Workshop on Future Information Security 2015 | Comsnets 2015
Thank you for making COMSNETS 2015 a great success. See you at COMSNETS 2016: 5th - 9th Jan 2016, Bangalore !
JANUARY 6 - 10

Vidhana Soudha by Ranganath Krishnamani

Workshop on Future Information Security 2015

Workshop Date: Saturday, January 10, 2015 (Click to view schedule)

FIS 2015 aims to serve as a premier international forum for discussions, bringing together academic, industrial and governmental researchers along with practitioners, standards developers, policy makers and students interested in future information and communications security techniques, systems, and applications. The workshop also serves as a venue for learning about state-of-the-art in security and privacy research, giving attendees the opportunity to network with experts in the field.

Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, the following topic areas:

  • Authentication, authorization and accounting
  • Information Security protocols and architectures
  • Security in social networks
  • Security in parallel and distributed systems
  • Security in wired, mobile and wireless communications
  • Network Intrusion Detection and Prevention, Firewalls, Packet Filters
  • Security in grid/cloud/pervasive computing
  • Public Key Infrastructures, Key Management, Credential Management
  • Security and Privacy polices
  • Network and Internet Forensics Techniques
  • Secure Routing and Security Management
  • Application security, Malware, viruses, botnets, etc.
  • Embedded system security
  • Security & privacy for e-commerce/m-commerce
  • Security for Big data Applications
  • Security & Privacy in Pervasive and Ubiquitous Computing
  • Security in Software Defined Networking
  • Cyber-crime prevention, vulnerabilities and counter-measures
  • Security modelling analysis methodologies
  • Secure group communication/multicast
  • Middleware security
  • Security, trust and privacy metrics
  • Applied cryptography
  • Biometric security
  • Digital rights management
  • Database security
  • Information hiding & flow protection
  • Security data mining
  • Secure location-based service
  • Security risk analysis
  • Security and privacy in dynamic environments

Important Deadlines

Paper Submission 3rd October 2014 1st November 2014 (Final extension)
Notification of Acceptance 20th November 2014 2nd December 2014
Camera-ready Submission 10th December 2014
Workshop Date 10th January 2015

Submission Guidelines

  • Submitted manuscripts should be at most six (6) pages in standard IEEE two-column format, including figures, tables, and references.
  • Submissions must be in Portable Document Format (.pdf)

Paper Submission

Full papers must be submitted using the EasyChair submission system. If you don't have an EasyChair account, the link will allow you to create one.

First, ensure that you have formatted your paper according to the instructions in the Submission Guidelines above.

Papers are only accepted in PDF format.

After submitting your paper you will receive an automated reply from EasyChair. Some email systems may filter this email as spam - it is very important that you check if this is happening, and rectify it. Subsequent emails about your submission will be sent via EasyChair, and it is important that you receive them. Please direct any questions to Dr Ram Krishnan ([email protected])

To submit a paper for the FIS2015 Workshop, please use the following link:

Note: All Workshop papers (full papers - both regular and invited) WILL appear in IEEE Xplore.

Keynote Speakers

Fun Hu

University of Bradford, UK

Risk Assessment and Cyber Security in aircraft cabin network

Safety, reliability and security are three most important aspects in the air transport industry. The latter two have direct impacts to safety. This talk specifically focuses on the security aspect. In particular, risk and threat assessment methodology on aircraft security will be discussed based on the EUROCAE, ARINC and UK IS standards. An example of risk and threat analysis carried out in an aircraft communication network is discussed. Countermeasures for potential security threats are proposed.

Click here to view Biography

Professor Fun Hu is Professor of Wireless Communications Engineering in the University of Bradford, where she leads the Future Ubiquitous Networks (FUN) Research Group. She also holds the Yorkshire Froward Chair in Wireless Communications established by the Regional Development Agency Yorkshire Forward. She has over 20 years' experience in mobile, wireless and satellite communications and has played a significant role in many influential EU, ESA and UK council funded projects. Her research interests encompass aeronautical communications, mobile/wireless/satellite networking, protocol design, security, QoS and mobility management, radio resource management, wireless sensor networks, RFID, Middleware, Internet of Thing, the Future Internet and robotics. She was one of the two UK national delegates to various EU COST (Co-Operation in Science and Technology) Actions including COST 279, COST253 and COST 256. She was an executive member in the IEE Electronics and Communications Divisions Professional Network Group on Satellite Systems and Applications between 2000 and 2002 and a member of the Technical Advisory Board in the same group between 2002 and 2008.

