Prof. Jari Veijalainen, GMD-FIT, Germany/Univ. of Jyväskylä, Finland, firstname.lastname@example.org
Prof. Ari Visa. Tampere Univ. of Technology, Finland email@example.com
Mobile computing with real world significance has been expanding since the introduction of lap-top computers into everyday use. During the last few years new classes of smaller wireless portable devices have come to the market place, among them i-Mode terminals in Japan, WAP terminals in those parts of the world where GSM technology has been prevailing (Europe, Asia, Australia) and PDAs equipped with communication capabilities (especially USA). It is expected that in a few years there will be more so-called Internet-enabled portable wireless terminals in the world than there are wireline Internet terminals. The estimates on the number of the Internet-enabled terminals (i-Mode and WAP teminals, as well as other PDA:s, like Palms) range from 134 millions (Strategy Analyst) to 330 millions (IGI Consulting) in 2003. Some estimates speak about existence of 600 million Internet-enabled terminals in the year 2005. In a recent workhop organized by the European Commission (see http://www.ist-wsi.org/) it was argued that by 2010 the prevailing from of access to Internet (or to its follow-up network) will be wireless.
The possible and probable shift from wireline terminals to relatively cheap, wireless, small, portable devices in huge numbers poses as such new challenges to the security in the network infrastructure. This holds not only for the air-interface, but also for the wireline back-bone network. It is foreseeable that e.g. roaming between different types of networks (Bluetooth, WLAN, GSM/UMTS etc.) becomes necessary and possible. Evidently, secure roaming between the networks is an issue, because otherwise a hostile terminal could take-over a session during hand-over from a network to another.
Second, the scope of the security issues related with the terminals is enchanced as compared to the current voice terminals on one hand, and the fixed terminals (like PCs) on the the other hand. This is because the Internet-enabled terminals will be used as Personal Trusted Devices (PTDs) to conduct diverse mobile e-commerce transactions and possible also transactions towards the authorities (e-government). They are also a natural part of information systems of corporations. Thus, such a terminal becomes a much more attractive object for ordinary thiefs or for other people wanting to misuse the cyber-identity of the owner, than the current voice terminals. The information stored into such a device (emails, company documents etc.) or the access to the corporate networks through stolen devices may also be interesting for criminal elements, enemies, or for hard commercial competitors.
Third, location-based services are emerging as a brand-new service typical of the globally roaming PTDs. The possiblity to track the persons location at any time (especially with the help of "always-on" terminals) is evidently a threat to privacy, but it also entails many security aspects; for instance, if a burglar could track a person's position unnoticed, he/she would know when the owner is far enough so that the home could be robbed.
The list of topics of the special issue are (including, but not limited to)
Original, unpublished research articles will be evaluated by a rigorous peer-review. The manuscripts must not be under consideration for other journals or conferences. All abstracts and full papers should preferably be submitted electronically. Authors are recommended to submit an abstract of the intended paper by May 31, 2001 to one of the editors. The abstract should be about one page long and contain the title of the intented paper, affiliation(s) of the author(s) and the main results. The authors are given feedback based on the abstract. The full manuscripts are due by August 15, 2001 and they can be sent also without prior communication with the editors. The acceptance notification will be sent by December 31, 2001 and the final versions of the papers are due February 28, 2002.
For abstracts, use MS Word, Postscript, or PDF format. Concerning the full papers, pls consult the home page of MONET at http://www.baltzer.nl/authors/auth3.asp#acceptable and follow the guidelines given for the accepted papers as concerns the length (20 pages), styles, and acceptable word processor formats, because so you will most probably save work in the future; (Balzer prefers to get papers in LaTeX or TeX and figures in (encapsulated) Postscript.Please include macros and nonstandard styles with your submission. However, Balzer also can deal with files written by popular word processors: Word (graphics and tables can be imported from Excel and PowerPoint), Word Perfect, Claris Works (Macintosh)...).
Send the full papers as an attachment of an email message to Ari Visa using the address firstname.lastname@example.org. Include the title of the paper, abstract, name(s) of the author(s), her (their) affiliations, contact information (address, email, fax, telephone) and indicate the contact person in the main body of the email in ascii format.
Pls, consult the page for further information and updates.
Prof. Dr. Jari Veijalainen
Prof. Dr. Ari Visa
Last update, February 11, 2001