The First International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST 2011)

in conjunction with ICCCN 2011

NOTE: Workshop date: July 31, 2011,

Call for Paper[PDF, WORD]

mobipst2011

 [General Info] [Scope and Topics] [Important Dates] [Submissions and Publications] [Organizing Committees] [Technical Program] [Traval Information][Contact]  


General Information

The First International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST 2011) will be held in conjunction with the 20th International Conference on Computer Communications and Networks (ICCCN 2011), in Maui, Hawaii, USA. All papers presented in MobiPST 2011 will be published in the workshop proceedings.

Outstanding papers will be invited to extend to full version for a special issue of Information - An International Interdisciplinary Journal (SCI(E)-indexed).

Scope and Topics

Recently, mobile wireless devices, such as wireless sensors, smart tags, smart pads, tablets, PDAs and smart phones, have become pervasive and attracted significant interest from academia, industry, and standard organizations. With the latest cloud computing technology, those mobile wireless devices will play a more and more important role in computing and communication. When those devices become pervasive, security, privacy and trust become critical components for the acceptance of applications build based on those devices. Moreover, several favorable characteristics of mobile and wireless devices, including portability, mobility, and sensitivity, further impose the challenge of security and privacy in those systems. Despite recent advances, many research issues still remain in the design of secure, privacy-preserving, or trust architectures, protocols, algorithms, services, and applications on mobile and wireless systems. For example, when mobile devices have more storage space, high bandwidth, and super sensing capability, more sensitive information will be stored in those devices. On the other hand, operating systems running on those devices are not as powerful and reliable as those on traditional computers. Both OS layer and higher-level layer protocols are expected to enhance the security and preserve the privacy of those devices. With more mobile devices being used in social networks and traditional web-based systems, novel trust models are essential for new applications. New cryptographic algorithms, key distribution schemes and access control policies are also encouraged by considering the special characteristics of mobile and wireless devices. Other issues such as malware, cyber threat, intrusion detection, attack modeling, security analysis, identity management and anonymity techniques also need to be revisited in mobile and wireless systems.

This workshop aims to bring together the technologists and researchers who share interest in the area of security, privacy and trust in mobile and wireless systems, as well as explore new venues of collaboration. The main purpose is to promote discussions of research and relevant activities in the models and designs of secure, privacy-preserving, or trust architectures, protocols, algorithms, services, and applications, as well as analysis on cyber threat in mobile and wireless systems. It also aims at increasing the synergy between academic and industry professionals working in this area. We plan to seek papers that address theoretical, experimental research, and work in-progress for security, privacy and trust related issues in the context of mobile and wireless systems that include, but are not limited to, the following

 

 

Important Dates

 

Paper submission due:  March 7, 2011 March 25, 2011

Acceptance notification:  April 25, 2011

Camera-ready due:  May 13, 2011

Workshop: July 31, 2011

 

Submissions and Publications

 

Authors are invited to submit manuscripts reporting original unpublished research and recent developments in the topics related to the workshop. Submissions should include an abstract, the e-mail address of the corresponding author. The manuscripts should be no longer than 6 pages in standard IEEE camera-ready format (double-column, 10-pt font). Up to two additional pages are permitted if the authors are willing to pay an over-length charge at the time of publication (manuscripts may not exceed 8 pages). Submission via EDAS at http://edas.info//N10077. Submission of a paper should be regarded as an undertaking that, should the paper be accepted, at least one of the authors will register and attend the workshop to present the work. The paper title and author name list/order cannot be changed during the final camera-ready submission.  All authors of a paper must be registered in the RIGHT order via EDAS at the SUBMISSION TIME and cannot be changed after the submission due time at EDAS. The final program will be generated from EDAS automatically

 

All papers will be peer reviewed and the comments will be provided to the authors. All accepted papers will be published in workshop proceedings.

 

Outstanding papers will be invited to extend to full targeting publication in early 2012.

 

When uploading a camera-ready at IEEE, note that the paper title, author names/affiliation and order must be IDENTICAL to the original submission for peer reviewing. No title change, author addition or removal is allowed.

 

A paper must be registered by a co-author in the full rate. It must be presented by one of registered authors in the venue.

 

Camera-ready and registration due date May 13, 2011 is FIRM. Check ICCCN homepage to find detailed instructions. Please try to complete the process as early as possible in order to avoid the rush hour, giving you time to deal with unexpected but possible issues/delay.

                   

Organizing Committees

 

Workshop Program Co-Chairs

Kewei Sha, Oklahoma City University, USA

Zhengping Wu, University of Bridgeport, USA

Technical Program Committee

        Liviu Iftode , Rutgers University, USA

        James Joshi , University of Pittsburgh, USA

        Johnson Thomas , Oklahoma State University, USA

          Keke Chen, Wright State University, USA

          Alfred Weaver, University of Virginia, USA

          Danfeng (Daphne) Yao, Virginia Tech, USA

          Sheikh Iqbal Ahamed, Marquette University, USA

          Huiqun Yu, East China University of Science and Technology, China

          William Claycomb, Sandia National Laboratories, USA

          Dongwan Shin, New Mexico Tech, USA

          Robert Greve, Oklahoma City University, USA

          Jaehong Park, University of Texas at San Antonio, USA

          Sherali Zeadally, University of the District of Columbia, USA

          Julia Deng, Intelligent Automation Inc., USA

          Safwan Al-Omari, Jordan University of Science and Technology, Jordan

          Songqing Chen, George Mason University, USA

          Gail-Joon Ahn, Arizona State University, USA

          Zhiwei Wang, Nanjing University of Posts and Telecommunications, China

          Loren Schwieber, Wayne State University, USA

          Yafei Yang, Qualcomm Inc., USA

          Rajiv Bagai, Wichita State University, USA

          Junzhao Du, Xidian University, China

 

