| |||||||||||||
IJCNIS-SI 2010 : IJCNIS: Special Issue on Composite and Integrated Security Solutions for Wireless Sensor Networks | |||||||||||||
Link: http://ijcnis.kust.edu.pk | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
Special Issue on
Composite and Integrated Security Solutions for Wireless Sensor Networks International Journal of Communication Networks and Information Security (IJCNIS) http://ijcnis.kust.edu.pk ISSN: 2073-607X Overview: This special issue is devoted to composite and integrated security solutions for Wireless Sensor Networks (WSNs). In WSNs, researchers have so far focused on the individual aspects (cryptography, privacy or trust) of security that are capable of providing protection against specific types of attacks. However, efforts on achieving completeness via a composite and integrated solution are lacking. That is ultimately necessary to attain because of its wide applicability in various sensitive applications, such as health-care, military, habitat monitoring, etc. Current research so far seems to intensively focus on the cryptography-based security aspects of WSNs. Many cryptography-based security solutions have been proposed such as SPINS, TinySec, and LEAP, etc., but surprisingly less importance is given to privacy and trust issues of WSNs. Latter two aspects contribute in increasing the degree of completeness and reliability of a security solution. However, incorporating privacy and trust features in a security solution is not an easy task. This is due to the fact that the WSNs generally consist of large number of tiny sized sensor nodes. And they operate in highly resource-constraint environment in which nodes have limited memory, energy, and computation power. Thus, lightweight privacy and trust management schemes are needed to ensure completeness and reliability in the security solution of WSNs. The objective of this special issue is to gather recent advances in the area of composite and integrated security solutions of wireless sensor networks. This special issue covers topics that include, but are not limited to: Adaptive and Intelligent Defense Systems Authentication and Access control Data security and privacy Denial of service attacks and countermeasures Identity, Route and Location Anonymity schemes Intrusion detection and prevention techniques Cryptography, encryption algorithms and Key management schemes Secure routing schemes Secure neighbor discovery and localization Trust establishment and maintenance Confidentiality and data integrity Security architectures, deployments and solutions Schedule: Manuscript due date: September 1st, 2009 First round notification: November 15, 2009 Revised paper due: December 30, 2009 Notification of acceptance: January 30, 2010 Submission of final manuscript: February 15, 2010 Tentative Publication date: April/August 2010 Submission & Review Instruction: The submitted papers must be written in English and describe original research which is not published nor currently under review by other journal or conference. Paper submission email address is riaz289@gmail.com. For more information, please contact the guest editors. Guest Editors: Riaz Ahmed Shaikh (Corresponding Editor) Department of Computer Engineering, Kyung Hee University, Korea Email: riaz289@acm.org , riaz289@gmail.com Al-Sakib Khan Pathan Department of Computer Engineering Kyung Hee University, Korea Email: sakib.pathan@gmail.com , spathan@ieee.org Jaime Lloret Department of Communications Polytechnic University of Valencia, Spain Email: jlloret@dcom.upv.es |
|