First International Workshop on Cognitive Radio and Electromagnetic Spectrum Security (CRESS 2014)

Call for Papers

 

The First International Workshop on Cognitive Radio and Electromagnetic Spectrum Security (CRESS 2014)

In conjunction with 2014 IEEE Conference on Communications and Network Security (IEEE CNS 2014)

29 October 2014, San Francisco, CA, USA

PDF Version (360 kb)

Cognitive radio enables access to broader pools of spectrum and more efficient utilization of current wireless resources and thus plays a key role for the next generation of mobile broadband. Legacy static spectrum allocation, although simple, poses a major obstacle for efficient use of limited wireless resources across time, space, and frequency. This challenge has promoted substantial research and development into cognitive radio technologies with network-level perception, learning, adaptation, and optimization for efficient spectrum utilization. In fact, the latest advances in cognitive radio technology have already started to appear in numerous military and public safety applications, connected vehicle prototypes, and cellular telephony deployments such as 4G LTE-Advanced, e.g., Self-Organizing Network (SON) engines. However, the autonomous manner in which cognitive radio systems make decisions fora wide range of wireless communications and networking functions, as well as its total dependency on environmental sensory information in order to reach these decisions, makes this technology highly susceptible to attack by a malicious, external entity. At the same time, research activities into identifying potential vulnerabilities in cognitive radio technology and developing robust countermeasures to mitigate these attacks is only now beginning to increase. Consequently, the purpose of this workshop is to bring together members of the cognitive radio and electromagentic spectrum security community from around the world in order for them to share the latest research findings in this emerging and critical area, as well as exchange ideas and foster research collaborations, in order to further advance the state-of-the-art in security techniques, architectures, and algorithms for cognitive radio communications and networks. Topics of interests include (but are not limited to) the following:

  • General security architecture for CR networks
  • Cross-layer security design of CR networks
  • Secure routing in multi-hop CR networks
  • Physical layer security for CR networks
  • Geo-location for security in CR networks
  • Defending and mitigating jamming-based DoS attacks in CR networks
  • Defending against energy depletion attacks in resource-constrained CR networks
  • Attack modeling, prevention, mitigation, and defense in CR systems
  • Primary user emulation attacks and countermeasures
  • Authentication methods of primary users
  • Spectrum sensing data falsification and countermeasures
  • Spectrum misusage and selfish misbehaviors and countermeasures
  • Unauthorized use of spectrum bands and countermeasures
  • Methods for detecting, isolating and expelling misbehaving cognitive nodes
  • Eavesdropping attack modeling and analysis in cognitive radio
  • Security policies, standards and regulations for CR networks
  • Implementation and testbed for security evaluation in CR systems
  • Information-theoretical secrecy capacity of cognitive transmissions
  • Privacy protection in CR networks
  • Security issues for database-based CR networks
  • Security in CR networks for the smart grid
  • Intrusion detection systems in CR networks
  • Truthful Spectrum Auctions

Tentative Program:

 

08:30 – 09:00: Welcome Address / Workshop Co-Chairs’ Introduction09:00 – 10:00: Session I

Achievable Secrecy Capacity in an Underlay Cognitive Radio Network
Louis Sibomana, Blekinge Institute of Technology; Hans-Juergen Zepernick, Blekinge Institute of Technology; Hung Tran, National Institute of Education Management

Measuring Smart Jammer Strategy Efficacy Over the Air” [INVITED]
C Carlson, Virginia Tech; Vieny Nguyen, Virginia Tech; Seth Hitefield, Virginia Tech; Tim O’Shea, Virginia Tech; T. Charles Clancy, Virginia Tech

10:00 – 10:30: Networking Break

10:30 – 11:30: Session II

Moving-Target Defense Mechanisms Against Source-Selective Jamming Attacks in Tactical Cognitive Radio MANETs
Aleksi Marttinen, Aalto University & School of Electrical Engineering; Alexander M. Wyglinski, Worcester Polytechnic Institute; Riku Jäntti, Aalto University School of Electrical Engineering

JADE: Jamming-Averse Routing on Cognitive Radio Mesh Networks” [INVITED]
Yu Seung Kim, Carnegie Mellon University; Bruce DeBruhl, II, Carnegie Mellon University; Patrick Tague, Carnegie Mellon University

