2nd IEEE International Workshop on Data Security and PrivAcy in wireless Networks

In conjunction with IEEE WoWMoM 2011

Monday, June 20, 2011, Lucca, Italy

Submission website: http://edas.info//N9975

[Welcome]    [Submission]  [Camera Ready Instructions]  [Organization]    [Program]    [Keynote]    [Panel]

News: Extended versions of selected papers from D-SPAN workshop program will be considered for fast-track publication in the Pervasive and Mobile Computing journal (Elsevier).

Welcome to D-SPAN 2011, the Second IEEE International Workshop on Data Security and PrivAcy in wireless Networks (D-SPAN). The workshop focuses on defining novel problems and developing novel techniques for data security and privacy issues in wireless and mobile networks. With the emergence of data-intensive wireless networks such as wireless sensor networks and data-centric mobile applications such as location-based services, the traditional boundaries between these three disciplines are blurring. This workshop solicits papers from two main categories: (1) papers that consider the security and privacy of data collection, transmission, storage, publishing, and sharing in wireless networks broadly defined, e.g., MANET, cellular, vehicular, ad hoc, cognitive, as well as sensor networks, and (2) papers that use data analytics techniques to address security and privacy problems in wireless networks. The workshop provides a venue for researchers to present new ideas with impact on three communities –wireless networks, databases, and security.

The list of topics includes, but not limited to,

• Foundations in wireless security and privacy (e.g., game theory, information theory, belief models)

• Fundamental theory of a security network science

• Key exchange, distribution and management in wireless networks

• Location privacy in wireless networks

• Secure data collection and aggregation for wireless sensor networks

• Secure data collection in body-area networks

• Secure data processing in mobile ad-hoc networks (MANET)

• Secure query processing over wireless sensor networks

• Security and privacy of RFID systems

• Security and privacy for data streaming

• Security for cognitive radio networks

• Tradeoffs between Security and Communication Performance

Click here to download the pdf version of the call for papers.

Important dates:

All deadlines are at 5:00pm Pacific Standard Time (GMT-8)

Paper submission:
Friday, Feb 11, 2011

Monday, Apr 4, 2011

Camera ready version:
Thursday, April 28, 2011

Monday, June 20, 2011


We welcome original, unpublished manuscripts for 6-pages papers inclusive of all references and figures. Papers should report completed results. Vision papers and descriptions of work-in-progress are also welcomed as short paper submissions (4 pages). Papers must be written in English, and formatted according to the WoWMoM proceeding format. All accepted papers will appear in the conference proceedings published by the IEEE Computer Society Press. Consequently, each accepted paper needs to have a registration to the conference (no-show will result in exclusion of the paper from the IEEE Digital Library).

Paper submission website: http://edas.info//N9975.

Please direct any questions regarding paper submission to dspan2011 at ieee.org.


General Co-Chairs

•   Sajal K. Das
                Computer Science and Engineering
                The University of Texas at Arlington
                and National Science Foundation
                das at cse.uta.edu

•   Refik Molva
                Sophia Antipolis, France
                Refik.Molva at eurecom.fr

Program Co-Chairs

•   Guevara Noubir
                Computer and Information Science
                Northeastern University
                Boston, MA, USA
                noubir at ccs.neu.edu

•   Gene Tsudik
                Information and Computer Science
                University of California, Irvine
                Irvine, CA, USA
                gts at ics.uci.edu

•   Nan Zhang
                Computer Science
                The George Washington University
                Washington, DC, USA
                nzhang10 at gwu.edu

Program Committee

•   Tansu Alpcan, Technical University Berlin

•   Arati Baliga, AT&T Chief Security Office

•   Michel Barbeau, Carleton University

•   Levente Buttyan, Budapest U of Tech & Econ

•   Claude Castelluccia, INRIA

•   Xiuzhen Cheng, George Washington University

•   Mooi Choo Chuah, Lehigh University

•   Reza Curtmola, New Jersey Institute of Tech

•   Roberto Di Pietro, Università di Roma Tre

•   Wenliang Du, Syracuse University

•   Yuguang Fang, University of Florida

•   Xinwen Fu, University of Massachusetts Lowell

•   Loukas Lazos, University of Arizona

•   Heejo Lee, Korea University

•   Donggang Liu, University of Texas at Arlington

•   Wenjing Lou, Worcester Polytechnic Institute

•   Catherine Meadows, Naval Research Laboratory

•   Radha Poovendran, University of Washington

•   Matthew Wright, University of Texas at Arlington

•   Wei Yu, Towson University

•   Sencun Zhu, The Pennsylvania State Univ





Session 1: Wireless Security in Sensor Networks (Chair: Sajal K. Das, NSF, USA)

