The 5th International Workshop on Privacy, Security and Trust in
Mobile and Wireless Systems (MobiPST 2015)

In conjunction with ICCCN 2015
Las Vegas, Nevada, USA
August 6, 2015

Special issue: Outstanding papers from the workshop will be invited
for a special issue on "Challenges and Solutions in Mobile Systems

Mobile wireless devices, such as wireless sensors, smart tags, smart
pads, tablets, PDAs and smart phones, have become pervasive and
attract significant interest from academia, industry, and standard
organizations. With the latest cloud computing technology, those
mobile wireless devices will play a more and more important role in
computing and communication. When those devices become pervasive,
security, privacy and trust become critical components for the
acceptance of applications build based on those devices. Moreover,
several favorable characteristics of mobile and wireless devices,
including portability, mobility, and sensitivity, further impose the
challenge of security and privacy in those systems. Despite recent
advances, many research issues still remain in the design of secure,
privacy-preserving, or trust architectures, protocols, algorithms,
services, and applications on mobile and wireless systems. For
example, when mobile devices have more storage space, high bandwidth,
and super sensing capability, more sensitive information will be
stored in those devices. On the other hand, operating systems running
on those devices are not as powerful and reliable as those on
traditional computers. Both OS layer and higher-level layer protocols
are expected to enhance the security and preserve the privacy of those
devices. With more mobile devices being used in social networks and
traditional web-based systems, novel trust models are essential for
new applications. New cryptographic algorithms, key distribution
schemes and access control policies are also encouraged by considering
the special characteristics of mobile and wireless devices. Other
issues such as malware, cyber threat, intrusion detection, attack
modeling, security analysis, identity management and anonymity
techniques also need to be revisited in mobile and wireless systems.

This workshop aims to bring together the technologists and researchers
who share interest in the area of security, privacy and trust in
mobile and wireless systems, as well as explore new venues of
collaboration. The main purpose is to promote discussions of research
and relevant activities in the models and designs of secure,
privacy-preserving, or trust architectures, protocols, algorithms,
services, and applications, as well as analysis on cyber threat in
mobile and wireless systems. It also aims at increasing the synergy
between academic and industry professionals working in this area. We
plan to seek papers that address theoretical, experimental research,
and work in-progress for security, privacy and trust related issues in
the context of mobile and wireless systems that include, but are not
limited to, the following,

*    Cryptography for Mobile and Wireless Systems
*    Wireless Local Area Networks
*    Wireless Sensor Networks
*    Wireless Mesh Networks
*    Wireless Ad-hoc Networks
*    Vehicular Networks
*    Body-area Networks
*    Cellular Networks (3G, 4G, ...)
*    WiMAX Networks
*    Machine to Machine (M2M) Netwroks
*    Software Defined Networks (SDN)
*    Social Networks
*    Smart Grid
*    RFID-based Systems
*    Mobile Cloud
*    Cyber-Physical Systems (CPS)
*    Internet of Things
*    Location-based Service Systems
*    Mobile Healthcare Systems
*    Smart Building Systems
*    Big Data

Important Dates

Paper submission due:  March 8, 2015
Acceptance notification:  April 24, 2015
Camera-ready due:  May 8, 2015
Workshop: August 6, 2015

Submission link:
Please choose appropriate track while submitting your paper.

Abhishek Parakh and Zhiwei Wang