[Sensors] IJCNIS: Special issue on Composite and Integrated Security Solutions for Wireless Sensor Networks.

Riaz A. Shaikh riaz289 at gmail.com
Mon May 11 11:56:32 BST 2009


< Apologies if you receive multiple copies of this CFP. >
Special Issue on
Composite and Integrated Security Solutions for Wireless Sensor Networks.
International Journal of Communication Networks and Information Security
(IJCNIS).

http://ijcnis.kust.edu.pk

ISSN: 2073-607X

Overview:

This special issue is devoted to composite and integrated security solutions
for Wireless Sensor Networks (WSNs). In WSNs, researchers have so far
focused on the individual aspects (cryptography, privacy or trust) of
security that are capable of providing protection against specific types of
attacks. However, efforts on achieving completeness via a composite and
integrated solution are lacking. That is ultimately necessary to attain
because of its wide applicability in various sensitive applications, such as
health-care, military, habitat monitoring, etc.

Current research so far seems to intensively focus on the cryptography-based
security aspects of WSNs. Many cryptography-based security solutions have
been proposed such as SPINS, TinySec, and LEAP, etc., but surprisingly less
importance is given to privacy and trust issues of WSNs. Latter two aspects
contribute in increasing the degree of completeness and reliability of a
security solution. However, incorporating privacy and trust features in a
security solution is not an easy task. This is due to the fact that the WSNs
generally consist of large number of tiny sized sensor nodes. And they
operate in highly resource-constraint environment in which nodes have
limited memory, energy, and computation power. Thus, lightweight privacy and
trust management schemes are needed to ensure completeness and reliability
in the security solution of WSNs.

The objective of this special issue is to gather recent advances in the area
of composite and integrated security solutions of wireless sensor networks.
This special issue covers topics that include, but are not limited to:

Adaptive and Intelligent Defense Systems
Authentication and Access control
Data security and privacy
Denial of service attacks and countermeasures
Identity, Route and Location Anonymity schemes
Intrusion detection and prevention techniques
Cryptography, encryption algorithms and Key management schemes
Secure routing schemes
Secure neighbor discovery and localization
Trust establishment and maintenance
Confidentiality and data integrity
Security architectures, deployments and solutions

Schedule:

Manuscript due date: September 1st, 2009
First round notification: November 15, 2009
Revised paper due: December 30, 2009
Notification of acceptance: January 30, 2010
Submission of final manuscript: February 15, 2010
Tentative Publication date: April/August 2010
Submission & Review Instruction:

The submitted papers must be written in English and describe original
research which is not published nor currently under review by other journal
or conference. Paper submission email address is riaz289 at gmail.com.

For more information, please contact the guest editors.

Guest Editors:

Riaz Ahmed Shaikh (Corresponding Editor)
Department of Computer Engineering,
Kyung Hee University, Korea
Email: riaz289 at acm.org , riaz289 at gmail.com

Al-Sakib Khan Pathan
Department of Computer Engineering
Kyung Hee University, Korea
Email: sakib.pathan at gmail.com , spathan at ieee.org

Jaime Lloret
Department of Communications
Polytechnic University of Valencia, Spain
Email: jlloret at dcom.upv.es
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://oakham.cs.ucl.ac.uk/pipermail/sensors/attachments/20090511/4b0c1deb/attachment.html


More information about the Sensors mailing list