[Cryptography] Call for Chapters - Applied Cryptography in Smart Grid Communicatios

Mohamed Amine FERRAG mohamed.amine.ferrag at gmail.com
Sat Dec 12 16:21:20 EST 2015

(Apologies, if you get multiple copies of this call)

Call for Chapters: *Security Solutions and Applied Cryptography in Smart
Grid Communications*

URL1 : http://www.igi-global.com/publish/call-for-papers/call-details/2020
URL2 :https://sites.google.com/site/smartgridsigiglobal/

Electrical energy storage is a key factor for the future. The consumption
of electrical energy (i.e. the use of air conditioning, audio and video
devices or electric heating) is increasing every year due; firstly to the
increase of the population and secondly by the appearance of new uses of
consumption, such as electric cars. With this increase consumption, how to
ensure the balance between supply and demand for electricity at all times?
To address this problem, the idea of placing the new generation of smart
grids to control this energy has appeared in recent literature in different
flavors in order to provide electric power supply secure, sustainable and
competitive to consumers. In addition, the revolution in smart grid
involves a significant change in side of the consumer where consumers will
also become producer with the ability of energy storage such as in the
vehicle battery, or as a local generation sources such as photovoltaic
panels. However, the smart grid develops modern solutions for the
next-generation network and digital communication in which many systems and
subsystems are interconnected to provide services from end-to-end network
between various actors and between intelligent devices that are deployed
there. Within each network, a hierarchical structure is composed of
different types of networks, such as the HANs (Home Area Networks), the
BANs (Building Area Networks), the IANs (Industrial Area Networks), the
NANs (Neighborhood Area Networks), the FANs (Field Area Networks), and the
WANs (Wide Area Networks). Currently, large societies propose the use of
cloud computing in smart grid applications connected with the electrical
control center. The main problem in the development of a smart grid is not
located at the physical medium but mainly in delivery of reliability and
security. The possibility of fitting with active or passive attacks in
smart grid network is great to divulge privacy and disrupt energy (e.g.
Wormhole Attack, False Data Injection Attack, Black Hole Attack, Grey Hole
Attack, DoS Attack, Physical Layer Attack, Colluding Adversary Attack,
Routing Table Overflow Attack etc.). Therefore, the security requirements,
including authentication, accountability, integrity, non-repudiation,
access control and confidentiality should be paid more attention in the
future for high performance smart grids. This book will cover the current
scope of various methodologies and mechanisms in the theory and practice of
security, privacy, intrusion detection, and applied cryptography in smart
grid communications in one place.

This comprehensive and timely publication aims to be an essential reference
source, building on the available literature in the field of smart grid
security in developing countries while providing for further research
opportunities in this dynamic field. It is hoped that this text will
provide the resources necessary for policy makers, technology developers
and managers to adopt and implement smart grid platforms in developing
nations across the globe.

*Target Audience*
Policy makers, academicians, researchers, advanced-level students,
technology developers, and government officials will find this book useful
in furthering their research exposure to pertinent topics in smart grid
security and assisting in furthering their own research efforts in this

*Recommended Topics*
This book will include (but will not be limited to) the following topics.
Any other related topics in the area of smart grid security are also
welcome :

