posted by organizer: spathan || 2259 views || tracked by 7 users: [display]

SPINS 2016 : The 3rd International Workshop on Secure Peer-to-Peer Intelligent Networks & Systems 2016


When May 23, 2016 - May 26, 2016
Where Madrid, Spain
Submission Deadline Dec 30, 2015
Notification Due Feb 21, 2016
Final Version Due Mar 21, 2016
Categories    security   networking   P2P   intelligent

Call For Papers


The 3rd International Workshop on
Secure Peer-to-Peer Intelligent Networks & Systems (SPINS 2016)
In conjunction with ANT 2016, May 23-26, 2016, Madrid, Spain



SPINS 2016 is the 3rd edition of the workshop. Previous workshops were organized with ANT'14 and ANT'15 conferences.

P2P (Peer-to-Peer) networking is contributing to a vast amount of Internet traffic because many Internet users heavily use or depend on file sharing applications like BitTorrent, PPStream, eDonkey, and so on. While these applications often make various types of soft resources (e.g., audio, video, game, music, e-books) easily available via the P2P model, the operational mechanism of the network also makes the system vulnerable to various kinds of security threats. Malicious peers may be often present in such architecture because of the inherent dependence on peers who should cooperate with each other. Attacks against P2P systems could be manifold; Distributed Denial-of-Service (DDoS) attack, injection of useless data (commonly termed as “poisoning”) into the network or pollution attack, identity theft, collusion attack, Sybil attack, etc. Due to the constant efforts of the high-profile hackers for breaching data and finding new methods of attacks, unmonitored P2P file-sharing systems have been threatened today with unparalleled magnitude. Sensitive information could easily be exposed, harvested, and distributed across multiple P2P networks, often with information of government or critical military facilities.

To detect malicious peers, which are responsible for the vast majority of attacks, some schemes use reputation of nodes while some are based on mutual certificates. Especially, in the recent days, social-networking-based certification has been proposed in which a simple strategy of “Friend of Friend” is applied taking a chunk of nodes in the network. This chunk structure could be expanded to cover some portion of the network. The idea is that a friend could certify and support another friend (i.e., here node). However, such kind of solution leaves many issues unanswered like privacy issues, scalability of the network, handling of non-participating node, resource scarcity among the socially networked nodes, and so on. Besides these efforts, intelligent and adaptive methods are being developed using artificial intelligence, fuzzy logic, game theory, and so on. The theme of peer-to-peer also covers various types of wireless ad hoc networks, which adds to the complexity of securing such networks. This workshop's objective is to provide a platform for the researchers and students to share their thoughts and findings on various security issues in P2P, wireless P2P, ad hoc networks and systems.

Topics of Interest

In this workshop, our goal is to publish the latest advancements addressing the topic of security in P2P networks and systems, especially focused on malicious-peer detection based approaches and intelligent-adaptive approaches. Other issues may be blended with the security issues. The topics of interest are (though the list should not be considered exhaustive):

- Detecting malicious peers in P2P network
- Thwarting pollution attack or poisoning attack in P2P network
- Handling resource unavailability due to presence of malicious peers
- Trust management in P2P systems
- Social-networking based security management in P2P networks
- P2P vs Social networking security
- Intelligent and adaptive secure P2P systems
- Game theory based P2P system trust and security
- Defending against P2P data breaches
- Measuring evidence of cyber-criminal activity on P2P networks
- Wireless ad hoc peer to peer network security
- Peer-to-peer monitoring in wireless sensor networks

Submission Guidelines and Publication

Papers must be original, unpublished, and not under review elsewhere. Each paper will be reviewed by the experts in the relevant areas. Authors should submit their papers electronically in PDF format before the deadline (see Important Dates) directly to the Workshop Chair at Kindly use the email subject line "SPINS16_Submission-Your paper title"

All SPINS’15 accepted papers will be printed in the ANT-20156 conference proceedings published by Elsevier Science in the open-access Procedia Computer Science series online. Procedia Computer Sciences is hosted on and on Elsevier content platform ScienceDirect (, and will be freely available worldwide. All papers in Procedia will also be indexed by Thomson Reuters' Conference Proceeding Citation Index . The papers will contain linked references, XML versions and citable DOI numbers. You will be able to provide a hyperlink to all delegates and direct your conference website visitors to your proceedings. All accepted papers will also be indexed in DBLP (

The authors must follow Elsevier guidelines as given in the ANT-2016 Website (

However, the number of pages for SPINS'16 workshop papers is limited to 6 pages.

For any query or difficulty in submission, please contact the Program Chair, Al-Sakib Khan Pathan at

Important Dates

Paper Submission: December 30, 2015
Acceptance Notification: February 21, 2016
Final Manuscript Due: March 21, 2016
Registration Due: TBA

International Program Committee

Program Chair:

Al-Sakib Khan Pathan, UAP and SEU, Bangladesh/ Islamic University in Madinah, KSA

Technical Program Committee:

Xianglin Wei, Nanjing Telecommunication Technology Research Institute, China
Muhammad Khurram Khan, King Saud University, Saudi Arabia
Homero Toral-Cruz, University of Quintana Roo / ITSCH, México
Mostafa Fouda, Benha University, Egypt
Victor Govindaswamy, Concordia University Chicago , USA
Baojiang Cui, Beijing University of Posts and Telecommunications, Beijing, China
Abderazek Ben Abdallah , The University of Aizu, Japan
Luca Caviglione, ISSIA, CNR, Italy
Pasquale Pace, University of Calabria, Italy
Zubair Md. Fadlullah, Tohoku University, Japan
Qurban Ali Memon, UAE University, UAE
Jean-Francois Lalande, INSA Centre Val de Loire, France
Mohammad Shahid Jamil, Qatar University, Qatar
Tarem Ahmed, BRAC University, Bangladesh
Kevin Hamlen, The University of Texas at Dallas, USA
Yaser Jararweh, Jordan University of Science and Technology, Jordan
Muhammad Motaharul Islam, Islamic University of Technology, Bangladesh

Related Resources

SI: P2PPMC 2016   Special Issue on Emerging Peer to Peer (P2P) Network Technologies for Pervasive and Mobile Computing-Elsevier Pervasive and Mobile Computing Journal [Impact Factor=2.079] -
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
IJP2P 2016   International Journal of Peer-to-Peer Networks
IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security
ICISSP 2017   3rd International Conference on Information Systems Security and Privacy
SPAN 2017   SPAN 2017-The Four International Workshop on Sensor, Peer-to-peer and SociAl Networks
IJNGN 2016   International Journal of Next-Generation Networks
IROS 2017   IEEE/RSJ International Conference on Intelligent Robots and Systems
AIP Special Issue 2016   Journal Acta Informatica Pragensia - Special Issue on Systems
CSPRED 2016   Computer-Supported Peer Review in Education