| |||||||||||||||
SPAWN 2009 : 2nd IEEE WoWMoM Workshop on Security, Privacy and Authentication in Wireless Networks | |||||||||||||||
Link: http://www.ece.stevens-tech.edu/~ychen/workshop_spawn2009/spawn_home.htm | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Aims and Scope
As the number of wireless network installations is growing fast and become popular, the number of mobile users is still expanding, the mobile services and applications are becoming more and more data-driven and the horizontal roaming between cellular and wireless local networks in now feasible the associated security, privacy and trust issues are becoming more challenging. The objectives of the SPAWN¡¯08 Workshop are to develop new security, privacy and trust concepts for wireless and mobile networks. We solicited papers that consider wireless, MANET, cellular, vehicular, ad hoc, cognitive and sensor networks. The workshop aims to attract research work that not only address the major research issues involved in achieving a high level of security and privacy for these types of networks, but also research work that envisages new applications for wireless networks and the security and privacy challenges unique to these applications. Topics ----------------------- Cross-layer approaches to security Key exchange, distribution and management in ad-hoc/sensor networks Secure group communications Secure PHY/MAC/routing protocols Network Coding Security Secure cooperation in wireless networks Jamming and counter measures Capacity and security analysis of covert channels Light-weight cryptography and protocols Ad hoc network security Cognitive radio network security Intrusion detection, localization, and avoidance Power-reliability-security trade-offs in wireless networks Throughput-Security trade-offs in wireless networks Reasoning about Security, Privacy and Trust Measuring wireless security Threats and vulnerabilities Denial of service attacks Intrusion prevention, detection and protection systems Malware in wireless services and applications PETs Location privacy and secure localization Location aware security in mobile networks Trust and reputation management Deploying and enforcing security policies in wireless networks Forensic tools Role of Incentives to support secure and privacy Cryptographic primitives for wireless communication Formal methods for wireless security Case Studies |
|