[Tccc] CFP: Wiley Security and Communication Networks Journal

Liang, Qilian liang
Wed Sep 21 11:04:55 EDT 2011


********************************************************
                     CALL FOR PAPERS 
        Wiley Security and Communication Networks Journal

                    Special Issue on: 
Security in Machine to Machine Communications and Applications
*********************************************************
*********************************************************

*********************
BACKGROUND AND SCOPE
*********************
	
Machine-to-Machine (M2M) refers to technologies that allow both wireless and wired systems to communicate with other devices of the same ability. M2M uses a device (such as a sensor or meter) to capture an event (such as temperature, inventory level, etc.), which is relayed through a network to an application, that translates the captured event into meaningful information. Modern M2M communication has expanded beyond a one-to-one connection and changed into a system of networks that transmits data to personal appliances, which is eventually enabling the flow of data between machines and machines and ultimately machines and people. It is predicted that the number of connections for embedded M2M applications will jump to 428 million by 2014, from 87 million in 2009. As service availability increases, new M2M applications come online, and regulatory and policy initiatives dictate a ?connected society.?  M2M communications and applications present critical requirements for security in data collection and transmission of selected data through a communication network. This special issue is seeking original research and review papers on security in M2M communications and applications. Submissions of applications-oriented papers describing case studies and simulations are encouraged as well. 
	
This special issue focuses on the study of all aspects of security in M2M communications and applications. It will include manuscripts extended from selected papers presented at Chinacom 2011 and manuscripts submitted in response to this open call. All manuscripts are subjected to rigorous reviews as per the policy of this journal before they can be accepted for publication. Topics of interest include (but are not limited to):

?	Security in M2M data collection
?	Security in M2M data transmission 
?	Security in Smart Grid 
?	Sensor network security
?	Peer-to-peer system security
?	Public-key cryptography
?	Revocation of malicious parties
?	Mobile code security
?	Security specification techniques
?	Self-healing networks
?	Mobile network security
?	Location aware security in mobile networks
?	Throughput-security trade-offs in wireless networks
?	Secure group multimedia communications
?	Secure PHY/MAC/routing protocols
?	Secure cooperation in wireless networks
?	Attacks on security and vulnerability analysis
?	Application layer encryption
?	Capacity and security analysis of covert channels
?	Symmetric key cryptography
?	Transport Layer Security (TLS)
?	Heterogeneous networks and systems
?	Secure Socket Layer (SSL)
?	Security modeling and protocol design
?	Authentication protocols
?	Biometric security: technologies, risks and vulnerabilities
?	Critical infrastructure security
?	Key distribution and management
?	Distributed systems security
?	DNS spoofing and security
?	Encryption standards
?	Financial cryptosystems
?	Formal trust models
?	Intrusion avoidance
?	IPv6 security and IPSec
?	Deployment and management of computer/network security policies
?	Trust establishment
?	Upper-layer authentication
?	Virtual private networks security
?	Web, e-commerce, m-commerce, and e-mail security
?	Power-reliability-security trade-offs in wireless networks
?	Cross-layer approaches to security
?	Security Engineering
?	Secure naming
?	Distributed Denial-Of-Service (DDOS) attacks and countermeasures
?	Light-weight cryptography
?	Quantum cryptography and quantum key
?	Distribution network security metrics and performance evaluation

**********************
SUBMISSION GUIDELINES
**********************
High-quality original papers are solicited. Papers must be unpublished and must not be submitted for publication elsewhere. All papers will be peer reviewed according to the guidelines of Wiley?s Security and Communication Networks Journal to ensure high quality and relevance to the Special Issue. 

All submissions should be prepared by following the guidelines given in Section ?For Authors? at http://www.interscience.wiley.com/security.

Prospective authors should submit their paper online at http://mc.manuscriptcentral.com/scn. 

When submitting the papers, the authors should make sure to choose the manuscript type as ?Special Issue?, enter the ?Running Head? and the ?Special Issue title? as ?SCN-SI-037? and ?Security in M2M?, respectively.


*****************
IMPORTANT DATES
*****************
Paper Submission Deadline: 1 November 2011
First Round of Reviews: 1 February 2012
Revision Submission Deadline:  1 March 2012
Notification of Acceptance: 1 April 2012


****************
GUEST EDITORS
****************
 
Victor C. M. Leung
University of British Columbia, Canada
E-mail: vleung at ece.ubc.ca 

Qilian Liang
University of Texas at Arlington, USA
E-mail: liang at uta.edu

Weixiao Meng
Harbin Institute of Technology, China
E-mail: wxmeng at hit.edu.cn

Fumiyuki Adachi
Tohoku University, Japan
E-mail: adachi at ecei.tohoku.ac.jp

Jian Ren
Michigan State University, USA
E-mail: renjian at egr.msu.edu




More information about the TCCC mailing list