Call for Papers IEEE Network Magazine “Special Issue on Security in Cognitive Radio Networks” Cognitive radio (CR) is an emerging advanced radio technology in wireless access, with many promising benefits including dynamic spectrum sharing, robust cross-layer adaptation, and collaborative networking. Based on a software-defined radio (SDR), cognitive radios are fully programmable and can sense their environment and dynamically adapt their transmission frequencies, power levels, modulation schemes, and networking protocols for improving network and application performance. It is anticipated that cognitive radio technology will be the next wave of innovation in information and communications technologies. Although the recent years have seen major and remarkable developments in the field of cognitive networking technologies, the security aspects of cognitive radio networks have attracted less attention so far. Due to the particular characteristics of the CR system, entirely new classes of security threats and challenges are introduced such as licensed user emulation, selfish misbehaviors and unauthorized use of spectrum bands. These new types of attacks take the advantage the inherent characteristics of CR, and could severely disrupt the basic functionalities of CR systems. Therefore, for achieving successful deployment of CR technologies in practice, there is a critical need for new security designs and implementations to make CR networks secure and robust against these new attacks. Topics of interest include, but are not limited to: § General security architecture for CR networks § Cross-layer security design of CR networks § Secure routing in multi-hop CR networks § Physical layer security for CR networks § Geo-location for security in CR networks § Defending and mitigating jamming-based DoS attacks in CR networks § Defending against energy depletion attacks in resource-constrained CR networks § Attack modeling, prevention, mitigation, and defense in CR systems, including primary user emulation attacks, authentication methods of primary users, spectrum sensing data falsification, spectrum misusage and selfish misbehaviors and unauthorized use of spectrum bands § Methods for detecting, isolating and expelling misbehaving cognitive nodes § Security policies, standards and regulations for CR networks § Implementation and testbed for security evaluation in CR systems § Privacy protection in CR networks § Security issues for database-based CR networks § Security in CR networks for the smart grid § Intrusion detection systems in CR networks With regard to both the content and formatting style of the submissions, prospective contributors should follow the IEEE Network guidelines for authors that can be found at http://dl.comsoc.org/livepubs/ni/info/authors.html. Authors should submit their manuscripts through ScholarOne for IEEE Network Magazine. Choose "Special Issue —Security in Cognitive Radio Networks " from the drop down menu on the submission page. The timetable is as follows: • Manuscript submission: October 1, 2012 • Acceptance notification: January 15, 2012 • Final manuscript due: February 15, 2013 • Publication date: May 2013 The Guest Editors for this issue are: Kui Ren, [email protected] Haojin Zhu, [email protected] Zhu Han, [email protected] Radha Poovendran, [email protected] _______________________________________________ IEEE Communications Society Tech. Committee on Computer Communications (TCCC) - for discussions on computer networking and communication. [email protected] https://lists.cs.columbia.edu/cucslists/listinfo/tccc