Giridhar Mandyam

Qualcomm, USA

New Directions in Mobile Web Authentication

Identity and authentication in the mobile web are important for many types of applications that benefit users, such as payments or dispatch. The mobile web today has several traditional approaches to authentication that allow for sensitive applications to take place. However, moving forward the use of contextual data can have a place in the area of authentication, Use of sensor information available on smartphones can provide information about user context that can serve either to augment existing authentication techniques or even provide additional authentication factors in their own right. This talk will provide an overview of existing techniques for mobile web authentication, and also discuss recent advances in hardware-based authentication.

Click here to view Biography

Dr. Giridhar D. Mandyam is Head of Standards for Qualcomm Innovation Center (QuIC), a wholly-owned subsidiary of Qualcomm Inc. He has also worked at Rockwell International, Texas Instruments and Nokia. In addition to being QuIC's Advisory Committee representative to the Worldwide Web Consortium (W3C), he is Chair of the W3C Geolocation Working Group. He is also Chair of the S34-3 Ad Hoc Group on Presentation Logic and Service Frameworks for the Advanced Television Systems Committee (ATSC). Dr. Mandyam is inventor or co-inventor of more than thirty issued patents. In addition, he is a Board Member of the FIDO (Fast Identity Online) Alliance. He has published over 75 conference and journal papers, and 5 book chapters. He is a co-author of the text Third-Generation CDMA Systems for Enhanced Data Services (Academic Press, 2002). He is a Senior Member of the IEEE, and has been a member of the editorial board of the IEEE Transactions on Wireless Communications.

Workshop Schedule

Time Sessions
09:00 - 09:30 Registration
09:30 - 10:30 Keynote Speech 1
10:30 - 11:00 Tea/Coffee Break
11:00 - 12:00 Keynote Speech 2
12:00 - 13:00 Technical Session 1
13:00 - 14:00 Lunch
14:00 - 16:00 Technical Session 2
16:00 - 16:30 Tea/Coffee and Participant Mixer

Presentations for Technical Session 1 (12:00 – 13:00 hrs)

12:00 – 12:30 hrs

Giulio Peretti, Vishwas Lakkundi and Michele Zorzi. BlinkToSCoAP: An End-to-End Security Framework for the Internet of Things

12:30 – 13:00 hrs

Mrudula Sarvabhatla and Chandra Sekhar. An Energy Efficient Mutual Authentication Scheme for Secure Data Exchange in Health-Care Applications Using Wireless Body Sensor Network

Presentations for Technical Session 2 (14:00 – 15:30 hrs)

14:00 – 14:30 hrs

Swati Agarwal and Ashish Sureka. Using Common-Sense Knowledge-Base for Detecting Word Obfuscation in Adversarial Communication

14:30 – 15:00 hrs

Suraj Verma, Prashant Pillai and Yim-Fun Hu. Energy-Efficient Privacy Homomorphic Encryption Scheme for Multi-Sensor Data in WSNs

15:00 – 15:30 hrs

Giridhar Mandyam and Mike Milikich. Leveraging Contextual Data for Multifactor Authentication in the Mobile Web

15:30 – 16:00 hrs

Mrudula Sarvabhatla, Lakshmi Narayana and Chandra Sekhar. A Robust Mutual Authentication Scheme for Data Security in Cloud Architecture

Workshop Co-Chairs

Prashant Pillai

University of Bradford, UK

[email protected]foolip.p

Huzur Saran

IIT Delhi, India[email protected]

Workshop TPC Chair

Ram Krishnan

University of Texas at San Antonio

ram.kri[email protected]

Technical Program Committee

Name Affiliation Country
Haitham Cruickshank University of Surrey United Kingdom
Zubair Baig Edith Cowan University Australia
Benjamin Aziz Potsmouth University United Kingdom
Ronald Petrlic Saarland University Germany
Lizzie Coles-Kemp Royal Halloway University of London United Kingdom
Gabriele Oligeri ISTI-CNR Italy
Ravishankar Borgaonkar DEUTSCHE TELEKOM AG Germany
Abhinav Srivastava AT&T Labs Research USA
Donghoon Shin Arizona State University USA
Xin Jin Inc. USA
Jae Park University of Texas at San Antonio USA
Rajkumar PV University of Texas at San Antonio USA
Christian Damsgaard Jensen Technical University of Denmark Denmark