A special issue of International Journal of Security and Networks
Sensors and sensor networks have attracted considerable research interest because of their potential in providing diverse services to pervasive computing applications, not only in science and engineering, but also, equally importantly, in issues related to critical infrastructure protection, security, health care, environment protection, energy, etc. The ad-hoc networking technology has also enabled sensor nodes to connect with each other via wireless communications in a much easier way. The flexibility of installing and configuring a sensor network is thus greatly improved.
However, security concerns remain a serious impediment to widespread adoption of wireless sensor networks. The underlying communication medium for wireless networks provides serious exposure to attacks against wireless networks. Wireless sensor networks cannot usually depend on the traditional infrastructure found in enterprise environments, such as dependable power sources, high bandwidth, and continuous connectivity. Without adequate security, enterprises will not be able to profit from the use of wireless sensor networks, defence organisations might be unable to guarantee the safety of their personnel, and wireless sensor networks will remain on the drawing board, even if the other problems associated with them are solved.
The scope of this special issue covers from basic concerns, such as system security, network security, privacy, and identification technologies, to application concerns, such as gathering information in a hostile environment, tracing mobile attackers, intrusion detection, and secure routing in wireless sensor network.
The special issue invites quality papers articulating new perspectives in the above directions. Both original research papers and application papers describing challenging system development are welcome. Reports of practical implementation are also welcome.
Any paper should have security in sensor networks as the focus. Specific areas of interest include, but are not limited to:
- Intrusion detection
- Location/data privacy enhancing technologies
- Authentication and access control
- Tracing mobile attacker
- Secure routing
- Secure communication protocols
- Availability and reliability
- Key management in wireless sensor network
- Denial of service
- Monitoring and surveillance
- Energy efficient cryptographic primitives
- Secure neighbor discovery
- Phishing in mobile environment
- Identity theft
Submission deadline: 30 September 2008
Notification: 31 December 2008
Final Paper Submission: 31 January 2009
No comments:
Post a Comment