First Workshop on the Security and Privacy of
Emerging Ubiquitous Communication Systems


Important Dates

Paper Submission Deadline:
May 7, 2007 (Extended!!)
Notification of Acceptance:
May 21, 2007
Camera-Ready Submissions:
June 10, 2007

Contact Information

Email: yyzhang@winlab.rutgers.edu

Program Co-Chairs

Marco Gruteser
WINLAB, Rutgers University
Wade Trappe
WINLAB, Rutgers University
Yanyong Zhang
WINLAB, Rutgers University

Technical Program Committee

Imad Aad, NTT Docomo
Mooi Choo Chuah, Lehigh University
Bugra Gedik, IBM Research
Urs Hengartner, University of Waterloo
Richard Howard, PnP Networks
Jaewon Kang, Telcordia
Masahiro Kuroda, NICT, Japan
Qing Li, Hitachi
Ling Liu, Georgia Tech
Wenjing Lou, Worcester Polytechnic Institute
Badri Nath, Rutgers University
Max Ott, NICTA, Australia
Radha Poovendran, University of Washington
Yan Sun, University of Rhode Island
Guiling Wang, NJIT
Wei Yu, Microsoft Research
Sencun Zhu, Penn State University

Advance Program

PDF
Discussion Notes

To be held in conjunction with
The 4th Annual International Conference on Mobile and Ubiquitous Systems: Networks and Services
(MOBIQUITOUS 2007)

August 10, 2007 - Philadelphia, Pennsylvania, USA

Recent advances of wireless communications and computing have led to the rapid development of pervasive/ubiquitous systems that are built upon large number of networked embedded nodes. As the networked systems become increasingly ubiquitous, they will be both the target and the means for a variety of security and privacy threats. For example, the pervasiveness of emerging wireless systems, such as sensor devices or RFID tags or even the eventual cognitive radio platform, implies that these devices will be affordable and easily accessible, thereby making it easier than ever before for adversaries to acquire the equipment and the means to launch new modes of security or privacy attacks. Further complicating matters is the fact that ubiquitous presence implies a necessary dependence on the wireless medium, which is an open, broadcast medium that can be easily monitored. Finally, pervasive systems built upon wireless technology are dependent upon many more parameters than other systems do, such as location, and these systems generate much more data that can be easily abused to raise security/privacy concerns. These challenges are distinctively different from those in traditional wired and wireless systems.

This workshop is intended to bring together researchers and practitioners to identify the new challenges imposed by emerging ubiquitous communication systems and investigating efficient models, algorithms, and tools to enhance the security and privacy of these systems.

Topics of interest will include, but are not limited to:

  • Countermeasures to jamming and radio interference
  • Secure localization
  • Location privacy
  • Security and privacy for RFID systems
  • Sensor security and privacy, both static and mobile sensors
  • Networks of embedded devices
  • Vehicular networks
  • Software-defined radios
  • Video sensor systems
  • Spatial and context-aware access control

Submission Instructions

Papers should be in PDF format, no longer than 6 pages double column in IEEE conference format including text, figures and references. The font size must be 10 points. Paper submission will be handled electronically by the COCUS Conference Management System. Further details about the submission procedures will appear soon.