The Fourth International Symposium on Ubiquitous Networking

Hammamet, Tunisia, May 02-05, 2018


Call For Papers - Main Conference

The Fourth international symposium on Ubiquitous Networking (UNet’18) highlights new trends and findings in hot topics related to ubiquitous computing/networking. This event intends to bring together researchers and practitioners to present and discuss their recent progresses in all major areas of ubiquitous networking. The UNet’18 program will host special talks addressed by distinguished keynote speakers and highly reputed visionary experts, and will feature technical papers, tutorials, special sessions, and workshops. 

Papers delivered at UNet 2018 will be published and indexed by Springer Verlag as a part of the Lecture Notes in Computer Science (LNCS) Series. They will also be submitted to SCOPUS, ISI, DBLP and other leading indexing services. 

Papers of particular merit will be recommended for a possible special issue in international journals (discussions are underway with several international journals for publishing the accepted papers). A PDF version of the call for papers can be found here.  


The conference invites two types of submissions: Full Technical Papers, and Short Technical Papers. A detailed description of papers submission procedure is available via this link

UNet 2018 will features thematic content across the following five tracks:

Track 1: Ubiquitous Communication Technologies and Networking

  • Millimeter-Wave and Terahertz communications
  • Modulation, coding, and diversity techniques 
  • OFDM, MIMO, multi-user MIMO, and massive MIMO
  • Multiple access techniques in wireless networks
  • Optical wireless access networks
  • Visible light communications and networks
  • Free space optical communications and networking
  • Power line communication technologies
  • Maritime, space and underwater communications
  • Beyond 4G and 5G communications
  • Heterogeneous and small-cell networks
  • Satellite communication and networks
  • Physical-layer secrecy and privacy
  • Quality of service provisioning schemes
  • Cognitive and flexible radio
  • Channel estimation, characterization, and synchronization techniques
  • Optical data center networking
  • Radio-over-fiber
  • Visible light positioning and navigation
  • Ultraviolet communications and networks
  • Optical wireless sensing and monitoring
  • Optical switching technologies, devices, and architectures
  • Energy harvesting and green wireless communications
  • Software-defined mobile/wireless networks
  • Mesh, relay, sensor and ad hoc networks
  • Delay-tolerant and fault-tolerant networking
  • Seamless inter-networking, self-organization and self-healing
  • Routing in ubiquitous networks
  • Resource management and optimization
  • Integrated wireless/optical networks
  • Mobility, localization, navigation, and handoff management
  • Wireless broadcast, multicast and streaming
  • Congestion and admission control
  • Wireless BAN, PAN, LAN, MAN and WAN
  • Dynamic bandwidth allocation in 4G, B4G, 5G and Pervasive Systems
  • Provisioning, measuring and controlling QoS, QoE, QoC and QoI in Pervasive Environments
  • Cross-layer design and emerging protocols for Pervasive Networks

Track 2: Ubiquitous Internet of Things: Emerging Technologies and Breakthroughs

  • Internet connectivity for IoT
  • Data architectures, brokering and management
  • Security, privacy, trust, and access control for IoT
  • Edge and cloud computing for IoT
  • Mobility, localization and management aspects of IoT
  • Internet of Things scalable infrastructures, architectures and platforms
  • Beyond 4G and 5G involvement in IoT environment
  • Innovative context aware IoT services and applications
  • Crowdsensing and sourcing, and social IoT
  • Incentive mechanisms for participatory crowdsensing/crowdsourcing applications
  • Energy harvesting and green technologies for IoT
  • Object naming in the IoT/IoE environments
  • Fundamentals and characterization of IoE communications
  • Multiple access protocols for IoT environment
  • Resource management techniques for IoT environment
  • Routing and control protocols for ultra-dense IoT environment
  • Game theory and learning for IoT ubiquitous communications
  • Identity management and object recognition
  • Embedded Systems, wearables devices, and Body Sensor Networks
  • Multi-sensor fusion in IoT
  • Distributed computing and storage in IoT
  • Data Fusion and management, and big data analytics for IoT
  • Autonomous vehicles and self-driving
  • Cooperative driving for autonomous vehicles
  • Unmanned-Aerial-Vehicles (UAV) platforms and networking
  • Standardization, regulation and industrial efforts for IoT
  • Business models, monetization and ecosystems of IoT
  • Lightweight communication protocols and data structures for IoT
  • Radio Frequency Identification
  • Low power chip/system design for IoT
  • Integration of software defined networks with IoT
  • Machine-to-Machine (M2M), Device-to-Device (D2D) communications
  • Application-oriented solutions (Healthcare, Military, Supply Chains, Environment, Agriculture, Smart cities, Education, ...)
  • Cyber Physical Systems design and networking
  • Advanced technologies for dense and ultra-dense network deployment
  • Clustering, topology control, coverage, and connectivity

