First IEEE Workshop on Information Assurance in Wireless Sensor Networks (WSNIA 2005)
In conjunction with
| 
 |      24th IEEE International Performance Computing and Communications Conference (IPCCC 2005)     April 7-9, 2005 ― Phoenix, Arizona | 
     | 
Call for Paper (PDF)
Recently, there has been a growing interest in the potential use of wireless sensor networks (WSNs) in many applications such as smart environments, disaster management, combat field reconnaissance, and security surveillance. While the initial view of the community was that WSNs will play a complementary role that enhances the quality of these applications, recent research results have encouraged practitioners to envision an increased reliance on WSNs in such critical and sensitive applications. Therefore, to realize their potential, necessary information assurance (IA) measures have to be incorporated in the design and during the operation of WSNs. IA is usually specified in terms of attributes such as integrity, authenticity, confidentiality, availability, and survivability. A defense-in-depth approach to IA involves the activities of attack and failure prevention, detection and response, as well as the refinement of these activities. The scope of defense-in-depth may start with a diameter that spans the sensors deployed in a field to a diameter that includes the command nodes and likely beyond. Another dimension of defense-in-depth involves IA at, and cross-cutting, the different layers of the protocol stack, from the physical layer to the application layer.
 
  Achieving information assurance in WSNs will require non-conventional mechanisms due to many factors including: (1) sensors are significantly constrained in the amount of available resources such as energy, storage and computation; (2) sensors are expected to be deployed in very large numbers in normal as well as forbidding environments; (3) WSNs suffer from structural weakness and limited physical protection, and (4) localization of impact is complicated due to the un-tethered nature of the WSNs and of the potential attackers. In addition, IA requirements may vary according to a network's mission defined over a multi-dimensional context, such as field of deployment (e.g., hostile versus friendly), type of application (e.g., monitoring, tracking, data collection), mode of operation (e.g., normal, exception, post-event recovery), and time.
 
  This workshop will foster a forum for discussing and presenting recent research results on Information assurance in wireless sensor networks. Best papers from WSNIA’2005 will be invited to a Special Issue of the Journal of Computer Security (
http://www.csl.sri.com/programs/security/jcs/). Topics of interest include, although not limited to, the following: 
  Fault and intrusion-tolerant architectural and operational models
  Robust routing, storage, and processing of sensed data
  Predictable MAC medium access arbitration
  IA architectures and protocols
  Vulnerabilities, attacks and countermeasures
  Monitoring and evaluation techniques
  Scalability and robust clustering techniques
  Resilient virtual infrastructures 
  Formal representation and verification of assurance properties
  Adaptive security and assurance techniques
  Quality of service provisioning
  Metrics for measuring security, assurance and dependability
  Privacy-aware dependable operation
  Simulation and visualization  environments
  Agent-based management for multi-tier WSNs
  WSNs as components of larger information grids
  
  
Important dates:Submission deadline: December 10, 2004 (extended)
          Decision notification:                                  December 23, 2004          Final manuscript due:                                 January 15, 2005 Submission instructions:
  Prospective authors should submit their paper electronically to toweissy@vt.edu or younis@csee.umbc.edu. Papers should contain original material and not be previously published, or currently submitted for consideration elsewhere. The manuscript should not exceed 20 double-space pages in MS-Word, PS or PDF. The manuscript should be in a single column font size 11 or larger format. The first page should include title, authors' contact information, an abstract and five keywords. Authors should attach the paper abstract to their message.
 Workshop Co-Chairs:
  | Mohamed EltoweissyDepartment of Computer ScienceVirginia Tech7054 Haycock Rd, Falls Church, VA 22043Voice: (703)538-8374, FAX: (703)538-8320E-mail: toweissy@vt.edu   | Mohamed YounisDepartment of Computer Science and Elect. Eng.University of Maryland Baltimore County,1000 Hilltop Circle, Baltimore, MD 21250Voice: (410)455-3968, FAX: (410)455-3968E-mail: younis@csee.umbc.edu | 
  Publicity Co-Chair
  | Denis GracaninDepartment of Computer ScienceVirginia TechBlacksburg, VA  24061, USAE-mail: gracanin@vt.edu   | Ahmed SafwatDepartment of Electrical and Computer EngineeringQueen's UniversityKingston, Ontario, Canada K7L 3N6 E-mail: ahmed.safwat@ece.queensu.ca | 
Program Committee: (under construction)
  Giuseppe Anastasi, University of Pisa, Italy
Khaled Arisha, Honeywell, USA
Mohammed Atiquzzaman, University of Oklahoma, USA
Erdal Cayirci,, Istanbul Technical University, Turkey
Ing-Ray Chen, Virginia Tech, USA
Robert H. Deng, Singapore Management University, Singapore
Mootaz Elnozahy, IBM Research, USA
Sonia Fahmy , Purdue University, USA
Sandeep Gupta, Arizona State University, USA
Hossam Hassanein, Queens University, Canada
Sushil Jajodia, George Maso
John McDermott, Naval Research Lab, USA
  
  
  Shivakant Mishra, University of Colorado, USA
Stephan Olariu, Old Dominion University, USA
Jung-Min Park, Virginia Tech, USA
Jochen Schiller,, Freie University, GermanyA
David Simplot-Ryl, NRIA Futurs, France
Ivan Stojmenovic, University of Ottawa, Canada
Albert Y. Zomaya, University of Sydney, Australia

Last Revised: November 20, 2004