NGWNS 2014 : Handbook of Research on Next Generation Wireless Network Security and Privacy
Call For Papers
Call for Chapters: Handbook of Research on Next Generation Wireless Network Security and Privacy
Dr. Kamaljit I. Lakhtaria
Department of Computer Science & Engineering
Sir Padampat Singhania University
Udaipur - 313601, Rajasthan, India
Call for Chapters
Proposals Submission Deadline: March 30, 2014
Full Chapters Due: July 30, 2014
For release in the Advances in Information Security, Privacy, and Ethics (AISPE) Book Series.
The Advances in Information Security, Privacy, & Ethics (AISPE) Book Series is the source for this research, as the series provides only the most cutting-edge research on how information is utilized in the digital age.
Rapid advances in wireless communications and networking technologies are gradually making the dream of ubiquitous high-speed network access a reality. Next Generation Wireless Networks including communication networks Next Generation Networks (NGN), 3G, 4G, Long Term Evolution (LTE), Wireless LANs, PANs, WiMax, ad hoc networks, Mobile ad hoc networks (MANETs), Wireless Sensor Networks (WSNs). Unlike the wired networks, the unique characteristics of wireless networks pose a number of nontrivial challenges to security design, such as open peer-to-peer network architecture, shared wireless medium, stringent resource constraints, highly dynamic network topology, and absence of a trusted infrastructure. Ubiquitous roaming impacts on a radio access system by requiring that it supports handover between neighboring cells and different networks. Also, mobile networks are more exposed to interferences than wired networks. Such ubiquitous network access allows vandals and criminals to exploit vulnerabilities in networked systems on a widespread basis. This situation makes security and privacy designs for emerging wireless networks both critical and challenging. Security mechanism in wireless networks are indispensable to secure access control, authentication, authorization, confidentiality, data security, user confidentiality, quality of service and quality of experience for users. As a result, today research empowered towards wireless networks preserving trust, security and privacy at the same time.
This book looks to discuss research focuses on Next Generation Wireless Network security including network security, cryptography, user authentication, various types of attacks & their counter measures, secure routing algorithm, intrusion detection, security algorithms, performance analysis of various tools and proposed techniques, security issues, privacy management, smart phone application security, and key management.
Academicians, Research Supervisors, Researchers, Advanced level Students, Technology Developers and Corporate Organizations will find this Handbook useful for their Research, Advance Concept Study and Product Development. Topics in this Handbook will assist Researchers and technology developers to pertinent topics and assisting in their own research efforts in this field.
Contributors are welcome to submit chapters on the following topics relating to Next Generation wireless network security and privacy management:
Authentication Models in Next Generation Networks (NGNs)
Authorization Models in Next Generation Networks (NGNs)
Cross-layer design for trust, security and privacy in Next Generation wireless networks
Cryptographic Algorithms for Next Generation wireless networks Security
Economics of Next Generation wireless network security
Intrusion detection and tolerance in Next Generation Wireless Network
Key management in Next Generation wireless networks
Privacy management for Next Generation wireless networks
Research Models for Next Generation wireless networks security
Security challenges in Next Generation Wireless Networks
Secure roaming for Next Generation wireless communication networks
Secure Routing in Wireless Network
Security in ad-hoc networks (MANETs)
Security in Sensor Networks (WSNs)
Security in Wireless Private Networks
Threat and vulnerability analysis for wireless communication
Trust establishment, negotiation, and management in Wireless Networks
User Privacy Management in Wireless Networks
Wireless Network security protocols
Researchers and practitioners are invited to submit on or before March 30, 2014, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Submissions should be made through the link at the bottom of this page. Authors of accepted proposals will be notified by May 30, 2014 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by July 30, 2014. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the "Information Science Reference" (formerly Idea Group Reference), "Medical Information Science Reference," "Business Science Reference," and "Engineering Science Reference" imprints. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2016.
March 30, 2014: Proposal Submission Deadline
May 30, 2014: Notification of Acceptance
July 30, 2014: Full Chapter Submission
September 30, 2014: Review Results Returned
November 15, 2015: Final Chapter Submission
January 31, 2015: Final Deadline
Dr. Kamaljit I Lakhtaria
Sir Padampat Singhania University, Udaipur - 313601, Rajasthan, India
Tel.: (91) 98795 15909, E-mail: firstname.lastname@example.org