[Tccc] CALL FOR BOOK CHAPTER: Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications
Danda B. Rawat
dbrawatatgmail.com
Thu Sep 27 13:06:51 EDT 2012
Call for Book Chapters: "Security, Privacy, Trust, and Resource Management
in Mobile and Wireless Communications"
http://people.eku.edu/rawatd/books/wireless/
Proposal Submission: Sept. 30, 2012
Notification of Acceptance: Nov. 30, 2012
Full Chapter Submission: Jan. 31, 2013.
---------------
Synopsis
---------------
After successful deployment of Wi-Fi and cellular networks in the past
decade, wireless and mobile communication systems became the fastest
growing sectors of the communication industry. Almost all businesses which
rely on wireless and mobile networks expect the same or the like level of
security, privacy and trust as the ones that exist in wired networks to
ensure the integrity and confidentiality of communications among terminals,
networks, applications, and services. Security is of vital importance to
ensure integrity of communications in wireless and mobile networks. Yet, it
is very challenging to ensure security, privacy, trust and resource
management because of the mobility of network nodes. The process of
collecting and conveying wireless and mobile network security, privacy and
trust knowledge is possible through the creation of a comprehensive book which
provides current status and future trends on the topic. Unfortunately, such
a collection of research on wireless and mobile network
security/privacy/trust does not exist. The forthcoming book on Security,
Privacy, Trust, and Resource Management in Mobile and Wireless
Communications is devoted to putting together all the latest developments
and rigorous studies of the foundations in these topics so that new
breakthroughs and directions can be fostered. The contents of the book will
provide state-of-the-art of research results and future trends related to
security, privacy, trust and resource management in wireless and mobile
networks including Wireless Personal Area Networks (WPANs), Wireless Local
Area Networks (WLANs), Worldwide interoperable Microwave Access (WiMAX)
networks, Wireless Wide Area Networks (WWANs), cellular networks, IP-based
mobile networks and security issues in mobile apps and other emerging
topics such as vehicular ad hoc networks, cognitive radios networks,
wireless sensor networks, mobile ad hoc networks, healthcare and smart
grid. This book will cover fundamental to advance concepts necessary for
the grasp of current issues, challenges and solutions to future trends for
wireless and mobile network in one place.
Topics include (but are not limited to):
This book will include (but will not be limited to) the following topics.
Any other related topics in the area of wireless and mobile network
security are also welcome.
- Resource Allocation in Wireless and Mobile Communication Systems
- Privacy, Trust and Security Architectures and Protocols
- Resource Allocation and Interference Mitigation in Mobile and Wireless
Systems
- Information Theoretic Approaches for Security and Resource Management
- Security, privacy, and resource management in Wireless Access Networks
(WPAN, WLAN, WLL, etc.)
- Security, Privacy, and Resource Management in Broadband Wireless
Technologies (HSDPA, HSUPA, LTE, WiMAX, WiRAN, etc.)
- Security and Resource Management in Mobile Telecommunication
- Security, Privacy, and Resource Management in IP-based Mobile Networks
- Security, Privacy, Trust and Resource Management in Mobil Ad hoc
Networks, Vehicular Ad hoc Networks and Wireless Sensor Networks.
- Security and Privacy in Smart Grid Communications
- Security and Privacy issues with Mobile Applications
- Security, Privacy, Trust and Resource Allocation in Cognitive Radio
Networks
- Security and Privacy in Next Generation Mobile Networks
- WAN/Internet Security
- Intrusion Detection System (IDS)/Intrusion Prevention System (IPS)
- Security and Privacy in E-Commerce, e-Business and e-Government and
Enterprise
- Security in Collaboration Computing Systems
- Security, privacy, Trust and Resource Management in in Cloud and Cluster
Computing Systems
- Security and Privacy in Mobile Cloud and Grid Computing
- Security, Privacy, Trust and Resource Management in Mobile Computing
Systems
- Web and Web Services Security
- Cryptography for Wireless and Mobile Networks
- Cryptographic Protocols for Mobile and Wireless Networks
- Security and Privacy Models for Ambient Intelligence Environments
- Design and Analysis of Cryptographic Algorithms
- Location Privacy and Security
- Economics of Security and Privacy
- Security and Privacy in Pervasive/Ubiquitous Computing
- PHY/MAC/Routing/Transport/Application layer Protocols and Security
- Security, Privacy and Trust Management in Under Resource Constraints
- Security, Privacy and Resource Management in Underwater Communications
- Security and Resource Management in Satellite Communications
- Standardization, Testbbeds and Case Studies
------------------------
Submission Procedure:
------------------------
Researchers and practitioners are invited to submit on or before September
30, 2012, a 2-3 page chapter proposal clearly explaining the mission of his
or her proposed chapter to db.ra... at ieee.org. Authors of accepted proposals
will be notified by November 30, 2012 about the status of their proposals
and sent chapter guidelines. Full chapters are expected to be submitted by
January 31, 2013. All submitted chapters will be reviewed on a double-blind
review basis. Contributors may also be requested to serve as reviewers for
this project.
----------------------
Full Book Chapter:
---------------------
Authors whose proposals are accepted will be required to submit a complete
book chapter by January 31, 2013. A bookchapter is required to be 15 to 25
pages (9,500 to 12,500 words). Authors are required to submit the complete
bookchapter in the format linked here (Download the format)
-------------------
Important Dates:
--------------------
Proposal Submission Deadline: September 30, 2012
Notification of Acceptance: November 30, 2012
Full Chapter Submission: January 31, 2013
Review Results Returned: March 15, 2013
Final Chapter Submission: May 15, 2013
Anticipated Publication Date: Fall 2013
------------------------------------
Editorial Advisory Board Members:
------------------------------------
Akio Koyama, Yamagata University, Japan
Chotipat Pornavalai, King Mongkut's Institute of Technology Ladkrabang,
Thailand
Farookh Khadeer Hussain, University of Technology, Sydney, Australia
Fatos Xhafa, Universitat Politcnica de Catalunya, Barcelona, Spain
Rajesh Kumar Sharma, Ilmenau University of Technology, Germany
Samiur Arif, Old Dominion University, USA
Shaharuddin Salleh, University Teknology Malaysia, Malaysia
Xu Li, Research scientist, Inria, France
Weiming Yang, Chongqing University, China
---------------------------------------------------------------------------
INQUIRIES and SUBMISSIONS can be forwarded electronically to the editor(s):
---------------------------------------------------------------------------
Danda B. Rawat, PhD (Corresponding Editor)
Eastern Kentucky University
521 Lancaster Ave, 307 Whalin
Richmond, KY 40475, USA
Tel.: +1 (859) 622- 6971
E-mail: db.ra... at ieee.org
Bhed B. Bista, PhD
Iwate Prefectural University
Takizawa, Iwate
Japan 020-0193
E-mail: b... at iwate-pu.ac.jp
Gongjun Yan, PhD
Indiana University
Room Hunt Hall 206F
2300 S. Washington St
Kokomo, IN 46904, USA
E-mail: go... at iuk.edu
_______________________________________________
IEEE Communications Society Tech. Committee on Computer Communications
(TCCC) - for discussions on computer networking and communication.
Tccc at lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc
More information about the TCCC
mailing list