ACM WiSec 2008

Call for Papers (PDF)

As wireless communications are becoming ubiquitous, their security is gaining in importance. The ACM Conference on Wireless Network Security (WiSec) aims at exploring attacks on wireless networks as well as techniques to thwart them. The considered wireless networks encompass cellular, metropolitan, local area, vehicular, ad hoc, satellite, underwater, and sensor networks as well as RFID.

Topics of interest include, but are not limited to:

  • Naming and addressing vulnerabilities
  • Key management in wireless/mobile environments
  • Secure neighbor discovery
  • Secure PHY and MAC protocols
  • Trust establishment
  • Intrusion detection, detection of malicious behavior
  • Revocation of malicious parties
  • Denial of service
  • User privacy, location privacy
  • Anonymity, prevention of traffic analysis
  • Identity theft and phishing in mobile networks
  • Charging
  • Cooperation and prevention of non-cooperative behavior
  • Economics of wireless security
  • Vulnerability and attacker modeling
  • Incentive-aware secure protocol design
  • Jamming
  • Cross-layer design for security
  • Monitoring and surveillance
  • Computationally efficient cryptographic primitives

ACM WiSec results from the merger of three workshops: ESAS (European Workshop on the Security of Ad Hoc and Sensor Networks), SASN (ACM Workshop on the Security of Ad Hoc and Sensor Networks) and WiSe (ACM Workshop on Wireless Security). The proceedings will be published by the ACM.

Important dates:

  • Paper submissions due (Extended): September 15, 2007, September 21, 2007 (12:00pm EDT, 9:00am PDT, 6:00pm CEST)
  • Notification of acceptance: December 10, 2007
  • Camera-ready version due: January 15, 2008
  • Conference: March 31 - April 2, 2008

Paper submission instructions:

Submission of papers based on work-in-progress is encouraged. Submitted papers must not be previously published elsewhere or currently under review for any other publication.  All papers must be submitted via the EDAS system. (Instructions on preparing a manuscript for EDAS system are available here.) All papers will be evaluated through a double-blind review process, with the identities of the authors and reviewers withheld from each other. All submissions should be anonymized (an author’s name should only occur in references to that author’s related work, which should be referenced in the third person and not overtly distinguishable from the referenced work of others). For additional information, the program co-chairs can be contacted at

All paper submissions will be handled electronically. Authors should prepare a Portable Document Format (PDF) version of their paper.

Papers must meet the following restrictions: No longer than 10 pages (single or double column); in font no smaller than 10 points; must fit properly on US Letter-sized paper (8.5 inch x 11 inch) with reasonable margins.

Note: The final versions will be formatted in ACM conference style. More formatting instructions will be provided after the acceptance decision is made.

©2007 Peng Ning . All rights reserved.