Call for Papers for Special Issue of Security and Communication Networks, “Security and Privacy in Ubiquitous Computing”

The research area of mobile computing has become more important following the recent widespread drive towards mobile ad hoc networks, wireless sensor networks, and vehicular ad hoc network tracking technologies and their applications. The availability of high bandwidth 3G infrastructures and the pervasive deployment of low cost WiFi infrastructures and WiMAX to create hotspots around the world serve to accelerate the development of mobile computing toward ubiquitous computing. Security and privacy in converged computing systems are considered an important part of these systems, and pose challenging open problems.

This special issue aims to collect contributions by leading- edge researchers from academia and industry, show the latest research results in the field of security and privacy in ubiquitous computing, and provide valuable information to researchers as well as practitioners, standards developers and policymakers.

This special issue will focus on the research challenges and issues in security and privacy in ubiquitous computing. Manuscripts regarding novel algorithms, architectures, implementations, and experiences are welcome. Topics include but are not limited to:

  • Secure architectures for converged communication networks

  • Multi-hop authentication and authorization

  • Context-aware security in computing

  • Security management of mobile data

  • Security for ubiquitous multimedia communication

  • Secure user interactions and ubiquitous services

  • Security and privacy in location-based services

  • Security and privacy in mobile social networks

  • Trust management in ubiquitous services

  • Security in home networks

  • Homeland security and surveillance

  • Trusted cloud computing

  • Secure group communication/multicast

  • Secure machine-to-machine communication

  • Security in portable devices and wearable computers

  • Privacy protection in distributed data mining

  • Energy efficient intrusion detection schemes in mobile computing.

Technical papers describing original, previously unpublished research, not currently under review by another conference or journal, are solicited.


Concerning the preparation of manuscripts, please refer to the “Author Guidelines” page at the journal website, 0122/homepage/ForAuthors.html. Manuscripts must be submitted through the online submission system: by selecting the corresponding track. When submitting papers, authors should identify “Manuscript Type” as “Special Issue”, and enter “Running Head” and “Special Issue Title” as “SCN-SI-028” and “Ubiquitous Security and Privacy,” respectively. Contributing authors might also be asked to review some of the papers submitted to this special issue. All papers will be rigorously reviewed based on quality: original, high scientific quality, well organized and clearly written, sufficient support for assertions and conclusions, appropriate title, abstract includes important points of the paper, satisfactory presentation in English, pertinent references, clear tables, and figures.

Time Schedule

Manuscript Due: June 30, 2011

First Round Notification: August 19, 2011

First Revision Due: September 23, 2011

Acceptance Notification: October 21, 2011

Final Manuscript Due: November 25, 2011

Publication Date: 2012 (TBA)

Guest Editors

Ali Miri

Ryerson University, Canada


Nen-Fu Huang

National Tsing Hua University, Taiwan, ROC


Abderrahim Benslimane

University of Avignon, France