[Sensors] Special Issue on Composite and Integrated Security Solutions for Wireless Sensor Networks

Riaz A. Shaikh riaz289 at gmail.com
Thu Jul 16 05:44:26 BST 2009


 Special Issue on Composite and Integrated Security Solutions for Wireless
Sensor Networks

International Journal of Communication Networks and Information Security
(IJCNIS)

http://ijcnis.kust.edu.pk

ISSN: 2073-607X

Overview:

This special issue is devoted to composite and integrated security solutions
for Wireless Sensor Networks (WSNs). In WSNs, researchers have so far
focused on the individual aspects (cryptography, privacy or trust) of
security that are capable of providing protection against specific types of
attacks. However, efforts on achieving completeness via a composite and
integrated solution are lacking. That is ultimately necessary to attain
because of its wide applicability in various sensitive applications, such as
health-care, military, habitat monitoring, etc.

Current research so far seems to intensively focus on the cryptography-based
security aspects of WSNs. Many cryptography-based security solutions have
been proposed such as SPINS, TinySec, and LEAP, etc., but surprisingly less
importance is given to privacy and trust issues of WSNs. Latter two aspects
contribute in increasing the degree of completeness and reliability of a
security solution. However, incorporating privacy and trust features in a
security solution is not an easy task. This is due to the fact that the WSNs
generally consist of large number of tiny sized sensor nodes. And they
operate in highly resource-constraint environment in which nodes have
limited memory, energy, and computation power. Thus, lightweight privacy and
trust management schemes are needed to ensure completeness and reliability
in the security solution of WSNs.

The objective of this special issue is to gather recent advances in the area
of composite and integrated security solutions of wireless sensor networks.
This special issue covers topics that include, but are not limited to:

   - Adaptive and Intelligent Defense Systems
   - Authentication and Access control
   - Data security and privacy
   - Denial of service attacks and countermeasures
   - Identity, Route and Location Anonymity schemes
   - Intrusion detection and prevention techniques
   - Cryptography, encryption algorithms and Key management schemes
   - Secure routing schemes
   - Secure neighbor discovery and localization
   - Trust establishment and maintenance
   - Confidentiality and data integrity
   - Security architectures, deployments and solutions


Schedule:

Manuscript due date: September 1st, 2009
First round notification: November 15, 2009
Revised paper due: December 30, 2009
Notification of acceptance: January 30, 2010
Submission of final manuscript: February 15, 2010
Tentative Publication date: April/August 2010

Submission & Review Instruction:

The submitted papers must be written in English and describe original
research which is not published nor currently under review by other journal
or conference. Paper submission email address is riaz289 at gmail.com.

For more information, please contact the guest editors.

Guest Editors:

Riaz Ahmed Shaikh (Corresponding Editor)
Department of Computer Engineering,
Kyung Hee University, Korea
Email: riaz289 at acm.org , riaz289 at gmail.com

Al-Sakib Khan Pathan
Department of Computer Engineering
Kyung Hee University, Korea
Email: sakib.pathan at gmail.com , spathan at ieee.org

Jaime Lloret
Department of Communications
Polytechnic University of Valencia, Spain
Email: jlloret at dcom.upv.es
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://oakham.cs.ucl.ac.uk/pipermail/sensors/attachments/20090716/1c376d1a/attachment.html


More information about the Sensors mailing list