posted by system || 4785 views || tracked by 5 users: [display]

SPINS 2015 : The 2nd International Workshop on Secure Peer-to-Peer Intelligent Networks & Systems

FacebookTwitterLinkedInGoogle

Link: http://staff.iium.edu.my/sakib/spins15/
 
When Jun 2, 2015 - Jun 5, 2015
Where London, United Kingdom
Submission Deadline Jan 10, 2015
Notification Due Mar 1, 2015
Final Version Due Mar 28, 2015
 

Call For Papers

Call for Papers

The 2nd International Workshop on Secure Peer-to-Peer Intelligent Networks & Systems (SPINS-2015)
In conjunction with ANT 2015, June 2-5, 2014, London, United Kingdom
URL: http://staff.iium.edu.my/sakib/spins15/

-- Overview

P2P (Peer-to-Peer) networking is contributing to a vast amount of Internet traffic because many Internet users heavily use or depend on file sharing applications like BitTorrent, PPStream, eDonkey, and so on. While these applications often make various types of soft resources (e.g., audio, video, game, music, e-books) easily available via the P2P model, the operational mechanism of the network also makes the system vulnerable to various kinds of security threats. Malicious peers may be often present in such architecture because of the inherent dependence on peers who should cooperate with each other. Attacks against P2P systems could be manifold; Distributed Denial-of-Service (DDoS) attack, injection of useless data (commonly termed as “poisoning”) into the network or pollution attack, identity theft, collusion attack, Sybil attack, etc. Due to the constant efforts of the high-profile hackers for breaching data and finding new methods of attacks, unmonitored P2P file-sharing systems have been threatened today with unparalleled magnitude. Sensitive information could easily be exposed, harvested, and distributed across multiple P2P networks, often with information of government or critical military facilities.

To detect malicious peers, which are responsible for the vast majority of attacks, some schemes use reputation of nodes while some are based on mutual certificates. Especially, in the recent days, social-networking-based certification has been proposed in which a simple strategy of “Friend of Friend” is applied taking a chunk of nodes in the network. This chunk structure could be expanded to cover some portion of the network. The idea is that a friend could certify and support another friend (i.e., here node). However, such kind of solution leaves many issues unanswered like privacy issues, scalability of the network, handling of non-participating node, resource scarcity among the socially networked nodes, and so on. Besides these efforts, intelligent and adaptive methods are being developed using artificial intelligence, fuzzy logic, game theory, and so on. The theme of peer-to-peer also covers various types of wireless ad hoc networks, which adds to the complexity of securing such networks. This workshop's objective is to provide a platform for the researchers and students to share their thoughts and findings on various security issues in P2P, wireless P2P, ad hoc networks and systems.

First edition of SPINS workshop was held in 2014 in conjunction with ANT'14 at Hasselt, Belgium.

-- Topics of Interest

In this workshop, our goal is to publish the latest advancements addressing the topic of security in P2P networks and systems, especially focused on malicious-peer detection based approaches and intelligent-adaptive approaches. Other issues may be blended with the security issues. The topics of interest are (though the list should not be considered exhaustive):

- Detecting malicious peers in P2P network
- Thwarting pollution attack or poisoning attack in P2P network
- Handling resource unavailability due to presence of malicious peers
- Trust management in P2P systems
- Social-networking based security management in P2P networks
- P2P vs Social networking security
- Intelligent and adaptive secure P2P systems
- Game theory based P2P system trust and security
- Defending against P2P data breaches
- Measuring evidence of cyber-criminal activity on P2P networks
- Wireless ad hoc peer to peer network security
- Peer-to-peer monitoring in wireless sensor networks

-- Submission Guidelines and Publication

Papers must be original, unpublished, and not under review elsewhere. Each paper will be reviewed by the experts in the relevant areas. Authors should submit their papers electronically in PDF format before the deadline (see Important Dates) via the EasyChair submission link mentioned on the workshop website.

If you have used this system before, you can use the same username and password. If this is your first time using EasyChair, you will need to register for an account by clicking "I have no EasyChair account" button. Upon completion of registration, you will get a notification email from the system and you are ready for submitting your paper. You can upload and re-upload the paper to the system by the submission due date.

