The 22nd IEEE International Conference on Network Protocols
ICNP LogoRTP Map
 
October 21-24, 2014          The Research Triangle, North Carolina

Home

Organizing Committee

Student Travel Grants

Registration

Technical Program

PhD Forum

Workshops

Venue

Sponsors



Past Links:

Call for Workshops
Call for Papers
Call for Posters
Camera Ready Instructions
Submission Instructions
The following workshops will be co-scheduled with ICNP 2014:

CNERT - Computer and Networking Experimental Research Using Testbeds

http://icnp2014.csec.rit.edu/

Experimentation has played a very important role in advancing research in computing.  Although simulation is an important tool for studying and analyzing the behavior of new protocols and algorithms, it is essential that new research ideas be validated on real systems and testbeds.

This workshop will bring together researchers and technical experts to share experiences and advance the state of the art in experimental research in areas such as networking, distributed systems and cloud computing.  It aims to inspire researchers to use testbeds in novel and interesting ways as a means to validate research ideas.  Of particular interest are experiments on publicly available testbeds such as GENI, PlanetLab, Emulab, Orbit, Ofelia, and so on. Authors are encouraged to include references to detailed experiment setups that will enable others to extend their work.

We solicit papers with experimental results from areas including, but not limited to:
  • Future Internet architectures
  • Wired and wireless network protocols
  • Computer and network security
  • Software defined networking (SDN)
  • Sensor networks
  • Cloud computing and big data
  • Distributed applications such as content delivery networks
  • WiMax communications and services
  • Social networks
  • Network economics and pricing
Experiments may be from areas including, but not limited to:
  • Experiment design and deployment
  • Instrumentation and Measurement
  • Evaluation and analysis of experiment data
  • Design for repeatability and reproducibility
  • Creation and sharing of datasets of broad interest to the community
  • Tools and services for testbed users and operators
  • Large-scale experiments
  • Experiments on federated testbeds
  • Testbed implementation and deployment
Presentations at the workshop will be strongly encouraged to include a demonstration.  Authors should indicate in their papers if they think that such a demonstration is feasible. All papers will go through a thorough review process by experienced researchers who will provide constructive feedback.



CoolSDN - COntrol, Operation, and appLication in SDN Protocols

http://success.cse.tamu.edu/CoolSDN2014/index.php

A major recent development in computer networking is the emergence of Software Defined Networking (SDN), whose goal is to provide a centralized, programmable control plane that is decoupled from the distributed data planes on individual network devices. In particular, the development of OpenFlow has demonstrated many potential benefits of SDN, and multiple vendors have started to offer commercial switches supporting the OpenFlow standard. Researchers have also made progress on SDN components including SDN controllers, switches, programming interfaces, verification and debugger tools, and SDN applications in data center network, campus network, routing, and traffic engineering.

Despite the progress, many important questions regarding SDN still remain, especially in longer term issues around SDN thermal foundation, programmability and control logic, formal methods and protocol engineering, abstraction and view, network operating system, etc. The goal of this workshop is to facilitate research and discussion related to those longer timer SDN topics.

Topics of interest include but are not limited to:
  • SDN Challenges
  • SDN Architecture
  • Formal Methods in SDN
  • SDN Protocol Engineering
  • SDN Programming Correctness
  • SDN Programming Interfaces (South Bound, North Bound, and East-west Bound)
  • SDN Network Operating System
  • SDN Data Plan Abstraction
  • SDN Network Abstraction and View
  • SDN Performance and Reliability
  • SDN Protocol Application


