Special session/Workshop on Security Protection Mechanisms in Wireless Sensor Networks
View: 3282
Website http://www.wirelessvitae.org/2011/ |
Edit Freely
Category
Deadline: November 01, 2010 | Date: February 28, 2011-March 03, 2011
Venue/Country: Chennai, India
Updated: 2010-09-28 20:03:55 (GMT+9)
Call For Papers - CFP
Deadline Extended to 1st November 2010Call for Papers Special session/WorkshoponSecurity Protection Mechanisms in Wireless Sensor NetworksIn conjunction withSecond International Conference on Wireless VITAE 2011February 28 ? March 3, 2011, Le Royal Méridien Chennai, Indiahttp://www.wirelessvitae.org/2011/
:: Scope Wireless sensor network (WSN) is an emerging research field with several interesting application domains ranging from battlefield monitoring to environmental observation. The primary domains for WSN application are: military, ecological, medical, and other miscellaneous applications like car theft detection, inventory control, habitat monitoring, home applications etc. In these application domains of WSN, secure communication is one of the biggest challenges. While the attack systems have become more easy-to-use, sophisticated, and powerful, interest has greatly increased in the field of building more effective, intelligent, adaptive, active and high performance defense systems which are distributed and networked.The objective of the workshop/special session will be to deal with the issues related to Security Protection, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of wireless sensor networks. This workshop/special session will provide a forum for exchange of ideas, discuss solutions, and share experiences among researchers and professionals from industry and academia. Papers describing original research on both theoretical and practical aspects of security in sensor networks are solicited. :: Topics of Interest (but NOT limited to)Naming and addressing vulnerabilitiesKey management in wireless sensor networksSecure neighbor discovery / Secure localizationSecure PHY and MAC protocolsTrust establishmentIntrusion detection, detection of malicious behaviorDenial of serviceUser privacy, location privacyIdentity theft and phishing in sensor networksVulnerability and attack modelingJamming/Anti-jamming communicationCryptographic primitives for wireless communication:: Submission GuidelinesPapers should contain original material which have not been previously published or currently not submitted for consideration elsewhere. Manuscripts must be limited to 5 pages in IEEE Manuscript Templates for conference proceedings and formatted in accordance with the IEEE author guidelines. You can also download the template at http://www.ieee.org/web/publications/pubservices/confpub/AuthorTools/conferenceTemplates.html
. The paper should be submitted as a PDF file. At least one author of each accepted paper must register and attend the workshop to present the paper. Papers should be submitted to the following email ids-sb
cs.becs.ac.inamrita.ghosal
bcrec.orgAccepted papers will be published in IEEE Xplore:: Important DatesSubmission deadline: 1st November, 2010.Notification of acceptance: 30th November, 2010.Camera ready submission: December 10, 2010Conference: February 28 ? March 3, 2011On behalf of the Technical Program Committee and Organizers of Wireless Vitae 2011Sipra Das Bit, TPC MemberAmrita Ghosal, Invited Organizer
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.