The Best Keying Protocol for Sensor Networks
Taehwan Choi and Hrishikesh B. Acharya (University of Texas at Austin, USA), and Mohamed Gouda (National Science Foundation, USA)

Energy-Efficient Provenance Transmission in Large-Scale Wireless Sensor Networks
S. M. Iftekharul Alam and Sonia Fahmy (Purdue University, USA)

Distributed Clone Detection in Wireless Sensor Networks: An Optimization Approach
Tamara Bonaci, Phillip Lee, Linda Bushnell, and Radha Poovendran (University of Washington, USA)

Introducing Epidemic Models for Data Survivability in Unattended Wireless Sensor Networks
Roberto Di Pietro and Nino Vincenzo Verde (Università di Roma Tre, Italy)


Coffee Break


Session 2: Wireless Security in Hostile Environments (Chair: Guevara Noubir, Northeastern University, USA)

Collaborative Jamming and Collaborative Defense in Cognitive Radio Networks
Wenjing Wang and Mainak Chatterjee (University of Central Florida, USA), and Kevin Kwiat (Air Force Research Laboratory, USA)

Optimal Selection of Sink Nodes in Wireless Sensor Networks in Adversarial Environments
Aron Laszka, Levente Buttyan, and David Szeszler (Budapest University of Technology and Economics, Hungary)

Detecting Malicious Nodes in RSS-Based Localization
Manas Maheshwari, Sai Ananthanarayanan, Arijit Banerjee, Neal Patwari, and Sneha Kumar Kasera (University of Utah, USA)

On Sampling Signal Strength for Localization Using a Directional Antenna
Yinjie Chen and Zhongli Liu (University of Massachusetts Lowell, USA), Yong Ding (Guilin University of Electronic Technology, China), and Xinwen Fu (University of Massachusetts Lowell, USA)




Session 3: Security and Privacy for Networks Broadly Defined (Chair: Nan Zhang, George Washington University, USA)

Key Management in Distributed Online Social Networks
Felix Günther (TU Darmstadt, Germany), Mark Manulis (CASED, Germany), and Thorsten Strufe (Uni Mannheim, Germany)

A Privacy Mechanism for Mobile Commerce
Anil Kumar Chorppath and Tansu Alpcan (Technical University of Berlin, Germany)

Communication and Security in Random Intersection Graphs Models
Sotiris E. Nikoletseas, Christoforos Raptopoulos, and Paul Spirakis (University of Patras, Greece)

Privacy-by-Design in ITS Applications
Antonio Kung (Trialog France), Johann-Christoph Freytag (Humboldt-University, Berlin), and Frank Kargl (University of Twente, the Netherlands)


Coffee Break


Session 4: Panel (Security and Privacy in Mobile Cloud Computing)

Panel moderator: Sajal K. Das, NSF, USA
- Erik-Oliver Blass, EURECOM, France
- Barbara Carminati, University of Insubria, Italy
- Mario Di Francesco, University of Texas at Arlington, USA
- Mohamed Gouda, National Science Foundation and University of Texas at Austin, USA
- Nan Zhang, The George Washington University, USA


Closing Remarks and Open Discussions

Camera Ready Instruction

Note: The following information is copied from the main conference site of WoWMoM 2011 (with minor modifications to tailor it to the workshop) for your convenience.

The following must be ensured by April 28, 2011, in order for your paper to be included in the conference proceedings.

•   Please format your paper according to the instructions here. You are allowed 6 pages. One extra page may be purchased with an overlength charge of USD 150 - paid during registration.

•   IEEE PDF compliance must be checked at IEEE PDF Xpress+, and a proof of this must be provided (see here for details).

•   The camera-ready version of the paper must be submitted (see here).

•   The IEEE Copyright Form must be submitted by e-mail to wowmomcopyright@gmail.com. See instructions here.

•   At least one author must be registered to WoWMoM 2011 with a full registration status.


Topic: Security and Privacy in Mobile Cloud Computing

Moderator: Sajal K. Das, National Science Foundation and University of Texas at Arlington, USA

- Erik-Oliver Blass, EURECOM, France
- Barbara Carminati, University of Insubria, Italy
- Mario Di Francesco, University of Texas at Arlington, USA
- Mohamed Gouda, National Science Foundation and University of Texas at Austin, USA
- Nan Zhang, The George Washington University, USA