CRAB 2014: Second Workshop on Cognitive Radio Architectures for Broadband

http://www.i-a-i.com/CRAB2014/

Cognitive radio enables access to broader pools of spectrum and more efficient utilization of current wireless resources and thus plays a key role for the next generation of mobile broadband. Recently, there are more efforts on design and implementation of cognitive radio architecture for broadband applications. Development of novel cognitive network protocols with adaptive configurations is needed to support traffic demands by exploiting all dimensions of wireless spectrum. The traditional static spectrum allocation, although simple, poses a major obstacle for efficient use of limited wireless resources across time, space, and frequency. This challenge has promoted developing cognitive radio technologies for efficient spectrum utilization. There have been efforts to analyze fundamental limits of cognitive radio network capabilities and design algorithms at different layers or cross-layer algorithms to capture spectrum efficient solutions. Beyond these efforts, there is now an increasing demand to develop mature architectures and network protocols for cognitive radios. Novel design paradigms can cover the entire protocol stack and provide spectral agility and resilience with dynamic network protocol functionalities. These capabilities open new ways to improve spectrum efficiency of wireless communications and can be used in many emerging broadband applications, including application of cognitive radio to current 4G LTE environments, and how it could be used to enable 5G or later generations of mobile broadband services. 

This workshop focuses on cognitive radio protocol design, analysis, implementation, test, and evaluation to address the future of mobile broadband. Topics of interest include, but are not limited to the following:
  • Spectrum Sensing and Access Protocols
    • Spectrum Sensing and Dynamic Spectrum Access
    • Spectrum Database Architectures and Radio Environment Maps
    • Policy-based Cognitive Networking Applications to Federal Spectrum Sharing and Public Safety
    • Spectrum Efficiency (Entire Protocol Stack)
  • Cognitive Radio Access Networks
    • Cognitive Wireless Resource Allocation
    • Applications to Multimedia Communications
    • Applications to Small Cells
    • Applications to Energy Efficient and Green Communications
    • Applications to TV White Space, Radar, and Space Communications
  • Cognitive Network Management
    • Cognitive Resource Allocation and Frequency Planning
    • Intelligent Interference Mitigation
    • Quality of Service, Optimization and Game Theory in Cognitive Networks
    • Priority and Preemption in Cognitive Networks
    • Network Protocols and Self-Organizing Networks
  • Spectrum Security
    • Spectrum Denial of Service
    • Spectrum Sensing Security
    • Resilient Spectrum Databases
    • Robustness of Cognitive Protocols
    • Attack Detection and Mitigation
  • Cognitive Radio System Evaluation
    • Cognitive Radio Implementation and Hardware Prototypes
    • Software-Defined Radio Design
    • Cognitive Radio Testbed, Simulation and Emulation
    • Performance Evaluation and Tests of Cognitive Network Protocols

Workshop on Secure Network Protocols (NPSec'14)

http://netsec.cs.uoregon.edu/npsec2014/

The Workshop on Secure Network Protocols (NPSec) is a top workshop focusing on cutting-edge research with a broad range of topics related to secure network protocols. NPSec 2014 is a one-day event held in conjunction with the 22nd IEEE International Conference on Network Protocols (ICNP 2014). NPSec 2014 focuses on two exciting areas related to secure network protocols. The first focus is on the development and analysis of networking protocols for the secure operation of various network infrastructures, including both today's Internet and future Internet architectures, wireless and mobile networking, cloud-based networking, peer-to-peer and overlay networks, online social networking, and Internet of things. Papers about new secure protocols, security enhancements to existing protocols, or protocol analysis (such as new attacks on existing protocols) are all welcome. The second focus is on employing such secure network protocols to create or enhance network applications, such as those related to the Web, online social networking, online gaming, or cloud-based applications.

Topics of interest include but are not limited to:
  • Vulnerabilities of existing protocols and applications (both theoretical and case studies), including attacks
  • Design of new secure or resilient network protocols
  • Security enhancements to existing networking protocols
  • Deployment study of secure protocols on the Internet (e.g., BGPSEC, DNSSEC, IPSEC)
  • Security in future Internet architectures (e.g. Information-centric networking, software-defined networking)
  • Secure network protocols for network applications (e.g., cloud-based apps, online social networking, gaming)



Call for Workshops (Past)