Special Issue on: "Implementation, Simulation and Impact of Attacks on Wireless Networks"
Mr. Faouzi Hidoussi, University Hadj Lakhdar of Batna, Algeria
Prof. Aniruddha Bhattacharjya, Guru Nanak Institute of Technology, India
In the modern era, wireless technologies are the backbone of our daily network needs. They are omnipresent technologies with efficiency, security and high-performance capabilities. Eighteen major types of wireless technologies exist, containing a large number of subset technologies that range from ATM protocol-based (which sells at approximately $200,000 per data link) to wireless local-area networks (WLAN, which sells at less than $500,000 per data link). Frequencies of the different technologies travel between several hundred feet (wireless LAN) and 25 miles (MMDS).
In its state-of-the-art deployment, a wireless link emulates all the capabilities of a fully featured router, which means that a wireless link can provide VPN, enterprise toll bypass and MDU/MTU access services. This is one of the primary differences between a layer 2 product as provided by the majority of wireless vendors and the layer 3 solution provided by Cisco Systems. Regardless of the provider of a wireless system, the fundamental elements remain relatively constant: data or network, edge or access router, DSP medium, RF medium (coax, modulator/demodulator and antenna) and RF management software.
Before proposing any systems of security to protect wireless networks, we need to learn and know how these attacks operate. What is the impact of these attacks when implemented in wireless networks? We need to know their implementation in a specific simulator in order to evaluate their impact.
This special issue will focus on the implementation, simulation and impact of attacks on wireless technology. The issue will carry revised and substantially extended versions of selected papers presented at the International Conference on Intelligent Information Processing, Security and Advanced Communication (IPAC 2015), but we also strongly encourage researchers unable to participate in the conference to submit articles for this call.
Suitable topics include, but are not limited to, the following:
- Implementation of attacks on wireless networks under simulators
- Simulation and impact of attacks on wireless technology in different terms
- Intelligent intrusion detection systems on wireless networks
- Trends in research and challenges of wireless networks
- New attacks and countermeasures for wireless networks
- Impact of routing attacks on wireless networks
- Energy-efficient mechanisms for securing wireless networks
Notes for Prospective Authors
Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. (N.B. Conference papers may only be submitted if the paper has been completely re-written and if appropriate written permissions have been obtained from any copyright holders of the original paper).
All papers are refereed through a peer review process.
All papers must be submitted online. To submit a paper, please read our Submitting articles page.
Submission due: 10 January, 2016
Notification due: 10 March, 2016
Final versions due by: 10 April, 2016