANETs)
Security in Sensor Networks (WSNs)
Security in Wireless Private Networks
Threat and vulnerability analysis for wireless communication
Trust establishment, negotiation, and management in Wireless Networks
User Privacy Management in Wireless Networks
Wireless Network security protocols

Submission Procedure
Researchers and practitioners are invited to submit on or before March 30, 2014, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Submissions should be made through the link at the bottom of this page. Authors of accepted proposals will be notified by May 30, 2014 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by July 30, 2014. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.

This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the "Information Science Reference" (formerly Idea Group Reference), "Medical Information Science Reference," "Business Science Reference," and "Engineering Science Reference" imprints. For additional information regarding the publisher, please visit This publication is anticipated to be released in 2016.

Important Dates
March 30, 2014: Proposal Submission Deadline
May 30, 2014: Notification of Acceptance
July 30, 2014: Full Chapter Submission
September 30, 2014: Review Results Returned
November 15, 2015: Final Chapter Submission
January 31, 2015: Final Deadline

Dr. Kamaljit I Lakhtaria
Sir Padampat Singhania University, Udaipur - 313601, Rajasthan, India

Tel.: (91) 98795 15909, E-mail:

Related Resources

ETHE Blearning 2017   Blended learning in higher education: research findings
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
TSEC-NextSecSociety 2017   Journal of Cyber Security Technology Special Issue on Secure Smart Society in Next Generation Networking Paradigm
AITIJ 2017   Advances in Interconnect Technologies: An International Journal
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
IWWCN 2017   3rd Annual International Workshop on Wireless Communication and Network
MathSJ 2017   Applied Mathematics and Sciences: An International Journal
iLRN 2018   Immersive Learning Research Network Conference (iLRN 2018) - Call for Papers
ICSS 2017   3rd International Conference on Software Security