posted by user: kamaljitcfp || 3293 views || tracked by 4 users: [display]

NGWNS 2014 : Handbook of Research on Next Generation Wireless Network Security and Privacy

FacebookTwitterLinkedInGoogle

Link: http://www.igi-global.com/publish/call-for-papers/call-details/1279
 
When Nov 15, 2014 - Nov 15, 2014
Where USA
Abstract Registration Due Mar 30, 2014
Submission Deadline Jul 30, 2014
Notification Due Sep 30, 2014
Final Version Due Nov 15, 2014
Categories    wireless network security   privacy   security management   next generation wireless nw
 

Call For Papers

Call for Chapters: Handbook of Research on Next Generation Wireless Network Security and Privacy

Editors
Dr. Kamaljit I. Lakhtaria
Department of Computer Science & Engineering
Sir Padampat Singhania University
Udaipur - 313601, Rajasthan, India


Call for Chapters
Proposals Submission Deadline: March 30, 2014
Full Chapters Due: July 30, 2014

Introduction
For release in the Advances in Information Security, Privacy, and Ethics (AISPE) Book Series.

ISSN: 1948-9730

The Advances in Information Security, Privacy, & Ethics (AISPE) Book Series is the source for this research, as the series provides only the most cutting-edge research on how information is utilized in the digital age.

Rapid advances in wireless communications and networking technologies are gradually making the dream of ubiquitous high-speed network access a reality. Next Generation Wireless Networks including communication networks Next Generation Networks (NGN), 3G, 4G, Long Term Evolution (LTE), Wireless LANs, PANs, WiMax, ad hoc networks, Mobile ad hoc networks (MANETs), Wireless Sensor Networks (WSNs). Unlike the wired networks, the unique characteristics of wireless networks pose a number of nontrivial challenges to security design, such as open peer-to-peer network architecture, shared wireless medium, stringent resource constraints, highly dynamic network topology, and absence of a trusted infrastructure. Ubiquitous roaming impacts on a radio access system by requiring that it supports handover between neighboring cells and different networks. Also, mobile networks are more exposed to interferences than wired networks. Such ubiquitous network access allows vandals and criminals to exploit vulnerabilities in networked systems on a widespread basis. This situation makes security and privacy designs for emerging wireless networks both critical and challenging. Security mechanism in wireless networks are indispensable to secure access control, authentication, authorization, confidentiality, data security, user confidentiality, quality of service and quality of experience for users. As a result, today research empowered towards wireless networks preserving trust, security and privacy at the same time.



Objective
This book looks to discuss research focuses on Next Generation Wireless Network security including network security, cryptography, user authentication, various types of attacks & their counter measures, secure routing algorithm, intrusion detection, security algorithms, performance analysis of various tools and proposed techniques, security issues, privacy management, smart phone application security, and key management.

Target Audience
Academicians, Research Supervisors, Researchers, Advanced level Students, Technology Developers and Corporate Organizations will find this Handbook useful for their Research, Advance Concept Study and Product Development. Topics in this Handbook will assist Researchers and technology developers to pertinent topics and assisting in their own research efforts in this field.

Recommended Topics
Contributors are welcome to submit chapters on the following topics relating to Next Generation wireless network security and privacy management:

Authentication Models in Next Generation Networks (NGNs)
Authorization Models in Next Generation Networks (NGNs)
Cross-layer design for trust, security and privacy in Next Generation wireless networks
Cryptographic Algorithms for Next Generation wireless networks Security
Economics of Next Generation wireless network security
Intrusion detection and tolerance in Next Generation Wireless Network
Key management in Next Generation wireless networks
Privacy management for Next Generation wireless networks
Research Models for Next Generation wireless networks security
Security challenges in Next Generation Wireless Networks
Secure roaming for Next Generation wireless communication networks
Secure Routing in Wireless Network
Security in ad-hoc networks (MANETs)
Security in Sensor Networks (WSNs)
Security in Wireless Private Networks
Threat and vulnerability analysis for wireless communication
Trust establishment, negotiation, and management in Wireless Networks
User Privacy Management in Wireless Networks
Wireless Network security protocols


Submission Procedure
Researchers and practitioners are invited to submit on or before March 30, 2014, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Submissions should be made through the link at the bottom of this page. Authors of accepted proposals will be notified by May 30, 2014 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by July 30, 2014. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.

Publisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the "Information Science Reference" (formerly Idea Group Reference), "Medical Information Science Reference," "Business Science Reference," and "Engineering Science Reference" imprints. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2016.

Important Dates
March 30, 2014: Proposal Submission Deadline
May 30, 2014: Notification of Acceptance
July 30, 2014: Full Chapter Submission
September 30, 2014: Review Results Returned
November 15, 2015: Final Chapter Submission
January 31, 2015: Final Deadline

Inquiries
Dr. Kamaljit I Lakhtaria
Sir Padampat Singhania University, Udaipur - 313601, Rajasthan, India

Tel.: (91) 98795 15909, E-mail: kamaljit.ilakhtaria@gmail.com

Related Resources

ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ISCI 2025   2025 7th IEEE Symposium on Computers & Informatics
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
ICACT 2025   The 27th International Conference on Advanced Communications Technology (ICACT)
IJMPICT 2024   International Journal of Managing Public Sector Information and Communication Technologies
ACC6G 2025   Bali Island, Indonesia -2025 Asia Conference on Communications and 6G (ACC6G 2025)
MATHCS 2024   2nd International Conference on Mathematics, Computer Science & Engineering
ICINT--EI 2025   2025 10th International Conference on Information and Network Technologies (ICINT 2025)
ICNGN 2024   The 3rd International Conference on Intelligent Computing and Next Generation Networks