Track 3: Mobile Edge Networking and Fog-Cloud Computing

  • Mobile cloud networking, architectures, and platforms
  • Cloud radio access networks
  • Security, privacy and reliability for ubiquitous cloud computing
  • Crowdsensing models and architectures
  • Energy efficient resource allocation for cloud-based systems
  • Resources management, provisioning, and migration in cloud systems
  • Cloud data storage and management models
  • Network and service functions virtualization, and programmable infrastructures
  • SDN, objects abstraction and virtualization
  • Fog and Edge computing
  • Hybrid cloud integration
  • X As A Service in ubiquitous clouds
  • Resource management, optimization, and provisioning in the cloud
  • Quality of Service for cloud applications
  • Big Data analytics in clouds
  • Virtualization aware networking
  • Service modeling, specification, discovery, monitoring, control, composition, and brokering
  • Techniques and methods for cloud design and analysis
  • Cluster and smart Grid
  • Vehicular and sensor cloud networks
  • Consumer-centric applications and services using mobile edge platforms
  • Cloud on Demand: agility and scalability
  • Fog-based and Cloud Radio Access Networks
  • Fog-Cloud interactions and enabling protocols
  • Data centers and infrastructures
  • Interaction between the edge and the cloud
  • Cloud economics
  • Risk compliance and governance for cloud networking
  • Software development platforms and innovative applications
  • Cloud service-level agreements and cloud context-level agreements
  • Virtual network management and orchestration

Track 4: Data Engineering for Ubiquitous Environments

  • Data engineering models
  • Machine learning and data mining
  • Deep learning
  • Data science and big data
  • Cloud, high performance, and scalable computing
  • Multimedia streaming over mobile networks
  • Collaborative streaming for Ubiquitous Networks
  • On Demand video streaming
  • ICN enabled mobile video delivery
  • Provisioning user QoE in ICN
  • Analytics for information centric networking decision in 5G
  • Cyber security and defense in Big Data
  • Big Data analytics and applications in pervasive systems
  • Big Data platforms for 5G
  • Data classification, retrieval, clustering, and visualization
  • Knowledge discovery and transformation
  • Artificial intelligence and decision support systems
  • Formal methods, fuzzy logic, neural networks, genetic algorithms, and ant colony optimization
  • Data query processing and optimization in databases
  • Temporal, spatial, sensor, and multimedia databases
  • Distributed, Parallel, and Peer-to-Peer Databases
  • Ubiquitous data management
  • Cooperation, competition, learning and autonomy in pervasive systems
  • Context-aware and profile-aware pervasive systems
  • Content caching/storage and dissemination in pervasive systems
  • Adaptive, autonomic and context-aware computing
  • Data Grids, Data Warehousing, and OLAP
  • Economics in pervasive systems
  • Signal, image, and video processing for pervasive systems
  • Game-theoretic models and application in pervasive systems

Track 5: Cyber Security for Ubiquitous Communication

  • Legal and policy issues in cyber security and defense
  • Availability, privacy, authentication, trust, access control, and key management
  • Formal and theoretical techniques of cyber security
  • Incident response techniques in networked and distributed systems
  • Security and privacy in wireless and mobile systems
  • Cyber security engineering
  • Intrusion Detection
  • Risk analysis and management in cyber security
  • Storage systems protection and forensics
  • Economic and management aspects of cyber security and privacy
  • Evidentiary aspects and forensics of digital crimes
  • Cybercrime scenarios modeling, analysis, and investigation
  • Hypothetical reasoning in cyber incident response
  • Collaborative and distributed techniques for cyber defense and cyber investigation
  • Active, adaptive, and intelligent defense systems
  • Embedded security
  • Evidence preservation, management, storage and reassembly
  • Anti-forensics and anti-anti forensics prevention, detection, and analysis
  • Multimedia security
  • Traffic jamming and defenses
  • Lightweight security techniques
  • Large-scale investigations in large networks and Big Data
  • Privacy and Security in Big Data
  • Security and privacy in clouds
  • Techniques for tracking and trace-back of attacks in ubiquitous systems 
  • Data hiding, extraction, and recovery technique
  • Security in distributed, virtual, and cloud environments
  • Cyber security architectures
  • Defense in depth
  • Cybersecurity of industrial control systems and critical infrastructures
  • Cyber physical systems security
  • Supervisory control and data acquisition security
  • Bio-inspired security



© Copyright UNET 2018 - All rights reserved.