| |||||||||||||||
Secure Mobility 2013 : Computer Standards & Interfaces - Special Issue on Secure Mobility in Future Communication Systems under Standardization | |||||||||||||||
Link: http://www.journals.elsevier.com/computer-standards-and-interfaces/call-for-papers/secure-mobility-future-communication-systems/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
*** SUBMISSION DEADLINE EXTENDED TO JAN. 15th ***
Computer Standards & Interfaces, Elsevier (http://www.journals.elsevier.com/computer-standards-and-interfaces/) Special Issue on Secure Mobility in Future Communication Systems under Standardization In the last decade, wireless communications and electronic devices have experienced an impressive growth. The use of the air as propagation medium has greatly attracted both users and industry due to the numerous advantages offered by this kind of communication. Nowadays, the use of our Smart phone, tablet or netbook is becoming a core part of our daily lives. However, wireless communications capabilities are expected to be integrated in multiple types of products such as vehicles, electrical appliances, hospital devices, etc. Thus, in the days to come, we expect that wireless communications will become ubiquitous for the future computer systems. Mobility is the cornerstone of wireless communications and an essential feature to enable the communication between devices anywhere, anytime. However, communications need to be secured since, due to the wireless network’s nature, eavesdroppers are able to capture any communication happening near its coverage area. Standardization organizations, aware of this challenging issue in future communication systems, are producing a set of specifications to enable secure mobility in different scenarios. For example, the IEEE 802.21 group is developing standards to assist a secure handoff in future Next Generation Networks (NGNs). This work is complemented by the IETF where it can be found a wide number of working groups dealing with mobility management and security in future heterogeneous networks, an issue that is also being tackled by the ITU-T Y-Series recommendations. The ISO and ETSI organizations are also dealing with mobility and security in other communication scenarios. For instance, the technical committee ISO TC 204 is addressing the specific needs that appear in Intelligent Transport Systems (ITS). This topic is also addressed by ETSI, where different work programs are also producing standards for Machine-to-Machine communications and Smart Grids, paying special attention to the specific security requirements of these scenarios. These are just a few examples of the great effort being devoted by the standardization activity, which demonstrates the importance of the subject. This Special Issue will provide a comprehensive guide on solutions reached by the standardization organizations in the mobility and security fields. It will cover not only standardized solutions but also proposals intended to improve existing standards. All received submissions will be sent out for peer review by at least two experts in the field and evaluated with respect to relevance to the special issue, level of innovation, depth of contributions, and quality of presentation. Guest editors will make an initial assessment of the suitability and scope of all submissions. Contributions that either lack originality, clarity in presentation or fall outside the scope of the special issue will not be sent for review and the authors will be promptly informed in such cases. Submitted papers must not be under consideration by any other journal or publication. SCOPE This special issue is intended to collect existing standardization efforts on achieving secure mobility in future communication systems: Next Generation Networks (NGNs), Machine-to-Machine Communications (M2M), Intelligent Transport Systems (ITS), Smart Grid, Mesh Networks, etc. Suggested topics include but are not restricted to: • Technologies enabling secure mobility • Service access control solutions • Key distribution and management schemes • Privacy preserving mechanisms and anonymity • Trust establishment, negotiation, and management • Secure AAA infrastructures • Secure and privacy preserving handover mechanisms • Cryptographic protocols and lightweight cryptography • Secure and privacy preserving mobile location services • Cross Layer approach to security in respect to mobility • Secure and privacy preserving mobile applications and services SCHEDULE Extended submission due: Jan. 15, 2013 Author notification: Feb. 28, 2013 Final manuscripts due: Mar. 31, 2013 Tentative publication: Fall 2013 SUBMISSION PROCEDURE Authors should follow the "Instructions to Authors" available at the journal’s homepage http://www.journals.elsevier.com/computer-standards-and-interfaces/. Please select "Secure Mobility" when reaching the "Article Type" step in the submission process. GUEST EDITORS Dr. Georgios Kambourakis University of the Aegean, Greece Email: gkamb@aegean.gr Dr. Fernando Pereñíguez García University of Murcia, Spain Email: pereniguez@um.es Dr. Peter Mueller IBM Zurich Research Laboratory, Switzerland E‐mail: pmu@zurich.ibm.com Dr. Tom Karygiannis National Institute of Standards and Technology (NIST), USA Email: tom.karygiannis@nist.gov |
|