| |||||||||||||||||
NGWNS 2014 : Handbook of Research on Next Generation Wireless Network Security and Privacy | |||||||||||||||||
Link: http://www.igi-global.com/publish/call-for-papers/call-details/1279 | |||||||||||||||||
| |||||||||||||||||
Call For Papers | |||||||||||||||||
Call for Chapters: Handbook of Research on Next Generation Wireless Network Security and Privacy
Editors Dr. Kamaljit I. Lakhtaria Department of Computer Science & Engineering Sir Padampat Singhania University Udaipur - 313601, Rajasthan, India Call for Chapters Proposals Submission Deadline: March 30, 2014 Full Chapters Due: July 30, 2014 Introduction For release in the Advances in Information Security, Privacy, and Ethics (AISPE) Book Series. ISSN: 1948-9730 The Advances in Information Security, Privacy, & Ethics (AISPE) Book Series is the source for this research, as the series provides only the most cutting-edge research on how information is utilized in the digital age. Rapid advances in wireless communications and networking technologies are gradually making the dream of ubiquitous high-speed network access a reality. Next Generation Wireless Networks including communication networks Next Generation Networks (NGN), 3G, 4G, Long Term Evolution (LTE), Wireless LANs, PANs, WiMax, ad hoc networks, Mobile ad hoc networks (MANETs), Wireless Sensor Networks (WSNs). Unlike the wired networks, the unique characteristics of wireless networks pose a number of nontrivial challenges to security design, such as open peer-to-peer network architecture, shared wireless medium, stringent resource constraints, highly dynamic network topology, and absence of a trusted infrastructure. Ubiquitous roaming impacts on a radio access system by requiring that it supports handover between neighboring cells and different networks. Also, mobile networks are more exposed to interferences than wired networks. Such ubiquitous network access allows vandals and criminals to exploit vulnerabilities in networked systems on a widespread basis. This situation makes security and privacy designs for emerging wireless networks both critical and challenging. Security mechanism in wireless networks are indispensable to secure access control, authentication, authorization, confidentiality, data security, user confidentiality, quality of service and quality of experience for users. As a result, today research empowered towards wireless networks preserving trust, security and privacy at the same time. Objective This book looks to discuss research focuses on Next Generation Wireless Network security including network security, cryptography, user authentication, various types of attacks & their counter measures, secure routing algorithm, intrusion detection, security algorithms, performance analysis of various tools and proposed techniques, security issues, privacy management, smart phone application security, and key management. Target Audience Academicians, Research Supervisors, Researchers, Advanced level Students, Technology Developers and Corporate Organizations will find this Handbook useful for their Research, Advance Concept Study and Product Development. Topics in this Handbook will assist Researchers and technology developers to pertinent topics and assisting in their own research efforts in this field. Recommended Topics Contributors are welcome to submit chapters on the following topics relating to Next Generation wireless network security and privacy management: Authentication Models in Next Generation Networks (NGNs) Authorization Models in Next Generation Networks (NGNs) Cross-layer design for trust, security and privacy in Next Generation wireless networks Cryptographic Algorithms for Next Generation wireless networks Security Economics of Next Generation wireless network security Intrusion detection and tolerance in Next Generation Wireless Network Key management in Next Generation wireless networks Privacy management for Next Generation wireless networks Research Models for Next Generation wireless networks security Security challenges in Next Generation Wireless Networks Secure roaming for Next Generation wireless communication networks Secure Routing in Wireless Network Security in ad-hoc networks (MANETs) Security in Sensor Networks (WSNs) Security in Wireless Private Networks Threat and vulnerability analysis for wireless communication Trust establishment, negotiation, and management in Wireless Networks User Privacy Management in Wireless Networks Wireless Network security protocols Submission Procedure Researchers and practitioners are invited to submit on or before March 30, 2014, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Submissions should be made through the link at the bottom of this page. Authors of accepted proposals will be notified by May 30, 2014 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by July 30, 2014. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project. Publisher This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the "Information Science Reference" (formerly Idea Group Reference), "Medical Information Science Reference," "Business Science Reference," and "Engineering Science Reference" imprints. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2016. Important Dates March 30, 2014: Proposal Submission Deadline May 30, 2014: Notification of Acceptance July 30, 2014: Full Chapter Submission September 30, 2014: Review Results Returned November 15, 2015: Final Chapter Submission January 31, 2015: Final Deadline Inquiries Dr. Kamaljit I Lakhtaria Sir Padampat Singhania University, Udaipur - 313601, Rajasthan, India Tel.: (91) 98795 15909, E-mail: kamaljit.ilakhtaria@gmail.com |
|