Second workshop on trusted communications with Physical Layer Security (TCPLS20014)

 

 IEEE GLOBECOM 2014, 12th December 2014 in Austin, Texas. USA.

    
 

 

Home

Organisers

Keynote Speaker

Invited Speakers

Technical Program Comittee

Important Dates and Submission Guideliness

Call for Papers


 
Due to the broadcast nature of the wireless channels, security and privacy is of utmost concern for future wireless technologies. However, securely transferring confidential information over a wireless network in the presence of eavesdroppers that may intercept the information exchange between legitimate terminals, still remains a challenging task. Although security was originally viewed as a high-layer problem to be solved using cryptographic methods, physical layer security is now emerging as a new promising mean of defense to realize and enhance wireless secrecy in communications. In wireless physical layer security, the breakthrough idea is to exploit the intrinsic characteristics of the wireless channels, such as multipath fading, path losses, or noise, to transmit a message from a source to the intended receiver while keeping confidentiality from both passive and active eavesdroppers.

After the success of the last year, the second workshop on trusted communications with Physical layer security aims to bring together practitioners and researchers from both academia and industry for discussion and technical presentations on fundamental and practically relevant questions related to the many challenges arising from secure communications at the physical layer. In line with such objectives, original contributions are solicited in topics of interest including, but not limited to, the following:

  • Secure methodologies and architectures for mobile and wireless networks

  • Secure signal processing

  • Secure fundamental theory

  • Secure advanced spatial diversity techniques (secure cooperative communications, secure two-way cooperative communications, secure MIMO communications and secure cognitive radio systems)

  • Secure resource allocation (secure optimization, secure cross-layer optimization and game theory techniques)

  • Multi-user information theoretical security

  • Cross-layer designs for security

  • Security and privacy in the Internet of Things

  • Security and quantum communications

  • Trust, security and privacy in e-government, e-systems & social networking

  • Trust, security and privacy in cloud computing

  • Performance of practical testbeds for PHY security