The 2nd International Workshop on

Secure Peer-to-Peer Intelligent Networks & Systems

> SPINS 2015 <
In conjunction with ANT 2015, June 2-5, 2015,
London, United Kingdom


Overview

Topics of Interest

Submission Guidelines

Important Dates

Committee


     

Overview

P2P (Peer-to-Peer) networking is contributing to a vast amount of Internet traffic because many Internet users heavily use or depend on file sharing applications like BitTorrent, PPStream, eDonkey, and so on. While these applications often make various types of soft resources (e.g., audio, video, game, music, e-books) easily available via the P2P model, the operational mechanism of the network also makes the system vulnerable to various kinds of security threats. Malicious peers may be often present in such architecture because of the inherent dependence on peers who should cooperate with each other. Attacks against P2P systems could be manifold; Distributed Denial-of-Service (DDoS) attack, injection of useless data (commonly termed as “poisoning”) into the network or pollution attack, identity theft, collusion attack, Sybil attack, etc. Due to the constant efforts of the high-profile hackers for breaching data and finding new methods of attacks, unmonitored P2P file-sharing systems have been threatened today with unparalleled magnitude. Sensitive information could easily be exposed, harvested, and distributed across multiple P2P networks, often with information of government or critical military facilities.

To detect malicious peers, which are responsible for the vast majority of attacks, some schemes use reputation of nodes while some are based on mutual certificates. Especially, in the recent days, social-networking-based certification has been proposed in which a simple strategy of “Friend of Friend” is applied taking a chunk of nodes in the network. This chunk structure could be expanded to cover some portion of the network. The idea is that a friend could certify and support another friend (i.e., here node). However, such kind of solution leaves many issues unanswered like privacy issues, scalability of the network, handling of non-participating node, resource scarcity among the socially networked nodes, and so on. Besides these efforts, intelligent and adaptive methods are being developed using artificial intelligence, fuzzy logic, game theory, and so on. The theme of peer-to-peer also covers various types of wireless ad hoc networks, which adds to the complexity of securing such networks. This workshop's objective is to provide a platform for the researchers and students to share their thoughts and findings on various security issues in P2P, wireless P2P, ad hoc networks and systems.

 

First edition of SPINS workshop was held in 2014 in conjunction with ANT'14 at Hasselt, Belgium.

Topics of Interest

In this workshop, our goal is to publish the latest advancements addressing the topic of security in P2P networks and systems, especially focused on malicious-peer detection based approaches and intelligent-adaptive approaches. Other issues may be blended with the security issues. The topics of interest are (though the list should not be considered exhaustive):

- Detecting malicious peers in P2P network
- Thwarting pollution attack or poisoning attack in P2P network
- Handling resource unavailability due to presence of malicious peers
- Trust management in P2P systems
- Social-networking based security management in P2P networks
- P2P vs Social networking security
- Intelligent and adaptive secure P2P systems
- Game theory based P2P system trust and security
- Defending against P2P data breaches
- Measuring evidence of cyber-criminal activity on P2P networks

- Wireless ad hoc peer to peer network security

- Peer-to-peer monitoring in wireless sensor networks

Submission Guidelines and Publication

Papers must be original, unpublished, and not under review elsewhere. Each paper will be reviewed by the experts in the relevant areas. Authors should submit their papers electronically in PDF format before the deadline (see Important Dates) by pressing the following button or via the EasyChair submission link: https://www.easychair.org/conferences/?conf=spins2015 
 

 

If you have used this system before, you can use the same username and password. If this is your first time using EasyChair, you will need to register for an account by clicking "I have no EasyChair account" button. Upon completion of registration, you will get a notification email from the system and you are ready for submitting your paper. You can upload and re-upload the paper to the system by the submission due date.

All SPINS’15 accepted papers will be printed in the ANT-2015 conference proceedings published by Elsevier Science in the open-access Procedia Computer Science series online. Procedia Computer Sciences is hosted on www.Elsevier.com and on Elsevier content platform ScienceDirect (www.sciencedirect.com), and will be freely available worldwide. All papers in Procedia will also be indexed by Thomson Reuters' Conference Proceeding Citation Index http://thomsonreuters.com/conference-proceedings-citation-index/ . The papers will contain linked references, XML versions and citable DOI numbers. You will be able to provide a hyperlink to all delegates and direct your conference website visitors to your proceedings. All accepted papers will also be indexed in DBLP (http://dblp.uni-trier.de/).

The authors must follow Elsevier guidelines as given in the ANT-2015 Website (http://cs-conferences.acadiau.ca/ant-15/).

However, the number of pages for SPINS'15 workshop papers is limited to 6 pages.

 

For any query or difficulty in submission, please contact the Program Chair, Al-Sakib Khan Pathan at sakib.pathan@gmail.com or spathan@ieee.org

Important Dates

Paper Submission: January 25, 2015
Author's Notification: March 01, 2015
Final Manuscript Due: March 28, 2015

Registration Due: TBA

Workshop Date: June 2-5, 2015


International Program Committee

Program Chair:

Al-Sakib Khan Pathan, International Islamic University Malaysia, Malaysia


Technical Program Committee:
 

Xianglin Wei, Nanjing Telecommunication Technology Research Institute, China
Muhammad Khurram Khan, King Saud University, Saudi Arabia
Homero Toral-Cruz, University of Quintana Roo / ITSCH, México

Hua Wu, Southeast University, Nanjing, China
Mostafa Fouda, Benha University, Egypt
Victor Govindaswamy, Concordia University Chicago , USA

Zheli Liu, Nankai University, Tianjin, China
Hani Alzaid, King Abdulaziz City for Science and Technology, Saudi Arabia

Baojiang Cui, Beijing University of Posts and Telecommunications, Beijing, China
Abderazek Ben Abdallah , The University of Aizu, Japan
Luca Caviglione, ISSIA, CNR, Italy

Guomin Zhang, PLA University of Science and Technology, China

Pasquale Pace, University of Calabria, Italy
Zubair Md. Fadlullah, Tohoku University, Japan
Qurban Ali Memon, UAE University, UAE

Jean-Francois Lalande, Ensi de Bourges / Inria, France

Mohammad Shahid Jamil, Qatar University, Qatar

Tarem Ahmed, BRAC University, Bangladesh

Kevin Hamlen, The University of Texas at Dallas, USA
Yaser Jararweh, Jordan University of Science and Technology, Jordan

Muhammad Motaharul Islam, Islamic University of Technology, Bangladesh