11:30 – 12:30: Keynote Presentation by Professor Marwan Krunz, University of Arizona

12:30 – 14:00: Lunch (on your own)

14:00 – 15:30: Session III

Secure Distributed Spectrum Sensing in Cognitive Radio Networks Using Multi-Armed Bandits
Shabnam Sodagari, University of Maryland

Bandwidth Scanning involving a Bayesian Approach to Adapting the Belief of an Adversary’s Presence” [INVITED]
Andrey Garnaev, Rutgers University; Wade Trappe, Rutgers University

NEAT: A NEighbor AssisTed Spectrum Decision Protocol for Resilience against PUEA” [INVITED]
Zituo Jin, Stevens Institute of Technology; Santhanakrishnan Anand, Rutgers; Koduvayur P Subbalakshmi, Stevens Institute of Technology

15:30 – 16:00: Networking Break

16:00 – 17:00: Session IV

Trust-based Data Fusion Mechanism Design in Cognitive Radio Networks
Ji Wang, Virginia Tech; Ing-Ray Chen, Virginia Tech

Demonstrated LLC-Layer Attack and Defense Strategies for Wireless Communication Systems” [INVITED]
Seth Hitefield, Virginia Tech; Vieny Nguyen, Virginia Tech; C Carlson, Virginia Tech; Tim O’Shea, Virginia Tech; T. Charles Clancy, Virginia Tech

17:00: Closing Remarks, Adjourn

Important Dates:

  • Paper Submission Deadline: 1 June 2014 25 June 2014
  • Paper Acceptance Notification: 5 July 2014 14 July 2014
  • Camera-Ready Paper Submission (Accepted & Invited): 11 July2014 18 July 2014
  • Workshop Event: 29 October 2014

Paper Submission Instructions:

Manuscript Format: Paper submissions can have a maximum of 9 pages.

IEEE and IEEE Communications Society Policies: To ensure appropriate consideration of conflicts of interest during the review process, the ComSoc prohibits changes to the list of authors once a paper has been submitted for review during review, revision, or (if accepted) final publication. The author list may be changed only prior to the submission deadline.

Additional paper submittal instructions can be found on the conference web site http://www.ieee-cns.org/.

To be published in the IEEE CNS 2014 Conference Proceedings and submitted to IEEE Xplore®, an author of an accepted paper is required to register for the workshop at the full (member or non-member) rate and the paper must be presented by an author of that paper at the conference unless the Workshop Chair grants permission for a substitute presenter.

Non-refundable registration fees must be paid prior to uploading the final IEEE formatted, publication-ready version of the paper. For authors with multiple accepted papers, one full registration is valid for up to 3 papers. Accepted and presented papers will be published in the IEEE CNS 2014 conference proceedings and submitted to IEEE Xplore®.

Organizing Committee:

Workshop Chairs

Xiuzhen (Susan) Cheng, George Washington University, cheng@gwu.edu
Yalin E. Sagduyu, Intelligent Automation Inc., ysagduyu@i-a-i.com
Yi Shi, Intelligent Automation Inc., yshi@i-a-i.com
Shabnam Sodagari, University of Maryland, shabnam@ieee.org
Alexander M. Wyglinski, Worcester Polytechnic Institute, alexw@wpi.edu

Technical Program Committee Members (as of 05/07/2014)

Gianmarco Baldini, European Commission – Joint Research Centre
T. Charles Clancy, Virginia Tech
Trung Duong, Queen’s University Belfast
Zhiyong Feng, Beijing University of Posts and Telecommunications
Alexandros Fragkiadakis, Foundation for Research and Technology-Hellas
Brent Horine, Clarcona Technology, LLC
Kyeong Jin Kim, Mitsubishi Electric Research Laboratories
Mieczyslaw Kokar, Northeastern University
Ming Li, Utah State University
Xue Li, Samsung
Shiwen Mao, Auburn University
Tommaso Melodia, State University of New York at Buffalo
Gabriele Oligeri, Università di Roma Tre
Lingyang Song, Peking University
Wade Trappe, Rutgers University
Weichao Wang, University of North Carolina at Charlotte
Zhiqiang Wu, Wright State University
Kok Lim Alvin Yau, Sunway University