posted by user: kamaljitcfp || 797 views || tracked by 5 users: [display]

NGWNS 2014 : Handbook of Research on Next Generation Wireless Network Security and Privacy

FacebookTwitterLinkedInGoogle

Link: http://www.igi-global.com/publish/call-for-papers/call-details/1279
 
When Nov 15, 2014 - Nov 15, 2014
Where USA
Abstract Registration Due Mar 30, 2014
Submission Deadline Jul 30, 2014
Notification Due Sep 30, 2014
Final Version Due Nov 15, 2014
Categories    wireless network security   privacy   security management   next generation wireless nw
 

Call For Papers

Call for Chapters: Handbook of Research on Next Generation Wireless Network Security and Privacy

Editors
Dr. Kamaljit I. Lakhtaria
Department of Computer Science & Engineering
Sir Padampat Singhania University
Udaipur - 313601, Rajasthan, India


Call for Chapters
Proposals Submission Deadline: March 30, 2014
Full Chapters Due: July 30, 2014

Introduction
For release in the Advances in Information Security, Privacy, and Ethics (AISPE) Book Series.

ISSN: 1948-9730

The Advances in Information Security, Privacy, & Ethics (AISPE) Book Series is the source for this research, as the series provides only the most cutting-edge research on how information is utilized in the digital age.

Rapid advances in wireless communications and networking technologies are gradually making the dream of ubiquitous high-speed network access a reality. Next Generation Wireless Networks including communication networks Next Generation Networks (NGN), 3G, 4G, Long Term Evolution (LTE), Wireless LANs, PANs, WiMax, ad hoc networks, Mobile ad hoc networks (MANETs), Wireless Sensor Networks (WSNs). Unlike the wired networks, the unique characteristics of wireless networks pose a number of nontrivial challenges to security design, such as open peer-to-peer network architecture, shared wireless medium, stringent resource constraints, highly dynamic network topology, and absence of a trusted infrastructure. Ubiquitous roaming impacts on a radio access system by requiring that it supports handover between neighboring cells and different networks. Also, mobile networks are more exposed to interferences than wired networks. Such ubiquitous network access allows vandals and criminals to exploit vulnerabilities in networked systems on a widespread basis. This situation makes security and privacy designs for emerging wireless networks both critical and challenging. Security mechanism in wireless networks are indispensable to secure access control, authentication, authorization, confidentiality, data security, user confidentiality, quality of service and quality of experience for users. As a result, today research empowered towards wireless networks preserving trust, security and privacy at the same time.



Objective
This book looks to discuss research focuses on Next Generation Wireless Network security including network security, cryptography, user authentication, various types of attacks & their counter measures, secure routing algorithm, intrusion detection, security algorithms, performance analysis of various tools and proposed techniques, security issues, privacy management, smart phone application security, and key management.

Target Audience
Academicians, Research Supervisors, Researchers, Advanced level Students, Technology Developers and Corporate Organizations will find this Handbook useful for their Research, Advance Concept Study and Product Development. Topics in this Handbook will assist Researchers and technology developers to pertinent topics and assisting in their own research efforts in this field.

Recommended Topics
Contributors are welcome to submit chapters on the following topics relating to Next Generation wireless network security and privacy management:

Authentication Models in Next Generation Networks (NGNs)
Authorization Models in Next Generation Networks (NGNs)
Cross-layer design for trust, security and privacy in Next Generation wireless networks
Cryptographic Algorithms for Next Generation wireless networks Security
Economics of Next Generation wireless network security
Intrusion detection and tolerance in Next Generation Wireless Network
Key management in Next Generation wireless networks
Privacy management for Next Generation wireless networks
Research Models for Next Generation wireless networks security
Security challenges in Next Generation Wireless Networks
Secure roaming for Next Generation wireless communication networks
Secure Routing in Wireless Network
Security in ad-hoc networks (MANETs)
Security in Sensor Networks (WSNs)
Security in Wireless Private Networks
Threat and vulnerability analysis for wireless communication
Trust establishment, negotiation, and management in Wireless Networks
User Privacy Management in Wireless Networks
Wireless Network security protocols


Submission Procedure
Researchers and practitioners are invited to submit on or before March 30, 2014, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Submissions should be made through the link at the bottom of this page. Authors of accepted proposals will be notified by May 30, 2014 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by July 30, 2014. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.

Publisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the "Information Science Reference" (formerly Idea Group Reference), "Medical Information Science Reference," "Business Science Reference," and "Engineering Science Reference" imprints. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2016.

Important Dates
March 30, 2014: Proposal Submission Deadline
May 30, 2014: Notification of Acceptance
July 30, 2014: Full Chapter Submission
September 30, 2014: Review Results Returned
November 15, 2015: Final Chapter Submission
January 31, 2015: Final Deadline

Inquiries
Dr. Kamaljit I Lakhtaria
Sir Padampat Singhania University, Udaipur - 313601, Rajasthan, India

Tel.: (91) 98795 15909, E-mail: kamaljit.ilakhtaria@gmail.com

Related Resources

IJCIS 2014   International Journal on Cryptography and Information Security
IJIT 2014   International Journal on Information Theory
IJANS 2014   International Journal on AdHoc Networking Systems
IJOE 2014   International Journal on Organic Electronics
ICNGCCT 2014   International Conference on Next Generation Computing and Communication Technologies
RSDA 2014   The 2nd IEEE International Workshop on Reliability and Security Data Analysis (co-located with ISSRE 2014)
ISMH 2015   Information Security Management Handbook, 2015 Edition
AISec 2014   7th ACM Workshop on Artificial Intelligence and Security
INTER-ENG 2014   The 8th International Conference on Interdisciplinarity in Engineering - Advanced technologies for the next-generation manufacturing processes
WSN-IOT 2014   Wireless Sensor Networks and the Internet of Things