| |||||||||||||||
SWSN 2016 : Special Issue on Security in Wireless Sensor Networks – Countermeasures and Challenges- Int. J. of Intelligent Engineering Informatics | |||||||||||||||
Link: http://www.inderscience.com/info/ingeneral/cfp.php?id=2896 | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Guest Editors:
Djallel Eddine Boubiche and Faouzi Hidoussi, University Hadj Lakhdar of Batna, Algeria Rabie A. Ramadan, Cairo University, Egypt Wireless sensors networks (WSNs) are composed of several nodes able to communicate with each other. The nodes mostly collect and aggregate data from inaccessible areas. After aggregating the data, the nodes send the results to the base station (BS) directly or through other nodes. Recently, the WSNs domain has been involved in several applications such as monitoring natural disasters, industry, healthcare and some military applications. Due to their limited resources and their wireless communication nature, WSNs are vulnerable to several types of attacks. This special issue aims to point out the security issues in WSNs. It will focus on the current countermeasures proposed to detect attacks, ensure security and enhance the performance of WSNs. The issue will also focus on the current challenges which must be taken into account when proposing such systems of security in wireless sensors networks. The issue will carry revised and substantially extended versions of selected papers presented at the International Conference on Intelligent Information Processing, Security and Advanced Communication (IPAC'2015), but we also strongly encourage researchers unable to participate in the conference to submit articles for this call. Subject Coverage Suitable topics include, but are not limited to, the following: Energy-efficient secure routing protocols for WSNs Intrusion detection systems for WSNs Hybrid intrusion detection systems for WSNs Misuse and anomaly intrusion detection systems for WSNs Cross layer intrusion detection systems for WSNs Security, reliability and privacy for WSNs Low-cost elliptic curve cryptography for WSNs Symmetric/asymmetric cryptography security for WSNs Security challenges and solutions for WSNs Middleware challenges for WSNs Notes for Prospective Authors Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. (N.B. Conference papers may only be submitted if the paper has been completely re-written and if appropriate written permissions have been obtained from any copyright holders of the original paper). All papers are refereed through a peer review process. All papers must be submitted online. To submit a paper, please read our Submitting articles page. For further information, to discuss ideas for contributions and to submit abstracts/proposals, please contact the Guest Editors: Dr. Djallel Eddine Boubiche (dj.boubiche@gmail.com) Mr. Faouzi Hidoussi (hidoussi.f@gmail.com) Dr. Rabie A. Ramadan (rabie@rabieramadan.org) Important Dates Submission of manuscripts: 15 February, 2016 Notification to authors: 15 April, 2016 Final versions due: 30 May, 2016 |
|