posted by user: aawad || 1907 views || tracked by 1 users: [display]

IoTSP 2021 : Internet of Things Security and Privacy: Practical and Management Perspectives

FacebookTwitterLinkedInGoogle

Link: http://staff.www.ltu.se/~ismawa/iotsp/
 
When Mar 3, 2021 - Apr 30, 2022
Where N/A
Submission Deadline Oct 1, 2021
Notification Due Dec 1, 2021
Final Version Due Feb 1, 2022
Categories    iot security   iot privacy   cyber-physical systems   management security
 

Call For Papers


== Call for book Chapters==

Internet of Things Security and Privacy: Practical and Management Perspectives

Aims and Scope:
The Internet of Things (IoT) is an emerging paradigm due to extensive developments in information and communication technology (ICT). The purpose of IoT is to expand the functions of the first version of the Internet by increasing the ability to connect numerous objects. The wide facilities offered by IoT and other sensing facilities have led to a huge amount of data generated from versatile domains, thus, cybersecurity has become an inevitable requirement not only for personal safety but also for assuring the sustainability of the IoT paradigm itself. From the perspective of the organizational technology layer, attack surfaces have dramatically expanded (e.g., new entry points from endpoints and legacy devices, more vulnerable industrial control systems without suitable cybersecurity solutions, more proprietary software that is hard to update and patch, and poor security design), whereas security countermeasures have developed comparatively slowly.

This edited book will encompass both management and technical cybersecurity and privacy (including compliance) research in the IoT domain. Of particular interest is research that integrates management and technical approaches to IoT security and privacy; research that studies the real-world problem of IoT security in organizations, and research that contributes sound practical advice to industry. The topics covered by the book will present a collection of high-quality research works concerning IoT architecture, security techniques, and application areas. These will make the book unique in its contents and theme.

The book outlines key emerging trends in IoT security and privacy that span the entire IoT architecture (perception, network, and applications) layers, with a focus on different critical IoT applications such as smart homes and cities, e-health, critical infrastructure, and industrial IoT (IIoT) applications. The state-of-the-art body of knowledge presented in this book is a vital need for researchers, practitioners, and postgraduate students in the IoT development and deployment domains.

Topics of interest include, but not limited to:

== Practical Security and Privacy Perspectives:
— IoT devices and protocols security
— Attack detection and prevention in IoT
— Privacy-preserving techniques in IoT
— Secure integration of IoT and cloud /Edge computing
— Machine learning techniques for IoT security
— Secure network architecture for IoT
— Secure data management approaches
— Security in cyber-physical systems
— Authentication and access control
— Blockchain technologies for reliable and trustworthy IoTs
== Management Security and Privacy Perspectives:
— Cybersecurity prevention and response strategies
— Emergent cybersecurity risks arising from IoT-enabled 5G
— Situation awareness of IoT environment
— Risk identification, assessment, and mitigation
— Governance, policy, and compliance
— Awareness and training approaches
— Security architecture and frameworks
— Threat and vulnerability analysis


Publication Schedule:
The tentative schedule of the book publication is as follows:
Deadline for chapter submission: October 01, 2021
Author notification: December 01, 2021
Final version due: February 01, 2022
Acceptance notification: February 15, 2022
Publication date: Second quarter of 2022


Submission Procedure:
Authors are invited to submit original, high-quality, unpublished results of both practical and management security and privacy domains. Prospective authors need to electronically submit their contributions using the EasyChair submission system. Submitted manuscripts will be refereed by at least two independent and expert reviewers for quality, correctness, originality, and relevance. The accepted contributions will be published as a book volume by CRC Press.

== Please consider the following points when preparing your manuscript:
— The optimum manuscript length is 20-30 A4 pages.
— The publication of the selected chapters will be free of charge.
— Submitted manuscripts should conform to the author’s guidelines of the CRC Press mentioned in the following two points (Please review the book website).
— Latex is the preferable word processing tool for preparing the chapters.
— MS Word is an acceptable word processing tool for preparing the chapters.


Book Editors:
Ali Ismail Awad
Department of Computer Science, Electrical and Space Engineering
Luleå University of Technology
Luleå, Sweden
E-mail: ali.awad[at]ltu.se


Atif Ahmad
School of Computing and Information Systems
University of Melbourne
Melbourne, Australia
E-mail: atif[at]unimelb.edu.au


Kim-Kwang Raymond Choo
Cloud Technology Endowed Professor
The University of Texas at San Antonio
Texas, USA
E-mail: raymond.choo[at]fulbrightmail.org


Saqib Hakak
Canadian Institute for Cybersecurity (CIC)
Faculty of Computer Science
University of New Brunswick (UNB)
Fredericton, Canada
E-mail: saqib.hakak[at]unb.ca


Mohsen Guizani
College of Engineering
Qatar University
Doha, Qatar
E-mail: mguizani[at]qu.edu.qa

Related Resources

ICT-DM 2021   The 7th International Conference on Information and Communication Technologies for Disaster Management
ICHST--Ei Compendex, Scopus 2021   2021 3rd International Conference on Hardware Security and Trust (ICHST 2021)--Ei Compendex, Scopus
ICBTA--EI Compendex, Scopus 2021   2021 4th International Conference on Blockchain Technology and Applications (ICBTA 2021)--Scopus, Ei Compendex
IJSPTM 2021   International Journal of Security, Privacy and Trust Management
EAI ICECI 2021   2nd International Conference on Edge Computing and IoT: Systems, Management and Security
WCSA 2021   WCSA 2021 : Wireless Congress Systems and Applications
IEEE CIIoT 2021   IEEE Symposium on Computational Intelligence in IoT and Smart Cities
BDIoT 2021   5th International Conference on Big Data and Internet of Things - BDIoT’21
FedCSIS - S3E 2021   FedCSIS 2021 Track 5: Software, System and Service Engineering (S3E)
TPSA 2021   2nd Workshop on Trust, Privacy and Security Aspects in Process Analytics