posted by user: gkvk70 || 11720 views || tracked by 19 users: [display]

Secure Mobility 2013 : Computer Standards & Interfaces - Special Issue on Secure Mobility in Future Communication Systems under Standardization

FacebookTwitterLinkedInGoogle

Link: http://www.journals.elsevier.com/computer-standards-and-interfaces/call-for-papers/secure-mobility-future-communication-systems/
 
When N/A
Where N/A
Submission Deadline Jan 15, 2013
Notification Due Feb 28, 2013
Final Version Due Mar 31, 2013
Categories    security   mobility
 

Call For Papers

*** SUBMISSION DEADLINE EXTENDED TO JAN. 15th ***

Computer Standards & Interfaces, Elsevier
(http://www.journals.elsevier.com/computer-standards-and-interfaces/)
Special Issue on Secure Mobility in Future Communication Systems under Standardization

In the last decade, wireless communications and electronic devices have experienced an impressive growth. The use of the air as propagation medium has greatly attracted both users and industry due to the numerous advantages offered by this kind of communication. Nowadays, the use of our Smart phone, tablet or netbook is becoming a core part of our daily lives. However, wireless communications capabilities are expected to be integrated in multiple types of products such as vehicles, electrical appliances, hospital devices, etc. Thus, in the days to come, we expect that wireless communications will become ubiquitous for the future computer systems. Mobility is the cornerstone of wireless communications and an essential feature to enable the communication between devices anywhere, anytime. However, communications need to be secured since, due to the wireless network’s nature, eavesdroppers are able to capture any communication happening near its coverage area.
Standardization organizations, aware of this challenging issue in future communication systems, are producing a set of specifications to enable secure mobility in different scenarios. For example, the IEEE 802.21 group is developing standards to assist a secure handoff in future Next Generation Networks (NGNs). This work is complemented by the IETF where it can be found a wide number of working groups dealing with mobility management and security in future heterogeneous networks, an issue that is also being tackled by the ITU-T Y-Series recommendations. The ISO and ETSI organizations are also dealing with mobility and security in other communication scenarios. For instance, the technical committee ISO TC 204 is addressing the specific needs that appear in Intelligent Transport Systems (ITS). This topic is also addressed by ETSI, where different work programs are also producing standards for Machine-to-Machine communications and Smart Grids, paying special attention to the specific security requirements of these scenarios. These are just a few examples of the great effort being devoted by the standardization activity, which demonstrates the importance of the subject.
This Special Issue will provide a comprehensive guide on solutions reached by the standardization organizations in the mobility and security fields. It will cover not only standardized solutions but also proposals intended to improve existing standards.
All received submissions will be sent out for peer review by at least two experts in the field and evaluated with respect to relevance to the special issue, level of innovation, depth of contributions, and quality of presentation. Guest editors will make an initial assessment of the suitability and scope of all submissions. Contributions that either lack originality, clarity in presentation or fall outside the scope of the special issue will not be sent for review and the authors will be promptly informed in such cases. Submitted papers must not be under consideration by any other journal or publication.

SCOPE
This special issue is intended to collect existing standardization efforts on achieving secure mobility in future communication systems: Next Generation Networks (NGNs), Machine-to-Machine Communications (M2M), Intelligent Transport Systems (ITS), Smart Grid, Mesh Networks, etc.

Suggested topics include but are not restricted to:

• Technologies enabling secure mobility
• Service access control solutions
• Key distribution and management schemes
• Privacy preserving mechanisms and anonymity
• Trust establishment, negotiation, and management
• Secure AAA infrastructures
• Secure and privacy preserving handover mechanisms
• Cryptographic protocols and lightweight cryptography
• Secure and privacy preserving mobile location services
• Cross Layer approach to security in respect to mobility
• Secure and privacy preserving mobile applications and services

SCHEDULE
Extended submission due: Jan. 15, 2013
Author notification: Feb. 28, 2013
Final manuscripts due: Mar. 31, 2013
Tentative publication: Fall 2013


SUBMISSION PROCEDURE
Authors should follow the "Instructions to Authors" available at the journal’s homepage
http://www.journals.elsevier.com/computer-standards-and-interfaces/. Please select "Secure Mobility" when reaching the "Article Type" step in the submission process.

GUEST EDITORS

Dr. Georgios Kambourakis
University of the Aegean, Greece
Email: gkamb@aegean.gr

Dr. Fernando Pereñíguez García
University of Murcia, Spain
Email: pereniguez@um.es

Dr. Peter Mueller
IBM Zurich Research Laboratory, Switzerland
E‐mail: pmu@zurich.ibm.com

Dr. Tom Karygiannis
National Institute of Standards and Technology (NIST), USA
Email: tom.karygiannis@nist.gov

Related Resources

SEAS 2025   14th International Conference on Software Engineering and Applications
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CSITEC 2025   11th International Conference on Computer Science, Information Technology
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
SPIE-Ei/Scopus-CMLDS 2025   2025 2nd International Conference on Computing, Machine Learning and Data Science (CMLDS 2025) -EI Compendex & Scopus
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
FL-AsiaCCS 2025   International Workshop on Secure and Efficient Federated Learning In Conjunction with ACM AsiaCCS 2025
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
NordSec 2024   The 29th Nordic Conference on Secure IT systems (NordSec) 2024
SaTML 2025   3rd IEEE Conference on Secure and Trustworthy Machine Learning