Call for Chapters: Security and Privacy in Smart Sensor Networks

Editors

Dr. Yassine Maleh LAVETE Laboratory, Faculty of Science and Technology, University Hassan 1st, Settat, Morocco

Prof. Abdellah Ezzati LAVETE Laboratory, Faculty of Science, University hassan 1st, Settat

Prof. Mustapha Belaissaoui,ENCG, SIAD Laboratory, University Hassan I, Settat, Morocco


Editorial Advisory Board
Dr. Shareeful Islam
Senior Lecturer, University of East London, UK

Dr. Albena Mihovska
Department of Business Development and Technology, MBIT Lab. Denmark

Dr. Abdelkrim Haqiq
Hassan 1st University, Settat, Morocco

Dr. Rafigul Islam
School of computing & mathematics, Charles Sturt University, Australia

Dr. Imed Romdhani
Edinburgh Napier University, UK

Dr. Lo'ai A. Tawalbeh
Umm Al-Qura University, MAKKAH, Saudi Arabia

Dr. Ihssan Alkadi
Independent Researcher, USA

Dr. Edgar Weippl
SBA Research, Austria

Dr. Cristina Alcaraz
Computer Science Department, University of Malaga, Spain

Dr. Homero Toral Cruz
Department of Sciences and Engineering, University of Quintana Roo, México

Dr. Rajgopal Kannan
Louisiana State University, Las Angeles, USA

Dr. Antonio J. Jara
University of Applied Sciences Western Switzerland, Sierre, Switzerland

Dr. Mohamed Amine Ferrag
Department of Computer Science, Guelma University, Algeria

Dr. Farrokh Aminifar
Illinois Institute of Technology, Chicago, USA

Dr. Tariq Banday
Department of Electronics and Inst. Technology, University of Kashmir, India

Dr. Nilesh Uke
Pimpri Chinchwad College Of Engineering, India


Call for Chapters

Proposals Submission Deadline: July 15, 2017
Full Chapters Due: September 30, 2017
Submission Date: December 15, 2017

Introduction

The proliferation of mobile ad hoc and sensor network has promoted the development of the concepts of autonomous computing with a potentially large range of applications. However, the inherent vulnerability of these autonomous networks introduces new security challenges. Security Solutions in Smart Networks (WSN, WBAN, 6loWPAN ...) is a pivotal reference source for the latest research on the development of smart Sensors technology and best practices of utilization. Smart Networks represents a new generation of ubiquitous computing that can be found anywhere and everywhere. This book is ideally designed for students, researchers, academicians, and professionals who are looking for current research on how to implement Smart Sensor Networks, covering a range of perspectives and relevant topics, such as threat and attacks detection, Lightweight Crypto and security solutions, authentication and intrusion detection.

Objective

The main goal of this project is to encourage both researchers and practitioners to share and exchange their experiences and recent studies between academia and industry. The overall objectives are:
• To improve the awareness of readers about Smart Sensor Networks, concepts, security, and privacy areas.
• To analyze and present the state-of-the-art of the smart sensors security and related technologies and methodologies.
• To highlight and discuss the recent development and emerging trends in the smart sensors security.
• To propose new models, practical solutions and technological advances related to security.
• Discusses new smart sensor network security protocols


Target Audience

This book is ideally designed for policy makers, students, researchers, academicians, and professionals who are looking for current research that are interested in exploring and implementing on Smart Sensor Networks and related technologies. Authors from the AWICT conference second edition are invited to submit their extended papers as book chapters.

Recommended Topics

This book will include (but will not be limited to) the following topics. Any other related topics in the area of smart sensor networks are also welcome:
• Mobile and wireless security
• Wireless Body Network Security
• Mobile, Ad Hoc and Sensor Network Security
• Internet of Things Security
• 6loWPAN Security
• End to end Security
• Access control, Anonymity, Audit and & Authentication and authorization
• Applied cryptography, Cryptanalysis, Digital Signatures
• Biometric security
• Boundary control devices
• Data and system integrity, Database security
• Defensive information warfare
• Denial of service protection, Intrusion Detection, Anti-malware
• Distributed systems security
• Electronic commerce
• E-mail security, Spam, Phishing, E-mail fraud, Virus, worms, Trojan Protection
• Information hiding and watermarking & Information survivability
• Insider threat protection, Integrity
• Intellectual property protection
• Key management and key recovery
• Language-based security
• Monitoring and surveillance
• Multimedia security, Operating system security, Peer-to-peer security
• Performance Evaluations of Protocols & Security Application
• Privacy and data protection
• Product evaluation criteria and compliance
• Risk evaluation and security certification
• Risk/vulnerability assessment
• Security & Network Management
• Security and Assurance in Operational, Technological, commercial Area
• Security Engineering and Its Application
• Security Models & protocols
• Security threats like DDoS, MiM, Session Hijacking, Replay attack, etc & countermeasures
• Trusted computing
• Ubiquitous Computing Security
• Cloud security
• Embedded systems security
• Security design and verification tools


Submission Procedure

Researchers and practitioners are invited to submit their chapter proposals on or before July 15, 2017, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. All submitted chapters will be reviewed on a double-blind review basis. Authors of accepted proposals will be notified about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by September 15, 2017. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project. Chapters with multiple authors are welcome, even encouraged.

Note: There are no submission or acceptance fees for manuscripts submitted to this book publication, Trust in Knowledge Management and Systems in Organizations. All manuscripts are accepted based on a double-blind peer review editorial process.

All proposals should be submitted through the E-Editorial DiscoveryTM online submission manager.


Publisher

This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the "Information Science Reference" (formerly Idea Group Reference), "Medical Information Science Reference," "Business Science Reference," and "Engineering Science Reference" imprints. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2018.

Important Dates

Proposal Submission Deadline: .................................................... July 15, 2017
Full chapter Submission: .................................................................. September 30, 2017
Review Process: ................................................................................ September 30, 2017 to November 15, 2017
Submission of Final Chapters to Editor: ........................................... December 15, 2017


Inquiries

y.maleh@uhp.ac.ma; yassine.maleh@gmail.com

Back