- Game theoretical models of smart grid security
- SCADA and legacy system security
- Security and Privacy in Mobile Cloud and Grid Computing
- Secure and resilient cyber-physical and communication architectures
- Intrusion Detection System (IDS)/Intrusion Prevention System (IPS)
- Machine learning for security
- Computer security visualization techniques
- Intrusion detection based on data mining techniques
- Online money laundering and underground economy
- Hardware vulnerabilities
- Binary analysis and reverse engineering
- Security risk assessment, measurement and management
- Network exfiltration
- Security, privacy, and resource management in Wireless Access Networks
(WPAN, WLAN, WLL, etc.)
- Security, Privacy, and Resource Management in Broadband Wireless
Technologies (HSDPA, HSUPA, LTE, WiMAX, WiRAN, etc.)
- Hardware security
- Quantum cryptography
- Privacy-preserving systems
- New attacks against computers and networks
- Denial-of-Service Attacks
- Insider attack detection
- Formal models, analysis, and standards
- Deception systems and honeypots
- Vulnerability analysis
- Secure software development
- Security and Privacy in Next Generation Mobile Networks
- Protocol security
- Network & active defenses
- Malware and botnet analysis, detection, and mitigation
- PHY/MAC/Routing/Transport/Application layer Protocols and Security
- Tamper-resistant device technologies
- Smartphone and other embedded systems security
- Fraudulent usage, prevention of traffic analysis
- Cryptography, key management, authorization and access control
- False data injection, detection and mitigation
- Performance evaluation, performance/security tradeoff analysis
- Modern infrastructure for cities(roads, power plants, water treatment
plants, sewage systems, transit systems)
- Energy Efficiency including non-conventional energy management
- Green Environment including E-Waste Management, Hospital Management etc
- Electro-mobility
- Public key and conventional algorithms and their implementations
- Distributed systems security
- Cyber and Cross-Domain (power to cyber) security event detection,
analysis and response
- DoS/DDoS resiliency
- Cloud security
- Embedded systems security
- Security design and verification tools

*Submission Procedure*
Researchers and practitioners are invited to submit on or before January
30, 2016, a 2-3 page chapter proposal clearly explaining the mission and
concerns of his or her proposed chapter. Authors of accepted proposals will
be notified by February 25, 2016 about the status of their proposals and
sent chapter guidelines. Full chapters are expected to be submitted by May
15, 2016. All submitted chapters will be reviewed on a double-blind review
basis. Contributors may also be requested to serve as reviewers for this

This book is scheduled to be published by IGI Global (formerly Idea Group
Inc.), publisher of the "Information Science Reference" (formerly Idea
Group Reference), "Medical Information Science Reference," "Business
Science Reference," and "Engineering Science Reference" imprints. For
additional information regarding the publisher, please visit
www.igi-global.com. This publication is anticipated to be released in 2016.

*Editorial Advisory Board*

   - Jaime Lloret Mauri, Polytechnic University of Valencia, Spain
   - Al-Sakib Khan Pathan, UAP and SEU, Bangladesh/ Islamic University in
   Madinah, KSA
   - Pascal LORENZ, University of Haute Alsace, France
   - Djamel Djenouri, CERIST Research Center, Algeria
   - Albena Mihovska, Center for TeleInFrastructur, Aalborg University,
   Aalborg, Denmark
   - Mehdi Nafa, Badji Mokhtar- Annaba University, Algeria
   - Hui Hou, School of Automation, Wuhan University of Technology, China
   - Hidoussi Faouzi, University Hadj Lakhdar Batna, Algeria
   - Mubashir Husain Rehmani, COMSATS Institute of Information Technology,
   Wah Cantt, Pakistan
   - Nacira Ghoualmi-Zine, Badji Mokhtar- Annaba University, Algeria
   - Homero Toral Cruz, University of Quintana Roo, México
   - Makhlouf Derdour, University of Cheikh Laarbi, Tebessa, Algeria
   - Lynn M. Batten, Deakin University, Australia

*Important Dates*
January 30, 2016: Proposal Submission Deadline
February 25, 2016: Notification of Acceptance
May 15, 2016: Full Chapter Submission
July 30, 2016: Review Results Returned
September 01, 2016: Final Acceptance Notification
September 15, 2016: Final Chapter Submission

Mohamed Amine Ferrag (Ph.D)
Department of Computer Science
Faculty of Mathematics, Computer Science, and Material Science
Guelma University
BP 401 Guelma 24000 – Algeria
Tel.: +2137 96 96 14 53
E-mail: mohamed.amine.ferrag at gmail.com

Ahmed Ahmim (PhD)
Department of Mathematics and Computer Science,
Faculty of Exact Sciences and Sciences of Nature and Life
University of Larbi Tebessi,
Route of Constantine, Tebessa 12000 – Algeria
Tel.: + 213 5 55 86 70 65
E-mail: a.ahmim at gmail.com
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20151212/e3fa50ae/attachment.html>

More information about the cryptography mailing list