Workshop on Security in Self-Organizing Networks (SelfNet'16)
In recent years huge number of new wireless applications have been developed and deployed to facilitate communication and to help people in their everyday lives. However, wireless networks are only as good as the information they produce. Due to the fact that individual nodes in the network communicate by radio, wireless self-organizing networks such as mobile ad-hoc networks (MANET), Wireless sensor networks (WSN), Wireless mesh networks (WMN), Vehicular ad-hoc networks (VANET) are inherently vulnerable to security attacks.
The main goal of International Workshop on Security in Self-Organizing Networks (SelfNet) is to bring together researchers and practitioners in an attempt to identify the fundamental security challenges and future prospects. Technical papers describing original, previously unpublished research, not currently under review, are solicited. The first two editons of SelfNet (2012 & 2014) were co-located with the International Conference on Security in Computer Networks and Distributed Systems (SNDS).
All papers that conform to submission guidelines will be peer reviewed and evaluated based on originality, technical and/or research content/depth, correctness, relevance to conference, contributions, and readability. Acceptance of papers will be communicated to authors by email. All accepted papers will be published in the Conference proceedings. Further instructions for submission are posted at http://acn-conference.org/sscc2016/submission.html
Topics of interest include but not limited to:
- Authentication mechanisms
- Capacity planning and admission control
- Charging and secure payment
- Cooperation and mitigating non-cooperative behavior
- Cross-layer security
- Cryptographic primitives for wireless communication
- Security in Delay tolerant and Opportunistic networks
- Economics of wireless security
- Energy-efficient security protocols
- Identity theft and phishing
- Incentive-aware secure protocol design
- Intrusion, attack and malicious behavior detection
- Jamming and anti-jamming security protocols
- Key management and trust establishment
- Secure routing protocols
- Monitoring and surveillance
- Privacy and anonymity
- Quantitative evaluation of wireless system security
- Resilient virtual infrastructures
- Secure localization and positioning
- Secure PHY and MAC protocols
- Security and performance tradeoff
- Self-awareness and context-awareness
- User and location privacy
- Vulnerabilities, attacks and countermeasures
- Wireless threat modeling and security analysis
Technical Program Committee
- Paulo Gondim, Universidade de Brasilia, Brazil
- Muhammad Imran Khan, University of Toulouse, France
- Michael Lauer, Michael Lauer Information Technology, Germany
- Wolfgang Apolinarski, Locoslab GmbH, Germany
- Emmanouel Varvarigos, University of Patras & Computer Technology Institute, Greece
- Stefanos Gritzalis, University of the Aegean, Greece
- Tao Zhang, Chinese University of Hong Kong, Hong Kong
- Sudarshan Tsb, Amrita Vishwa Vidyapeetham University, India
- Pawan Bhandari, Intel, India
- Ravi Kodali, National Institute of Technology, Warangal, India
- Giuseppe Ruggeri, University of Reggio Calabria, Italy
- Setyawan Widyarto, Universiti Selangor, Malaysia
- Mohammad Faiz Liew Abdullah, Universiti Tun Hussein Onn Malaysia (UTHM), Malaysia
- Clement Temaneh-Nyah, University of Namibia, Namibia
- Jiping Xiong, Zhejiang Normal University, P.R. China
- Liang Zhou, Nanjing University of Posts and Telecommunications, P.R. China
- Xiaolin Chang, Beijing Jiaotong University, P.R. China
- Dariusz Gasior, Wroclaw University of Technology, Poland
- Adrianna Kozierkiewicz-Hetmanska, Wroclaw University of Technology, Poland
- Abdelouahid Derhab, King Saud University, Saudi Arabia
- Houcine Hassan, Universidad Politecnica de Valencia, Spain
- Javier García Villalba, Universidad Complutense de Madrid, Spain
- Gwo-Jiun Horng, Southern Taiwan University of Science and Technology, Taiwan
- Chien-Fu Cheng, Tamkang University, Taiwan
- Tzung-Pei Hong, National University of Kaohsiung, Taiwan
- Chang Wu Yu, Chung Hua University, Taiwan
- Jia-Chin Lin, National Central University, Taiwan
- Benoit Hudzia, SAP Research, United Kingdom
- Yurong Xu, Dartmouth College, USA
- Giuseppe Raffa, Intel Corporation, USA
- Phan Cong-Vinh, NTT University, Vietnam
Key Dates
Full Paper Submission Ends | June 25, 2016 |
Acceptance Notification | July 15, 2016 |
Final paper Deadline | July 31, 2016 |