posted by system || 6493 views || tracked by 7 users: [display]

SMDAP_WN 2017 : Special Collection on Security Mechanisms and Data Access Protocols in Innovative Wireless Networks - IJDSN (IF: 0.906)

FacebookTwitterLinkedInGoogle

Link: http://journals.sagepub.com/page/dsn/collections/special-issues/security_mechanisms_data_access_protocols
 
When N/A
Where N/A
Submission Deadline Jul 24, 2017
Notification Due Oct 30, 2017
Final Version Due Dec 30, 2017
Categories    wireless   network   security   data access
 

Call For Papers

CALL FOR PAPERS

Special Collection on Security Mechanisms and Data Access Protocols in Innovative Wireless Networks
International Journal of Distributed Sensor Networks, SAGE Publications (Impact Factor: 1.239 **NEW**)

URL: http://journals.sagepub.com/page/dsn/collections/special-issues/security_mechanisms_data_access_protocols

To have your paper included, submit by November 25, 2017

Submit your Papers Through: https://mc.manuscriptcentral.com/ijdsn

Wireless networks play a vital role in shaping today’s network infrastructure. Although in the past the use of wireless communications was limited to the last-mile connectivity of the network, their convenience and adaptability has led to a variety of innovative wireless technologies that are now arriving at the scene. These include mobile technologies, 4G (LTE, WiMAX), 3G (UMTS, HSPA), bluetooth, wireless sensor network (WSN), radio frequency identification (RFID), near field communication (NFC), mobile ad hoc networks (MANETs), vehicular ad hoc networks (VANETs), wireless mesh networks (WMNs), and Wi-Fi. An amalgamation of these different technologies will dramatically enhance the usefulness of small Internet-capable devices and potentially would offer a world of truly ubiquitous computing.

While there are various concerns about manageability, energy, spectrum usage, and so on, what needs to be improved is the most important issue of security, which requires very careful attention before practical deployment of these technologies. Indeed, if the security is compromised, the core goal of using such networks would be in jeopardy. The reality is that the broadcast nature of transmissions on the wireless medium and the dependency on the intermediate nodes for multi-hop communications in such networks lead to a wide range of security vulnerabilities. These security loopholes can be exploited by potential attackers causing detrimental effect on the network performance and disruption of service. Therefore, there are a lot of security issues that need to be addressed so that these innovative wireless technologies can be practically used in our day-to-day life.

Another associated issue is how to access the data provided by these networks, especially for a network like a WSN that can have very dynamic settings, topologies, neighborhoods and expectations surrounding the quality of the data including security. Illegitimate access to the sensor data and unauthorized modification of data could cause serious harm to various mission-critical applications. Considering these points, this special collection opens the door for the researchers to publish their thoughts, models, findings, analysis, and future expectations in the general field of security mechanisms and data access protocols in various innovative wireless networks.

Any topic related to the innovative wireless networks, especially focused on wireless sensor and actuator networks would be considered. Both technical and survey/review papers on the topics are welcome.

Potential topics include, but are not limited to:

• Security analysis and performance analysis
• Intrusion detection and prevention
• Key management protocols
• Secure, scalable and robust routing protocols
• Reliable and adaptive transport protocols
• Secure cross-layer design and optimization
• Secure communication protocols
• Resource management and traffic control
• Security in heterogeneous wireless networks
• Quality of data and data access in wireless networks

The submitted manuscripts for this special collection will be peer-reviewed before publication.

Please submit your paper according to the following timetable for the special collection:

Manuscript Deadline
November 25, 2017

First Round of Reviews
February 2018

First Papers Published
May 2018

Lead Guest Editor

Al-Sakib Khan Pathan, Southeast University, Bangladesh (spathan@ieee.org)

Guest Editors

Saiful Azad, University Malaysia Pahang (UMP), Malaysia (saifulazad@ump.edu.my)
Rasib Khan, Northern Kentucky University, USA (khanr2@nku.edu)
Luca Caviglione, National Research Council of ITaly (CNR), Italy (luca.caviglione@ge.issia.cnr.it)

Please write to the Guest Editors for any query about this Special Collection.

Related Resources

EAAMO 2021   ACM Conference on Equity and Access in Algorithms, Mechanisms, and Optimization
IEEE COINS 2021   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
SI-D2CSCAI 2021   CfP - Special Issue Data-Driven Cybersecurity and Safety for Critical Applications and Infrastructures (MDPI Sensors - IF= 3.275)
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
ICCWS 2022   17th International Conference on Cyber Warfare and Security
CEVVE 2021   2021 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2021)
WiMoA 2021   3th International Conference on Wireless, Mobile Network and Applications
SI on ATD&IS 2021   Special Issue on Advanced Technologies in Data and Information Security, Applied Sciences, MDPI
CCNC 2021   IEEE Consumer Communications & Networking Conference
TPSA 2021   2nd Workshop on Trust, Privacy and Security Aspects in Process Analytics