Mobile and Wireless communication networks offer organizations and users several benefits, such as portability, mobility and flexibility, while increasing everyday business productivity, and reducing installation cost.
Wireless Local Area Networks, for instance, have been used in various environments, such as business, home, conference centres, airports and many more, allowing users to move from place to place, avoiding cabling restrictions and without being disconnected from the network.
Ad Hoc Networks are collections of wireless systems interconnected using multihop paths, without the help of any infrastructure such as base stations or access points; these networks allow data synchronization with network systems and application sharing between devices.
Mobile Ad Hoc Networks are autonomous collection of mobile entities that communicate over relatively bandwidth constrained wireless links, establishing survivable, efficient, dynamic communication for emergency operations.
Wireless Ad Hoc Sensor Networks consist of a number of sensors spread across a geographical area, offering certain capabilities and enhancements in operational efficiency in civilian applications, as well as assisting in international effort to increase alertness to potential threats.
However, although Mobile and Wireless Networking environments eliminate many of the problems associated with traditional wired networks, the new security and privacy risks introduced by such environments need to be reduced by exploiting appropriate security measures and safeguards, ensuring an acceptable level of overall residual hazard.
• Cryptographic Protocols for Mobile and Wireless Networks
• Key Management in Mobile and Wireless Computing
• Reasoning about Security and Privacy
• Privacy and Anonymity in Mobile and Wireless Computing
• Public Key Infrastructure in Mobile and Wireless Environments
• Economics of Security and Privacy in Wireless and Mobile environments
• Security Architectures and Protocols in WLANs and B3G/4G Mobile Networks
• Security and Privacy features into Mobile and Wearable devices
• Location Privacy
• Wireless Ad hoc and Sensor Networks Security
• Role of Sensors to Enable Security
• Security and Privacy in Pervasive Computing
• Trust Establishment, Negotiation, and Management
• Secure PHY/MAC/routing protocols
• Security under Resource Constraints (bandwidth, memory, energy, and computation constraints)