All SPINS’15 accepted papers will be printed in the ANT-2015 conference proceedings published by Elsevier Science in the open-access Procedia Computer Science series online. Procedia Computer Sciences is hosted on www.Elsevier.com and on Elsevier content platform ScienceDirect (www.sciencedirect.com), and will be freely available worldwide. All papers in Procedia will also be indexed by Thomson Reuters' Conference Proceeding Citation Index http://thomsonreuters.com/conference-proceedings-citation-index/ . The papers will contain linked references, XML versions and citable DOI numbers. You will be able to provide a hyperlink to all delegates and direct your conference website visitors to your proceedings. All accepted papers will also be indexed in DBLP (http://dblp.uni-trier.de/).

The authors must follow Elsevier guidelines as given in the ANT-2015 Website (http://cs-conferences.acadiau.ca/ant-15/).
However, the number of pages for SPINS-2015 workshop papers is limited to 6 pages.

For any query or difficulty in submission, please contact the Program Chair, Al-Sakib Khan Pathan at sakib.pathan@gmail.com or spathan@ieee.org

-- Important Dates

Paper Submission: January 10, 2015
Author's Notification: March 01, 2015
Final Manuscript Due: March 28, 2015
Registration Due: TBA
Workshop Date: TBA

-- International Program Committee

Program Chair:

Al-Sakib Khan Pathan, International Islamic University Malaysia, Malaysia

Technical Program Committee:

Xianglin Wei, Nanjing Telecommunication Technology Research Institute, China
Muhammad Khurram Khan, King Saud University, Saudi Arabia
Homero Toral-Cruz, University of Quintana Roo / ITSCH, México
Hua Wu, Southeast University, Nanjing, China
Mostafa Fouda, Benha University, Egypt
Victor Govindaswamy, Concordia University Chicago , USA
Zheli Liu, Nankai University, Tianjin, China
Hani Alzaid, King Abdulaziz City for Science and Technology, Saudi Arabia
Baojiang Cui, Beijing University of Posts and Telecommunications, Beijing, China
Abderazek Ben Abdallah , The University of Aizu, Japan
Luca Caviglione, ISSIA, CNR, Italy
Guomin Zhang, PLA University of Science and Technology, China
Pasquale Pace, University of Calabria, Italy
Zubair Md. Fadlullah, Tohoku University, Japan
Qurban Ali Memon, UAE University, UAE
Jean-Francois Lalande, Ensi de Bourges / Inria, France
Mohammad Shahid Jamil, Qatar University, Qatar
Tarem Ahmed, BRAC University, Bangladesh
Kevin Hamlen, The University of Texas at Dallas, USA
Yaser Jararweh, Jordan University of Science and Technology, Jordan

==============================

Regards,
Sakib

--
Al-Sakib Khan Pathan, Ph.D., SMIEEE
Founding Head, NDC Laboratory, KICT, IIUM

Assistant Professor, Department of Computer Science
Kulliyyah (Faculty) of Information and Communication Technology
International Islamic University Malaysia (IIUM)
Jalan Gombak, 53100, Kuala Lumpur, MALAYSIA
Tel: +603-61964000 Ext. 5653, Cell: +60163910754
E-Mails: spathan@ieee.org, sakib@iium.edu.my

Personal URL1: http://staff.iium.edu.my/sakib/
Personal URL2: https://sites.google.com/site/spathansite/

NDC Lab URL: http://staff.iium.edu.my/sakib/ndclab/

Related Resources

IJP2P 2017   International Journal of Peer-to-Peer Networks
IEEE TETCI 2017   Computational Intelligence for End-to-End Audio Processing - Special Issue of the IEEE Transactions on Emerging Topics in Computational Intelligence
SPAN 2017   SPAN 2017-The Four International Workshop on Sensor, Peer-to-peer and SociAl Networks
ICONIP 2017   International Conference on Neural Information Processing
IUI 2017   Intelligent User Interfaces
TDSC-PSCE 2017   Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing
ISIS 2017   The 18th International Symposium on Advanced Intelligent Systems (ISIS2017)
DASC 2017   The 15th IEEE International Conference on Dependable, Autonomic and Secure Computing
ACII 2017   Affective Computing and Intelligent Interaction
MSPN 2017   International Conference on Mobile, Secure and Programmable Networking