posted by user: aawad || 7785 views || tracked by 5 users: [display]

IoTSP 2022 : Internet of Things Security and Privacy: Practical and Management Perspectives

FacebookTwitterLinkedInGoogle

Link: http://staff.www.ltu.se/~ismawa/iotsp/
 
When Mar 3, 2021 - Apr 30, 2023
Where N/A
Submission Deadline Jun 15, 2022
Notification Due Jul 1, 2022
Final Version Due Aug 1, 2022
Categories    iot security   iot privacy   cyber-physical systems   management security
 

Call For Papers

== Call for book Chapters==

Internet of Things Security and Privacy: Practical and Management Perspectives

Aims and Scope:
The Internet of Things (IoT) is an emerging paradigm due to extensive developments in information and communication technology (ICT). The purpose of IoT is to expand the functions of the first version of the Internet by increasing the ability to connect numerous objects. The wide facilities offered by IoT and other sensing facilities have led to a huge amount of data generated from versatile domains, thus, cybersecurity has become an inevitable requirement not only for personal safety but also for assuring the sustainability of the IoT paradigm itself. From the perspective of the organizational technology layer, attack surfaces have dramatically expanded (e.g., new entry points from endpoints and legacy devices, more vulnerable industrial control systems without suitable cybersecurity solutions, more proprietary software that is hard to update and patch, and poor security design), whereas security countermeasures have developed comparatively slowly.

This edited book will encompass both management and technical cybersecurity and privacy (including compliance) research in the IoT domain. Of particular interest is research that integrates management and technical approaches to IoT security and privacy; research that studies the real-world problem of IoT security in organizations, and research that contributes sound practical advice to industry. The topics covered by the book will present a collection of high-quality research works concerning IoT architecture, security techniques, and application areas. These will make the book unique in its contents and theme.

The book outlines key emerging trends in IoT security and privacy that span the entire IoT architecture (perception, network, and applications) layers, with a focus on different critical IoT applications such as smart homes and cities, e-health, critical infrastructure, and industrial IoT (IIoT) applications. The state-of-the-art body of knowledge presented in this book is a vital need for researchers, practitioners, and postgraduate students in the IoT development and deployment domains.

Topics of interest include, but not limited to:

== Practical Security and Privacy Perspectives:
— IoT devices and protocols security
— Attack detection and prevention in IoT
— Privacy-preserving techniques in IoT
— Secure integration of IoT and cloud /Edge computing
— Machine learning techniques for IoT security
— Secure network architecture for IoT
— Secure data management approaches
— Security in cyber-physical systems
— Authentication and access control
— Blockchain technologies for reliable and trustworthy IoTs
== Management Security and Privacy Perspectives:
— Cybersecurity prevention and response strategies
— Emergent cybersecurity risks arising from IoT-enabled 5G
— Situation awareness of IoT environment
— Risk identification, assessment, and mitigation
— Governance, policy, and compliance
— Awareness and training approaches
— Security architecture and frameworks
— Threat and vulnerability analysis


Publication Schedule:
The tentative schedule of the book publication is as follows:
Deadline for chapter submission: June 15, 2022
Author notification: July 01, 2022
Final version due: August 01, 2022
Acceptance notification: August 15, 2022
Publication date: Fourth quarter of 2022


Submission Procedure:
Authors are invited to submit original, high-quality, unpublished results of both practical and management security and privacy domains. Prospective authors need to electronically submit their contributions using the EasyChair submission system. Submitted manuscripts will be refereed by at least two independent and expert reviewers for quality, correctness, originality, and relevance. The accepted contributions will be published as a book volume by CRC Press.

== Please consider the following points when preparing your manuscript:
— The optimum manuscript length is 20-30 A4 pages.
— The publication of the selected chapters will be free of charge.
— Submitted manuscripts should conform to the author’s guidelines of the CRC Press mentioned in the following two points (Please review the book website).
— Latex is the preferable word processing tool for preparing the chapters.
— MS Word is an acceptable word processing tool for preparing the chapters.


Book Editors:
Ali Ismail Awad
Department of Computer Science, Electrical and Space Engineering
Luleå University of Technology
Luleå, Sweden
E-mail: ali.awad[at]ltu.se


Atif Ahmad
School of Computing and Information Systems
University of Melbourne
Melbourne, Australia
E-mail: atif[at]unimelb.edu.au


Kim-Kwang Raymond Choo
Cloud Technology Endowed Professor
The University of Texas at San Antonio
Texas, USA
E-mail: raymond.choo[at]fulbrightmail.org


Saqib Hakak
Canadian Institute for Cybersecurity (CIC)
Faculty of Computer Science
University of New Brunswick (UNB)
Fredericton, Canada
E-mail: saqib.hakak[at]unb.ca


Mohsen Guizani
College of Engineering
Qatar University
Doha, Qatar
E-mail: mguizani[at]qu.edu.qa

Related Resources

EAI ICECI 2023   4th International Conference on Edge Computing and IoT: Systems, Management and Security
BIOS 2023   9th International Conference on Bioinformatics & Biosciences
ICNT--Ei 2023   2023 6th International Conference on Network Technology (ICNT 2023)
SmartSys 2023   Eighth IEEE Workshop on Smart Service Systems (SmartSys)
ICBD--EI 2023   2024 the 2nd International Conference on Big Data (ICBD 2024)
S3E 2023   FedCSIS - Track 5: Software, System and Service Engineering
ICNS--Ei 2023   2023 The 8th International Conference on Network Security (ICNS 2023)
Physical Layer Systems 2023   “Security and Safety in Physical Layer Systems” Special Issue – call for papers
SoCTA 2023   8th International Conference on Soft Computing: Theories and Applications
Springer AIOTT 2023   Springer--2023 4th Asia IoT Technologies Conference (AIOTT 2023)