Call for Chapters: Handbook of Research on Wireless Network Architecture and Security
Department of Computer Science & Engineering
College of Technology and Engineering
Maharana Pratap University of Agri.and Technology, Udaipur, India.
Call for ChaptersProposals Submission Deadline: April 30, 2014
Full Chapters Due: June 30, 2014
For release in the Advances in Wireless Technologies and Telecommunication (AWTT) Book Series.
The Advances in Wireless Technologies and Telecommunication Book Series aims to provide researchers and academic communities with quality research on the concepts and developments in the wireless technology fields. Developers, engineers, students, research strategists, and IT managers will find this series useful to gain insight into next generation wireless technologies and telecommunication.
Future wireless network architecture is expected to encompass heterogeneous network access technologies and the Internet backbone for providing secure services including multimedia to mobile and the stationary users. Secure wireless architecture is to provide common security services across the network for wireless users and enable collaboration between wireless and network security infrastructure. The future wireless network infrastructure needs to have the right wireless networking architecture that supports high degree of scalability, performance and reliability in the most cost effective manner without compromising security or quality of service.
In this book entitled “wireless network architecture and security”, the author will present and review important developments, limitations of existing methods, models and new strategies for latest topics of wireless network architecture and security. This book can serve as a useful reference for industries, researchers, educators, and governments to promote and accelerate standardization, applications, and services of current and future wireless networks.
Nowadays there is tremendous growth in the number of wireless enabled devices including access points (ACs), personal digital assistants (PDAs), laptops, personal computers (PCs), servers, printers, smartphones, tablets and other cellular devices that are capable of attaching to WiFi, wireless broadband networks and other wireless connectivity.
There is not only an exponential growth in the number of wirelessly connected users, but the amount of bandwidth being consumed on enterprise networks is also increasing exponentially driven by video and other enterprise applications which include wireless sensor networks, health care, industry, multimedia applications and intelligent transport systems, etc.
With the advance of wireless networks, routing and network technologies introduces new challenging requirements and issues for researchers and so it is important to establish more efficient, reliable and secure network connections. This book will helpful to provide a common wireless platform for the integration of security services, allowing common security architecture to be developed for all network clients and traffic types.
The book will include exercises that make use of free and inexpensive tools that help readers gain practical experience with concepts described in the chapter. The book will provide the essential knowledge required to design the wireless network architecture, secure wireless networks and secure transmission of data, voice and video over wireless network. In addition, this book will provide hands-on exercises for designing and building robust secure wireless networks.
Target AudienceThis book will guide network designers for deploying network hardware in wireless networks to get the design right, ensure proper signal levels for video traffic and to deliver optimal performance for various services like e-Healthcare, e-Agriculture, online monitoring and ICT applications. This book will also serve as a useful reference for industries, researchers, educators, and governments who are involved in designing, implementing, security and wireless networks and its applications.
The book will contain a preface, some introductory chapters and invited chapters from prominent industrialists, researchers and academicians working in this area around the whole world. The chapters will provide novel ideas and models; simulation and experimental results also motivate researchers for the future research in wireless network architecture and security domain.
Prospective authors are invited to submit original contributions on all aspects of wireless networks, technologies, applications, securities and services, including, but not limited to the following topics of interest.
- Wireless access, network architecture, and standards
- Network planning, designing and architecture
- Wireless networks and technologies
- Broadband wireless access
- 2G/4G/5G/Cellular network technologies
- WiMAX, wireless ad hoc and mesh networks
- Cognitive, reconfigurable, multimode and vehicular wireless networks
- Home entertainment networks
- Ubiquitous coverage
- Integration of heterogeneous wireless and wired networks
- Network design, control, and performance
- Capacity analysis and wireless network designing
- Quality-of-service provisioning in wireless network
- Radio resource allocation
- Wireless LAN Implications
- Mobility, handoff, and location management
- Medium access control
- Radio Signal Interference
- Impacts of Multi-path Propagation
- Traffic scheduling, modelling, management, access and admission control
- Routing, Flow control and congestion control
- Energy efficiency, network clustering, network performance analysis
- Multimedia communications
- Distributed control and management
- End-to-end protocols and performance
- Power saving protocols for wireless network
- Network on Chip
- Experiments, Applications, and Services
- Multimedia applications over wireless networks
- Emerging wireless technologies
- New services and applications
- Voice over IP, Video over IP
- Measurements, testbeds, and deployment
- Wireless network standardization activities
- Cross-layer design and optimization
- QoS support wireless networks
- IEEE 802.11 Medium Access Mechanisms
- Distributed Coordination Function (DCF)
- Point Coordination Function (PCF)
- Enhanced Distributed Channel Access (EDCA)
- HCF Controlled Channel Access (HCCA)
- PHY Enhancements
- 802.11e EDCA, EDCA 802.11n networks
- Security Vulnerabilities in Wireless Networks
- Physical layer, MAC layer, network layer and transport layer attacks
- Secure Routing Protocols for Wireless Networks
- Authenticated Routing for Ad Hoc Networks
- Secure Efficient routing protocol
- Secure Video Transmission in Wireless Networks
Submission ProcedureResearchers and practitioners are invited to submit on or before April 30, 2014, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Submissions should be made through the link at the bottom of this page. Authors of accepted proposals will be notified by May 15, 2014 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by June 30, 2014. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.
PublisherThis book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the "Information Science Reference" (formerly Idea Group Reference), "Medical Information Science Reference," "Business Science Reference," and "Engineering Science Reference" imprints. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2015.
Important DatesApril 30, 2014: Proposal Submission Deadline
May 15, 2014: Notification of Acceptance
June 30, 2014: Full Chapter Submission
August 30, 2014: Review Results Returned
October 15, 2014: Final Acceptance Notification
October 30, 2014: Final Chapter Submission
InquiriesDr. Dharm Singh, PhD (CSE), FIE, SMIEEE
Department of Computer Science & Engineering
College of Technology and Engineering
Maharana Pratap University of Agri.and Technology
Mob: +91-9414736473, Tel: +91-294-2491431(R), +91-294- 2470305(O)
Email: email@example.com, firstname.lastname@example.org