As wireless and mobile networking becomes ubiquitous, security and privacy become increasingly critical. The focus of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec) is on exploring vulnerabilities, threats, and attacks in wireless communications and the techniques needed to address them. Settings of interest include cellular, metropolitan, mesh, local-area, personal-area, home, vehicular, sensor, ad hoc, satellite, cognitive radio, RFID, and underwater networks as well as systems using non-RF wireless communication.
Topics of interest include, but are not limited to:
- Key management in wireless/mobile environments
- Secure services (neighbor discovery, localization, etc.)
- Secure PHY and MAC protocols
- Trust establishment
- Intrusion, attack and malicious behavior detection
- Denial of service
- User and location privacy
- Anonymity, unobservability, prevention of traffic analysis
- Identity theft and phishing in mobile networks
- Charging and secure payment
- Cooperation and mitigating non-cooperative behavior
- Economics of wireless security
- Vulnerability and attack modeling
- Incentive-aware secure protocol design
- Jamming/Anti-jamming communication
- Cross-layer design for security
- Monitoring and surveillance
- Cryptographic primitives for wireless communication
- Theoretical foundations and formal methods for wireless security and privacy
- Security and privacy of mobile OS and mobile applications
- Secure delay- and disruption-tolerant networking
- Secure non-RF wireless communication (e.g., ultrasound, vision, laser)
- Security/privacy in wireless smart grid and smart metering applications
- Security/privacy in wireless network coding
- Security/privacy in wireless/ephemeral social networking
- Security/privacy in mobile / wireless cloud services
The proceedings of ACM WiSec are published by the ACM.
IMPORTANT NOTE: It is a policy of the ACM (http://www.acm.org/pubs/rights.html) to disallow double submissions, where the same (or substantially similar) paper is concurrently submitted to multiple conferences/journals. Any double submissions detected will be immediately rejected from all conferences/journals involved.
Important Dates
- Paper submission:
November 22Extended to December 2nd, 2011 11:59pm (PST, UTC-8) (hard deadline) - Notification of acceptance:
February 1, 2012February 5, 2012 - Camera-ready version: February 22, 2012
- Conference: April 16 - 18, 2012