IEEE Global Communications Conference
9-13 December 2018 // Abu Dhabi, UAE
Gateway to a Connected World

WS-12: TCPLS - Trusted Communications with Physical Layer Security

WS-12: TCPLS - Trusted Communications with Physical Layer Security

Primary tabs

The IEEE GLOBECOM Workshop on Trusted Communications with Physical Layer Security will be held in Abu Dhabi, UAE on December 9, 2018 in conjunction with IEEE Globecom 2018.

Workshop website:
EDAS link: 

Important dates:

  • Paper submission: 1 July, 2018
  • Accepted notification: 31 July, 2018
  • Camera-ready due: 30 August, 2018

Due to the broadcast nature of wireless channels, security and privacy is of utmost concern for future wireless technologies. However, how to securely transfer confidential information over a wireless network in the presence of eavesdroppers that may intercept the information exchange between legitimate terminals still remains a challenging task. Although security was originally viewed as a high-layer problem to be solved using cryptographic methods, physical (PHY) layer security is now emerging as a promising means of defense to realize wireless secrecy in communications. In PHY layer security, the core idea is to exploit the characteristics of wireless channels such as fading or noise to design efficient secure transmission strategies, such that the message from the source to the intended receiver are kept confidential from both passive and active eavesdroppers. Over the past few years, PHY layer security has been widely recognized as a key enabling technique for secure wireless communications in future networks.
This workshop aims to bring together practitioners and researchers from both academia and industry for discussion and technical presentations on fundamental and practically relevant questions related to the many challenges arising from secure PHY layer communications. It also aims to provide the industry with a fresh insight into the development of practical PHY layer security in future wireless networks. In line with such objectives, original contributions are solicited in topics of interest to include, but not limited to, the following:

  • Secure methodologies and architectures for mobile and wireless networks
  • Secure signal processing
  • Secure fundamental theory 
  • Secure advanced spatial diversity techniques (secure cooperative communications, secure two-way cooperative communications, secure MIMO communications and secure cognitive radio systems)
  • Secure resource allocation (secure optimization, secure cross-layer optimization and game theory techniques)
  • Multi-user information theoretical security (coordinated design and distributed design)
  • Security and privacy in the Internet of Things
  • Secret key generation and agreement
  • Security for HetNets, massive MIMO systems, and mm-wave transmission
  • Cross-layer designs for security
  • Security and quantum communications
  • Trust, security and privacy in e-government, e-systems, and social networking
  • Trust, security and privacy in cloud computing
  • Performance of practical testbeds for PHY layer security
  • Covert wireless communications

The workshop accepts only novel, previously unpublished papers. All submissions should be written in English with a maximum paper length of six (6) printed pages (10-point font) including figures without incurring additional page charges (maximum 1 additional page with over-length page charge if accepted).

Workshop Organizers
Steering Committee:

  • H. Vincent Poor, Princeton University, USA

General Chairs:

  • Trung Q. Duong, Queen’s University Belfast, UK

TPC Chairs:

  • Junqing Zhang, University of Liverpool, UK
  • Nan Yang, Australian National University, Australia
  • Shihao Yan, Macquarie University, Australia

Star Diamond Patrons