Search WWW Search inass.org
»Topics
»Committee Members
»Author Guidelines
»Reviewer Guidelines
»Contents & Papers
»Call for Special Issues
»Scimago (SJR)
 
»IEEE CIS
»INNS
»IEEE IS
PUBLICATIONS | Journal Description

Special Issue:
Intelligent Security Mechanisms for Smart and Intelligent Ubiquitous Devices


Guest Editors:

Dr.P.Vijayakumar,
Dean Incharge,
University College of Engineering Tindivanam, Anna University Chennai, Tamilnadu
Email : vijibond2016@gmail.com

Dr. Bharat S. Rawal Kshatriya, D.Sc.
Assistant Professor of IST,
Penn State Abington, 1600 Woodland Road, Abington, PA
Email : bsr17@psu.edu


Aims and Scope
Application of mathematics and computer science to analyze the behavior of complex systems is termed as computational modeling. In the present decade, with the integration of smart devices enabled with RFID, people live with the computers instead of harnessing the computing potential from computers. With the advent of wearable and mobile computing, computing has become invisible and inter-woven in many walks of human life. Ubiquitous computing provides one of the latest advanced platforms for innovative research works in the spectrum of computer science. As more and more computers are embedded into different walks of life, secure algorithms that are computationally efficient are the need of the hour due to universal presence and the limited source of power. The ideal focus of this special issue is to propose and put forward latest inter-disciplinary works on computational models which address the fundamental security issues in ubiquitous computing.

Relevance to the main scope of this journal The proposed title of this Special Issue is “Intelligent security mechanisms for smart and intelligent ubiquitous devices”. In recognition of the growing importance of research in ubiquitous computing which has become an indispensable part of many walks of the human life, providing high security and developing computationally efficient algorithms is a challenging issue. Since computing has become vital due to the emergence of networking standards as in Internet of Things, theory and frameworks in solving many scientific and engineering challenges for ubiquitous computing is necessary. The research articles will be accepted from four diverse disciplines that focus on Computational Models. The different disciplines include development of algorithms or frameworks in High Performance Computing, Artificial Intelligence, Network Security and Knowledge Discovery. The focus of this special issue is to contribute latest algorithms and research results based on simulation, prototypes and real world implementations for the security related issues in ad hoc networks and in ubiquitous computing. The major areas that are considered relevant for this special issue are gesture based authentication schemes for ubiquitous devices, various computing paradigms, optimization and security issues and probably the theoretical model of the future generation computer systems.

Main topics and quality control The field of information and communication technology is a highly dominating domain that refers to the convergence of use of information rich areas like computer networks and others. The focus of this special issue is to contribute latest algorithms and research results based on simulation, prototypes and real world implementations in ad hoc networks and in ubiquitous computing. Hence the research articles might be pertaining to the papers on security issues, advanced cryptographic techniques, design of new protocol implementations in ubiquitous and ad hoc networks which would be a rich source of information to the field of information and communication engineering.

1.   Gesture based authentication schemes for smart devices.

2.   Intelligent security in VANET.

3.   Advanced cryptographic techniques for emerging technologies used in intelligent devices.

4.   Optimization of computationally efficient security algorithms.

5.   Recent security issues in ubiquitous computing.

6.   Security, privacy and trust management in ad hoc and ubiquitous networks.

7.   Security in Internet of Things (IOT).

8.   Performance issues in wired/wireless networks

Originality Check

The submission of research articles must follow the strict guidelines of the journal formatting. The submission processes provided to the authors are given below:

a.      Authors are advised to submit their original and unpublished work (closely related to the theme of conference).

b.     The manuscript must clearly indicate the analysis of the technical problem, their new contribution(s), and the experimental results along with detailed discussions with respect to the state-of-the-art methodologies. It is to be noted that only empirical research papers are likely to be published in the journal special issue.

c.      The papers should be submitted through online only.

d.     All submissions should be in both pdf & word document in English.

e.      Each paper should not exceed 10 printed pages or 5,000 words (up to a max of 7,000 words).

f.      If the paper has already been submitted to the conference, the research paper must be expanded and enhanced with sufficient new material, i.e. at least 40% new content and must be given a new title.

g.     Initially, the manuscripts submitted by the authors are checked for Plagiarism. Subsequently, if the report results are less than or equal to 20% it is deemed to be accepted for further review.

Important Dates

Submission of papers: 25 Jan, 2017

Notification of review results: 29 Mar, 2017

Submission of revised papers: 05 May, 2017

Notification of final review results: 05 June, 2017



INASS Home | Copyright@2008 The Intelligent Networks and Systems Society