posted by user: raramadan || 24257 views || tracked by 9 users: [display]

SWSN 2016 : Special Issue on Security in Wireless Sensor Networks – Countermeasures and Challenges- Int. J. of Intelligent Engineering Informatics

FacebookTwitterLinkedInGoogle

Link: http://www.inderscience.com/info/ingeneral/cfp.php?id=2896
 
When N/A
Where N/A
Submission Deadline Feb 15, 2016
Notification Due Apr 15, 2016
Final Version Due May 30, 2016
Categories    security   mobile computing   wireless networks   wireless sensor networks
 

Call For Papers

Guest Editors:
Djallel Eddine Boubiche and Faouzi Hidoussi, University Hadj Lakhdar of Batna, Algeria
Rabie A. Ramadan, Cairo University, Egypt

Wireless sensors networks (WSNs) are composed of several nodes able to communicate with each other. The nodes mostly collect and aggregate data from inaccessible areas. After aggregating the data, the nodes send the results to the base station (BS) directly or through other nodes. Recently, the WSNs domain has been involved in several applications such as monitoring natural disasters, industry, healthcare and some military applications.

Due to their limited resources and their wireless communication nature, WSNs are vulnerable to several types of attacks. This special issue aims to point out the security issues in WSNs. It will focus on the current countermeasures proposed to detect attacks, ensure security and enhance the performance of WSNs. The issue will also focus on the current challenges which must be taken into account when proposing such systems of security in wireless sensors networks.

The issue will carry revised and substantially extended versions of selected papers presented at the International Conference on Intelligent Information Processing, Security and Advanced Communication (IPAC'2015), but we also strongly encourage researchers unable to participate in the conference to submit articles for this call.

Subject Coverage

Suitable topics include, but are not limited to, the following:

Energy-efficient secure routing protocols for WSNs
Intrusion detection systems for WSNs
Hybrid intrusion detection systems for WSNs
Misuse and anomaly intrusion detection systems for WSNs
Cross layer intrusion detection systems for WSNs
Security, reliability and privacy for WSNs
Low-cost elliptic curve cryptography for WSNs
Symmetric/asymmetric cryptography security for WSNs
Security challenges and solutions for WSNs
Middleware challenges for WSNs

Notes for Prospective Authors

Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. (N.B. Conference papers may only be submitted if the paper has been completely re-written and if appropriate written permissions have been obtained from any copyright holders of the original paper).

All papers are refereed through a peer review process.

All papers must be submitted online. To submit a paper, please read our Submitting articles page.

For further information, to discuss ideas for contributions and to submit abstracts/proposals, please contact the Guest Editors:
Dr. Djallel Eddine Boubiche (dj.boubiche@gmail.com)
Mr. Faouzi Hidoussi (hidoussi.f@gmail.com)
Dr. Rabie A. Ramadan (rabie@rabieramadan.org)

Important Dates

Submission of manuscripts: 15 February, 2016

Notification to authors: 15 April, 2016

Final versions due: 30 May, 2016

Related Resources

FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
Special Issue A&DC IoT 2018   SENSORS (Q1) Special Issue: Algorithm and Distributed Computing for the Internet of Things
IJRAP 2018   International Journal of Recent advances in Physics
SENSORNETS 2019   8th International Conference on Sensor Networks
IJOE 2018   International Journal on Organic Electronics
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
IJAB 2018   International Journal of Advances in Biology
WiOpt 2018   WiOpt 2018, The 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
NECO 2018   7thInternational Conference of Networks and Communications
CRC-Botnets 2018   Botnets: Architectures, Countermeasures, and Challenges