This event is endorsed
and organized by

8th EAI International Conference on Ad Hoc Networks

September 26–27, 2016 | Ottawa, Canada

Workshop on practical ad hoc network security and vulnerability

 

DURATION

Half day

 

CHAIR

David Brown

 

CALL FOR PAPERS

 

Ad hoc networking offers the ability to rapidly establish and deploy a network of nodes--or provide range extension to nodes in disadvantaged locations--where no fixed infrastructure exists.  This flexibility, however, leads to a host of well-known security concerns: ad hoc networks typically have no centralized co-ordination from which to provide security services; they often operate over unreliable links where it may be difficult to distinguish simple packet loss from deliberate manipulation; it is the operational norm in mobile ad hoc networks that routes will change, making routing attacks more difficult to detect; and, depending upon the environment, unattended ad hoc nodes may be subject to loss or physical compromise.

 

This workshop will focus on new and innovative security solutions for ad hoc networks, with a preference for solutions that have been implemented and tested at a prototype stage.  Of interest are discussions of practical ad hoc vulnerabilities and clear evidence that the proposed, or implemented, security solutions mitigate these vulnerabilities.  Demonstrations of prototypes are welcome.

 

Topics of interest include (but are not limited to):

  • Techniques for measuring trust (in individual nodes or in the network)
  • Intrusion detection in mobile ad hoc networks (MANETs)
  • Encryption strategies for MANETs
  • Resilience of ad hoc networks in the presence of jamming
  • Jamming detection
  • User and/or device authentication
  • Continuous authentication

 

IMPORTANT DATES

 

Deadline for Submission: June 27, 2016

Notification of Acceptance: July 25, 2016

Final camera-ready papers due: August 8, 2016

 

SUBMISSION

 

Prospective authors who would like to contribute to the workshop are encouraged to submit original and unpublished papers through the EAI “Confy” website: http://confy.eai.eu/entry.html.

 

Authors should select the “Practical ad hoc network security” track to identify that their manuscript is submitted to this workshop.

 

Guidelines for submitting papers are available at

http://adhocnets.org/2016/show/initial-submission.

 

Guidelines for authors, including templates, are available at

http://adhocnets.org/2016/show/authors-kit.

 

All accepted papers will be published by AdHocNets 2016 Conference Proceedings by Springer-Verlag.