Security Issues and Design Requirements in Wireless Communications

Due to constant increase in user need and convenience, the complexity of the communication system has taken a quantum jump necessitating the security of such systems essential and challenging. Besides these, the growing need of wireless, ad-hoc and sensor networks pose threats of a new dimension. Design of efficient communication protocols for such systems are of utmost concern to perk up the performance. The special session will serve as a platform to cover the advanced topics and approaches towards security issues and design requirements in communications.

Authors should submit their papers online using EDAS. Unregistered authors should first create an account on EDAS to log on. Further guidelines for submission are posted at:

Topics of interest include, but are not limited to:

  • Authentication and access Control schemes
  • Reliability and Availability issues in communication
  • Design of Cryptographic protocols for communication
  • Design of end-to-end security solutions
  • Denial of Service prevention
  • Security and privacy in optical, mobile, and satellite communication
  • Location discovery and location management in mobile infrastructure
  • Key distribution and management for secured communication
  • Intrusion detection and prevention
  • Efficient data gathering and processing
  • Modeling and performance analysis
  • Quality of Service
  • Robustness and fault tolerance
  • Design of secured routing protocols and architectures
  • Energy efficiency in communication
  • Practical systems, case studies, prototypes, and test-beds for secure services
  • Emerging technologies

All papers that conform to submission guidelines will be peer reviewed and evaluated based on originality, technical and/or research content/depth, correctness, relevance to conference, contributions, and readability. The manuscripts should be submitted in PDF format. Acceptance of papers will be communicated to authors by email. At least one full paying author of each accepted paper must register for the conference before the indicated deadline. Accepted and presented papers will be published in the conference proceedings and submitted to IEEE Xplore as well as other Abstracting and Indexing (A&I) databases.

Session Organisers

Manmath Narayan Sahoo
Department of Computer Science and Engineering
National Institute of Technology Rourkela, Odisha 
Sanjay K Jena
Department of Computer Science and Engineering
National Institute of Technology Rourkela, Odisha 
Sambit Bakshi
Department of Computer Science and Engineering
National Institute of Technology Jamshedpur, Jharkhand

TPC Members
Domenico Ciuonzo, University of Naples Federico II, Italy
Hassan Moradi, Qualcomm Inc., USA
Javier Gozalvez, Universidad Miguel Hernandez de Elche, Spain
K Giridhar, Indian Institute of Technology, Madras, India
Kimon Kontovasilis, NCSR Demokritos, Greece
Samah Ghanem, Eurecom Institute, France
Santiago Mazuelas, Qualcomm, USA
Simone Morosi, University of Florence - CNIT, Italy
Xianfu Lei, Utah State University, USA
Yupeng Jia, National Instruments, USA

Key Dates

Paper Submission Ends:May 11, 2015 (Firm)
Acceptance Notification: May 25, 2015
Final Paper Deadline: June 25, 2015

Organized by

Technical Co-sponsors

IEEE Logo IEEE ComSoc   INNS India ACM Trivandrum Chapter 

ACM Trivandrum Chapter