[Welcome] [Submission] [Camera Ready Instructions] [Organization] [Program] [Keynote] [Panel]
D-SPAN
2011
2nd IEEE International Workshop on Data Security and PrivAcy in wireless Networks
In conjunction with IEEE WoWMoM 2011
Monday, June 20, 2011, Lucca, Italy
Submission website: http://edas.info//N9975
[Welcome] [Submission] [Camera Ready Instructions] [Organization] [Program] [Keynote] [Panel]
News: Extended versions of selected papers from D-SPAN workshop program will be considered for fast-track publication in the Pervasive and Mobile Computing journal (Elsevier).
Welcome to D-SPAN 2011, the Second IEEE International Workshop on Data Security and PrivAcy in wireless Networks (D-SPAN). The workshop focuses on defining novel problems and developing novel techniques for data security and privacy issues in wireless and mobile networks. With the emergence of data-intensive wireless networks such as wireless sensor networks and data-centric mobile applications such as location-based services, the traditional boundaries between these three disciplines are blurring. This workshop solicits papers from two main categories: (1) papers that consider the security and privacy of data collection, transmission, storage, publishing, and sharing in wireless networks broadly defined, e.g., MANET, cellular, vehicular, ad hoc, cognitive, as well as sensor networks, and (2) papers that use data analytics techniques to address security and privacy problems in wireless networks. The workshop provides a venue for researchers to present new ideas with impact on three communities –wireless networks, databases, and security.
The list of topics includes, but not limited to,
• Foundations in wireless security and privacy (e.g., game theory, information theory, belief models)
• Fundamental theory of a security network science
• Key exchange, distribution and management in wireless networks
• Location privacy in wireless networks
• Secure data collection and aggregation for wireless sensor networks
• Secure data collection in body-area networks
• Secure data processing in mobile ad-hoc networks (MANET)
• Secure query processing over wireless sensor networks
• Security and privacy of RFID systems
• Security and privacy for data streaming
• Security for cognitive radio networks
• Tradeoffs between Security and Communication Performance
Click here to download the pdf version of the call for papers.
Important dates:
All deadlines are at 5:00pm Pacific Standard Time (GMT-8)
Paper submission:
Friday, Feb 11, 2011
Notification:
Monday, Apr 4, 2011
Camera ready version:
Thursday, April 28, 2011
Workshop:
Monday, June 20, 2011
Submission
We welcome original, unpublished manuscripts for 6-pages papers inclusive of all references and figures. Papers should report completed results. Vision papers and descriptions of work-in-progress are also welcomed as short paper submissions (4 pages). Papers must be written in English, and formatted according to the WoWMoM proceeding format. All accepted papers will appear in the conference proceedings published by the IEEE Computer Society Press. Consequently, each accepted paper needs to have a registration to the conference (no-show will result in exclusion of the paper from the IEEE Digital Library).
Paper submission website: http://edas.info//N9975.
Please direct any questions regarding paper submission to dspan2011 at ieee.org.
Organization
General Co-Chairs • Sajal K. Das • Refik Molva |
Program Co-Chairs • Guevara Noubir • Gene Tsudik | |
• Nan Zhang
|
Program Committee
• Tansu Alpcan, Technical University Berlin • Arati Baliga, AT&T Chief Security Office • Michel Barbeau, Carleton University • Levente Buttyan, Budapest U of Tech & Econ • Claude Castelluccia, INRIA • Xiuzhen Cheng, George Washington University • Mooi Choo Chuah, Lehigh University • Reza Curtmola, New Jersey Institute of Tech • Roberto Di Pietro, Università di Roma Tre • Wenliang Du, Syracuse University |
• Yuguang Fang, University of Florida • Xinwen Fu, University of Massachusetts Lowell • Loukas Lazos, University of Arizona • Heejo Lee, Korea University • Donggang Liu, University of Texas at Arlington • Wenjing Lou, Worcester Polytechnic Institute • Catherine Meadows, Naval Research Laboratory • Radha Poovendran, University of Washington • Matthew Wright, University of Texas at Arlington • Wei Yu, Towson University • Sencun Zhu, The Pennsylvania State Univ |
Program
9:00-9:15 | Welcome |
9:15-10:45 | Session 1: Wireless Security in Sensor Networks (Chair: Sajal K. Das, NSF, USA) |
The Best Keying Protocol for Sensor Networks | |
Energy-Efficient Provenance Transmission in Large-Scale Wireless Sensor Networks | |
Distributed Clone Detection in Wireless Sensor Networks: An Optimization Approach | |
Introducing Epidemic Models for Data Survivability in Unattended Wireless Sensor Networks | |
10:45-11:15 | Coffee Break |
11:15-12:45 | Session 2: Wireless Security in Hostile Environments (Chair: Guevara Noubir, Northeastern University, USA) |
Collaborative Jamming and Collaborative Defense in Cognitive Radio Networks | |
Optimal Selection of Sink Nodes in Wireless Sensor Networks in Adversarial Environments | |
Detecting Malicious Nodes in RSS-Based Localization | |
On Sampling Signal Strength for Localization Using a Directional Antenna | |
12:45-14:00 | Lunch |
14:00-15:30 | Session 3: Security and Privacy for Networks Broadly Defined (Chair: Nan Zhang, George Washington University, USA) |
Key Management in Distributed Online Social Networks | |
A Privacy Mechanism for Mobile Commerce | |
Communication and Security in Random Intersection Graphs Models | |
Privacy-by-Design in ITS Applications | |
15:30-16:00 | Coffee Break |
16:00-17:45 | Session 4: Panel (Security and Privacy in Mobile Cloud Computing) |
Panel moderator: Sajal K. Das, NSF, USA | |
17:45-18:00 | Closing Remarks and Open Discussions |
Camera Ready Instruction
Note: The following information is copied from the main conference site of WoWMoM 2011 (with minor modifications to tailor it to the workshop) for your convenience.
The following must be ensured by April 28, 2011, in order for your paper to be included in the conference proceedings.
• Please format your paper according to the instructions here. You are allowed 6 pages. One extra page may be purchased with an overlength charge of USD 150 - paid during registration.
• IEEE PDF compliance must be checked at IEEE PDF Xpress+, and a proof of this must be provided (see here for details).
• The camera-ready version of the paper must be submitted (see here).
• The IEEE Copyright Form must be submitted by e-mail to wowmomcopyright@gmail.com. See instructions here.
• At least one author must be registered to WoWMoM 2011 with a full registration status.
Panel
Topic: Security and Privacy in Mobile Cloud Computing Moderator: Sajal K. Das, National Science Foundation and University of Texas at Arlington, USA
Panelists:
- Erik-Oliver Blass, EURECOM, France
- Barbara Carminati, University of Insubria, Italy
- Mario Di Francesco, University of Texas at Arlington, USA
- Mohamed Gouda, National Science Foundation and University of Texas at Austin, USA
- Nan Zhang, The George Washington University, USA