(Apologies if you receive multiple copies of this message)
DEADLINE EXTENDED to May 20th, 2007 due to author requirements so more
time to polish your paper.
________________________________________________________________________
CFP for IEEE WiMOB’2007 special session on security in Mobile Ad hoc
Networks (MANET) and wireless sensor networks (WSN).
http://www.gel.usherbrooke.ca/WiMob2007/cfp.html
The session is part of the 3rd IEEE International Conference on Wireless
and Mobile Computing, Networking and Communications WiMob 2007
http://www.gel.usherbrooke.ca/WiMob2007/, which will take place in
Crowne Plaza Hotel, White Plains, New York, USA, from October 8-10, 2007.
Motivations:
Mobile ad hoc networks are able to provide fast and efficient network
deployment capabilities in a wide variety of scenarios where a fixed
networking infrastructure is not possible.
Wireless Sensor Networks (WSNs) are relatively low cost to be deployed
and to be used in many promising applications, such as biomedical sensor
monitoring (e.g., cardiac patient monitoring), habitat monitoring (e.g.,
animal tracking), weather monitoring (temperature, humidity, etc.),
low-performance seismic sensing, and natural disaster
detection/monitoring (e.g., flooding and fire).
These types of networks offer new challenging security problems due
primarily to their wireless network interface, allowing easy
eavesdropping and injection of messages, and to their distributed
infrastructure-less topology. Unfortunately, the security in mobile ad
hoc networks has been analyzed individually at different layers of the
communication protocols. Furthermore, many proposed security solutions
contain strong assumptions or they didn’t well adapt to the
characteristics of MANETs or WSNs. That’s way the future proposed
solution must take into account the resource constraints, (eventually)
mobility and to choose the cross-layer approach to design the security
mechanism.
Scope of Contributions for MANET and WSN (include but are not limited to
the following):
- Cross-Layer design of secure architecture
- Novel Distributed architectures and security schemes
- Key management and key distribution
- Secure routing and communication protocols
- Security and trust modeling
- Monitoring mechanisms and Distributed Intrusion Detection Systems
- Trust establishment and trust management
- Secure localization
- Secure time synchronization
- Location privacy
- etc.
Authors are invited to submit a complete technical paper of their
original work. Maximum length for submissions is 8 double column pages
in IEEE format. The preferred submission format is PDF.
Accepted papers will be published in the proceedings of IEEE WiMOB and
on IEEE Xplore.
Session Chair:
Abderrahim Benslimane, LIA Avignon University
Session Co-chair:
Chadi Assi, CIISE Concordia University
Submissions should be sent attached by email to the session chair at:
[log in to unmask]
Important Dates :
Manuscript Submission Due: May 20, 2007
Acceptance Notification: June 5, 2007
Final Manuscript Due: June 15, 2007
_______________________________________________
mycolleagues mailing list
[log in to unmask]
http://grid.lrg.ufsc.br/mailman/listinfo/mycolleagues
|