Abbrevation
WiSec
City
Tucson
Country
United States
Deadline Paper
Start Date
End Date
Abstract

As wireless and mobile networking becomes ubiquitous, security and privacy become increasingly critical&#046; The focus of the ACM Conference on Wireless Network Security (ACM WiSec) is on exploring vulnerabilities, threats, and attacks in wireless communications and the techniques needed to address them&#046; Settings of interest include cellular, metropolitan, mesh, local&#8211;area, personal&#8211;area, home, vehicular, sensor, ad hoc, satellite, cognitive radio, RFID, and underwater networks as well as systems using non&#8211;RF wireless communication&#046;<br>The conference is soliciting contributions to topics including<br>but not limited to:<br>&#8211; Key management in wireless/mobile environments* Secure services (neighbor discovery, localization, etc&#046;)<br>&#8211; Secure PHY and MAC protocols<br>&#8211; Trust establishment<br>&#8211; Intrusion, attack, and malicious behavior detection<br>&#8211; Denial of service<br>&#8211; User and location privacy<br>&#8211; Anonymity, unobservability, prevention of traffic analysis<br>&#8211; Identity theft and phishing in mobile networks<br>&#8211; Charging &amp; secure payment<br>&#8211; Cooperation and mitigating non?cooperative behavior<br>&#8211; Economics of wireless security<br>&#8211; Vulnerability and attack modeling<br>&#8211; Incentive&#8211;aware secure protocol design<br>&#8211; Jamming/Anti&#8211;jamming communication<br>&#8211; Cross&#8211;layer design for security<br>&#8211; Monitoring and surveillance<br>&#8211; Cryptographic primitives for wireless communication<br>&#8211; Theoretical foundations and formal methods for wireless security and privacy<br>&#8211; Security and privacy of mobile OS and mobile applications<br>&#8211; Secure delay&#8211; and disruption&#8211;tolerant networking<br>&#8211; Secure non&#8211;RF wireless communication (e&#046;g&#046;, ultrasound, vision, laser)<br>&#8211; Security/privacy in wireless smart grid and smart metering applications<br>&#8211; Security/privacy in wireless network coding<br>&#8211; Security/privacy in wireless/ephemeral social networking<br>&#8211; Security/privacy in mobile/wireless cloud services<br>