Calls for Papers
IEEE Internet Computing is seeking papers for the a theme
issue on Security for P2P and Ad Hoc Networks for the
November/December 2005 publication.


All submissions must be original manuscripts of less than 5,000 words,
and must focus on Internet technologies and implementations. All
manuscripts accepted for publication must pass peer review.

Articles should be written for a readership consisting primarily of
professional system and software designers and engineers (75% working in
industry).

To submit an article to one of our departments, see our department
guidelines at http://www.computer.org/internet/call4ppr.htm

Security for P2P and Ad Hoc Networks
November/December 2005

Guest editors: Shiuhpyng Shieh (National Chiao Tung University) and Dan
Wallach (Rice University)

Submissions due 1 April 2005

As the number of individual computing devices and the demand for
mobility continue to grow, peer-to-peer (P2P) systems and ad hoc
networks will become increasingly popular.  Indeed, they are likely to
become integral to the future computing and networking infrastructure.

P2P systems create application-level virtual networks with their own
routing mechanisms; they enable large numbers of computers to share
information and resources directly, without dedicated central servers.
Ad hoc networks allow mobile hosts, mobile devices, and sensor nodes to
communicate when no fixed infrastructure is available.

Although P2P systems and ad hoc networks make communication and resource
sharing more convenient, however, they also introduce new security
challenges due to inherent aspects such as dynamic topologies and
membership, unreliability, severe resource constrains, and the absence
of a trusted infrastructure.

To explore these issues, IC invites contributions for a special issue on
security for P2P and ad hoc networks. Appropriate topics include, but
are not limited to:

  a.. key management,
  b.. authentication,
  c.. access control,
  d.. privacy and anonymity,
  e.. secure routing,
  f.. secure MAC protocols,
  g.. performance and security trade-offs,
  h.. intrusion detection and tolerance, and
  i.. denial of service.