This event is endorsed
and organized by

8th EAI International Conference on Ad Hoc Networks

September 26–27, 2016 | Ottawa, Canada

Workshop on practical ad hoc network security and vulnerability



Half day



David Brown




Ad hoc networking offers the ability to rapidly establish and deploy a network of nodes--or provide range extension to nodes in disadvantaged locations--where no fixed infrastructure exists.  This flexibility, however, leads to a host of well-known security concerns: ad hoc networks typically have no centralized co-ordination from which to provide security services; they often operate over unreliable links where it may be difficult to distinguish simple packet loss from deliberate manipulation; it is the operational norm in mobile ad hoc networks that routes will change, making routing attacks more difficult to detect; and, depending upon the environment, unattended ad hoc nodes may be subject to loss or physical compromise.


This workshop will focus on new and innovative security solutions for ad hoc networks, with a preference for solutions that have been implemented and tested at a prototype stage.  Of interest are discussions of practical ad hoc vulnerabilities and clear evidence that the proposed, or implemented, security solutions mitigate these vulnerabilities.  Demonstrations of prototypes are welcome.


Topics of interest include (but are not limited to):

  • Techniques for measuring trust (in individual nodes or in the network)
  • Intrusion detection in mobile ad hoc networks (MANETs)
  • Encryption strategies for MANETs
  • Resilience of ad hoc networks in the presence of jamming
  • Jamming detection
  • User and/or device authentication
  • Continuous authentication




Deadline for Submission: June 27, 2016

Notification of Acceptance: July 25, 2016

Final camera-ready papers due: August 8, 2016




Prospective authors who would like to contribute to the workshop are encouraged to submit original and unpublished papers through the EAI “Confy” website:


Authors should select the “Practical ad hoc network security” track to identify that their manuscript is submitted to this workshop.


Guidelines for submitting papers are available at


Guidelines for authors, including templates, are available at


All accepted papers will be published by AdHocNets 2016 Conference Proceedings by Springer-Verlag.