Top Image.bmp

Third IEEE GLOBECOM Workshop on Trusted Communications with Physical Layer Security (TCPLS2015)

IEEE GLOBECOM 2015, 6-10 December 2015, San Diego, California, USA.



Submission Guidelines

Call for Papers

Due to the broadcast nature of the wireless channels, security and privacy is of utmost concern for future wireless technologies. However, securely transferring confidential information over a wireless network in the presence of eavesdroppers that may intercept the information exchange between legitimate terminals, still remains a challenging task. Although security was originally viewed as a high-layer problem to be solved using cryptographic methods, physical layer (PHY) security is now emerging as a promising new (additional) means of defence to realize wireless secrecy in communications. In wireless PHY security, the breakthrough idea is to exploit the characteristics of wireless channels such as fading or noise to transmit a message from the source to the intended receiver while trying to keep this message confidential from both passive and active eavesdroppers. Over the past few years, PHY security has been widely recognized as a key enabling technique for secure wireless communications in future networks.


This workshop aims to bring together practitioners and researchers from both academia and industry for discussion and technical presentations on fundamental and practically relevant questions related to the many challenges arising from secure PHY communications. In line with such objectives, original contributions are solicited in topics of interest to include, but not limited to, the following:

        Secure methodologies and architectures for mobile and wireless networks

        Secure signal processing

        Secure fundamental theory

        Secure advanced spatial diversity techniques (secure cooperative communications, secure two-way cooperative communications, secure MIMO communications and secure cognitive radio systems)

        Secure resource allocation (secure optimization, secure cross-layer optimization and game theory techniques)

        Multi-user information theoretical security (coordinated design and distributed design)

        Cross-layer designs for security

        Security and privacy in the Internet of Things

        Security and quantum communications

        Trust, security and privacy in e-government, e-systems & social networking

        Trust, security and privacy in cloud computing

        Performance of practical testbeds for PHY security