Technical Program (Tentative)

 

09:00 - 10:15

Keynote Address: Providing Privacy and Security for Mobile Devices

Dr. Alfred Weaver (IEEE Fellow)

Alfred C. (Alf) Weaver is Professor of Computer Science and Director of the Applied Research Institute (ARI) at the University of Virginia. During his 33 years at Virginia he has been the PI or co-PI on 125+ funded research projects, published 170+ refereed journal and conference papers, and supervised 68 PhD and MS students. He teaches a popular course about electronic commerce that has a special focus on protecting privacy and providing security. His research grants span an array of interests including secure e-commerce, secure mobile computing, telemedicine, internet search engines, and computer security. In his role as Director of the ARI, he is expanding the University's research efforts with regard to cybersecurity.

 

 

 

 

10:45 - 12:15

Authentication, Cryptography and Key Management

XTEA based Secure Authentication Protocol for RFID Systems
Gul N. Khan (Ryerson University, Canada); Jack Yu (Ryerson University, Canada); Fei Yuan (Ryerson University, Canada)
Secure Authentication Protocol for RFID Systems
Gul N. Khan (Ryerson University, Canada); Markus Moessner (Ryerson University, Canada)
Security Verification of Trust-based Authentication Handover in IP Networks
Saleh Al-shadly (Goettingen, Germany); Omar Alfandi (University of Goettingen, Germany); Henrik Brosenne (University of Goettingen, Germany)
New Card Based Scheme to Ensure Security and Trust in VANET
Irshad Sumra (Universiti Technologi Petronas, Malaysia)

13:30 - 15:30

Attacks, Detection and Prevention

Bloom Filter Classifier For Deep Packet Inspection
Boyan Liu (Tsinghua University, P.R. China); Youjian Zhao (Tsinghua University, P.R. China)
Identifying Smartphone Malware Using Data Mining Technology
Hsiu-Sen Chiang (National Taichung Institute of Technology, Taiwan); Woei-Jiunn Tsaur (Da-Yeh University, Taiwan)
SIPp-DD: SIP DDoS Flood-Attack Simulation Tool
Jan Stanek (Charles University in Prague, Czech Republic); Lukas Kencl (Czech Technical University in Prague, Czech Republic)
Detecting Opportunistic Cheaters in Volunteer Computing
Matthäus Wander (University of Duisburg-Essen, Germany); Torben Weis (Universität Duisburg-Essen, Germany); Arno Wacker (University of Duisburg-Essen, Germany)
STEP: Source Traceability Elimination for Privacy against Global Attackers in Sensor Networks
Sejun Song (Texas A&M University, college station, USA); Hyungbae Park (University of Missouri-Kansas City, USA); Baek-Young Choi (University of Missouri, Kansas City, USA)
Knowledge-based Policy Conflict Analysis in Mobile Social Networks
Zhengping Wu (University of Bridgeport, USA); Yuanyao Liu (University of Bridgeport, USA)

16:00 - 18:00

Privacy, Security and Trust Protocols

Robust Wireless Sensor Network Featuring Automatic Function Alternation
Toshiaki Miyazaki (The University of Aizu, Japan); Daiki Shitara (The University of Aizu, Japan); Yuji Endo (The University of Aizu, Japan); Yuki Tanno (The University of Aizu, Japan); Hidenori Igari (The University of Aizu, Japan)
CapMan: Capability-based Defense against Multi-Path Denial of Service (DoS) Attacks in MANET
Quan Jia (George Mason University, USA); Kun Sun (George Mason University, USA); Angelos Stavrou (George Mason University, USA)
Securing Mobile Devices with Biotelemetry
Alfred C Weaver (University of Virginia, USA); Andrew Jurik (Johns Hopkins University Applied Physics Laboratory, USA)
On Secure Multi-copy based Routing in Delay Tolerant Networks
Eyuphan Bulut (Rensselaer Polytechnic Institute, USA); Boleslaw K Szymanski (Rensselaer Polytechnic Institute, USA)
HTTPI: An HTTP with Integrity
Taehwan Choi (University of Texas at Austin, USA); Mohamed Gouda (National Science Foundation, USA)

 

Travel Information

 

The reservation info of the conference hotel SHERATON MAUI RESORT & SPA is posted at the ICCCN 2011 website; http://www.icccn.org/icccn11/hotel.html. Please make the reservations ASAP to take advantage of the reduced rate for ICCCN2011 (regular rate of the famous resort is at $375+/night).

 

Authors need to send emails to icccn.register@gmail.com to request for invitation letters ONLY AFTER they registered and paid their registration fees. If a visa is needed to enter US, authors are suggested to complete the registration process and start visa application ASAP.

Contact Information

 

Kewei Sha, Oklahoma City University

Zhengping Wu, University of Bridgeport