posted by user: jpvilela || 5148 views || tracked by 4 users: [display]

WiComSec-Phy 2015 : Workshop on Wireless Communication Security at the Physical Layer


When Jul 22, 2015 - Jul 22, 2015
Where Coimbra, Portugal
Submission Deadline May 13, 2015
Notification Due Jun 5, 2015
Final Version Due Jun 12, 2015
Categories    communications   wireless   security

Call For Papers

Workshop on Wireless Communication Security at the Physical Layer

Co-located with the 12th International Conference on Mobile and Ubiquitous Systems (MobiQuitous'15).

July 22, 2015
Coimbra, Portugal

---- SCOPE
As wireless systems become pervasive and are used to track and/or convey information to and about individuals, devices and products, security and privacy in these environments becomes of the utmost importance. These systems have always been a target for a number of different attacks that, more than often, are capable of breaching the security mechanisms implemented and threaten the reliability, safety and robustness of communications. Most of current solutions to these problems imply the use of sophisticated encryption or diversity techniques to fend off some types of attackers, such as eavesdroppers or jammers, but usually depend on a shared secret, which may be hard to establish in spontaneous and decentralized networks.

Physical-layer security is gaining interest as a means to provide an extra layer of security that does not depend on computational intractability of operations, but takes advantage of the inherent varying characteristics of wireless channels. While security at the physical-layer has its roots in early contributions from the 70s, wireless networks brought a renewed interest in this area by providing sources of advantage over an adversary eavesdropper from (a) a better signal quality due to the varying nature of wireless channels, (b) the use of cooperative relays or (c) friendly jammers to improve the signal quality of the legitimate receiver or cause interference to an eavesdropper that can possibly be removed at the legitimate receiver.

Accepted and presented papers will be included in the adjunct proceedings of the MobiQuitous Conference and will be accessible via the ACM digital library.

We solicit technical papers describing original, previously unpublished research, not currently under review by another conference or journal pertaining physical-layer security and how it can be used to strengthen next generation wireless communications, deemed crucial to the envisioned Internet of Things and the promise of ubiquitous and pervasive connectivity.

Topics of interest include, but are not limited to, the following:

- Practical code designs for physical-layer security
- Physical-layer security techniques for spontaneous/decentralized networks
- Cooperative security in opportunistic and device-centric next generation wireless networks
- Secure beamforming and interference generation/cancellation techniques
- Physical-layer security techniques for large-scale/multi-user networks
- Advanced signal processing techniques for physical-layer security
- Secret key generation/agreement
- Interdisciplinary approaches for security (game theory, stochastic geometry)
- Routing, scheduling and power control for secure communications
- Security, reliability and throughput-aware physical-layer security techniques
- Implementation approaches and experimental validation

* Papers Due: May 13, 2015 ** extended **
* Notification of Acceptance: June 05, 2015
* Camera-Ready Version due: June 12, 2015
* Workshop: July 22, 2015

Wade Trappe, Rutgers University, USA

Papers should be submitted in PDF following the ACM Double Column format, with no more than 6 pages in length. Each submission will be reviewed by the technical program committee; accepted and presented papers will be included in the adjunct proceedings of the MobiQuitous Conference and will be accessible via the ACM digital library.

We reserve the right to exclude papers accepted but not presented from the conference proceedings submitted for archiving and indexing.

João P. Vilela - University of Coimbra, Portugal
Merouane Debbah - Huawei, France

---- TPC
- Marco Baldi, Univ. Marche
- Frederic Gabry, Huawei Technologies
- Willie Harrison, Univ. Colorado Colorado Springs
- Yao-Win Peter Hong, National Tsing Hua University
- Eduard Jorswieck, TU Dresden
- Ingmar Land, Huawei Technologies
- Amitav Mukherjee, Ericsson Research
- Panagiotis Papadimitratos, KTH
- Elizabeth Quaglia, Huawei Technologies
- Walid Saad, Virginia Tech
- Rafael Schaefer, Princeton University
- Richard Demo Souza, Federal University of Technology - Parana
- Stefano Tomasin, Univ. of Padova
- Sennur Ulukus, Univ. Maryland
- Xiangyun Zhou, Australian National University

Related Resources

IEEE WCNC 2018   IEEE Wireless Communications and Networking Conference
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
Special Topics on Cybersecurity 2019   Special Topics on Cybersecurity - The 5th International Conference on Communication, Management and Information Technology
NECO 2018   7th International Conference of Networks and Communications
ICCNP--JA, Scopus 2019   2019 2nd International Conference on Communication and Network Protocol (ICCNP 2019)--JA, Scopus
WiMoNe 2018   10th International Conference on Wireless & Mobile Networks (WiMoNe-2018)
ICCSN--IEEE, Ei and Scopus 2019   IEEE--2019 11th International Conference on Communication Software and Networks (ICCSN 2019)--Ei Compendex, Scopus
DSN 2019   Dependable Systems and Networks
CCSEIT 2019   9th International Conference on Computer Science, Engineering and Information Technology
IEEE 5G-Security 2019   The 2019 IEEE Workshop on 5G Wireless Security with IEEE ICC 2019