Journal of Computer Security (JCS), Special Issue on Security of Ad Hoc and
Sensor Networks, 2006 (Submission Due April 1, 2006)

Guest editors: Peng Ning (NC State University) and Wenliang Du (Syracuse

Ad hoc and sensor networks are expected to become an integral part of the
future computing landscape.  However, these networks introduce new security
challenges due to their dynamic topology, severe resource constraints, and
absence of a trusted infrastructure.  This Journal of Computer Security
(JCS) special issue seeks submissions from academia and industry presenting
novel research on all aspects of security for ad hoc and sensor networks, as
well as experimental studies of fielded systems.

Topics of interest include, but are not limited to, the following as they
relate to mobile ad hoc networks or sensor networks:

- Security under resource constraints (e.g., energy, bandwidth, memory, and
computation constraints)
- Performance and security tradeoffs
- Secure roaming across administrative domains
- Key management
- Cryptographic Protocols
- Authentication and access control
- Intrusion detection and tolerance
- Trust establishment, negotiation, and management
- Secure location services
- Secure clock distribution
- Privacy and anonymity
- Secure routing
- Secure MAC protocols
- Denial of service
- Prevention of traffic analysis

For more information, please see