IoTSP 2021 : Internet of Things Security and Privacy: Practical and Management Perspectives
Call For Papers
== Call for book Chapters==
Internet of Things Security and Privacy: Practical and Management Perspectives
Aims and Scope:
The Internet of Things (IoT) is an emerging paradigm due to extensive developments in information and communication technology (ICT). The purpose of IoT is to expand the functions of the first version of the Internet by increasing the ability to connect numerous objects. The wide facilities offered by IoT and other sensing facilities have led to a huge amount of data generated from versatile domains, thus, cybersecurity has become an inevitable requirement not only for personal safety but also for assuring the sustainability of the IoT paradigm itself. From the perspective of the organizational technology layer, attack surfaces have dramatically expanded (e.g., new entry points from endpoints and legacy devices, more vulnerable industrial control systems without suitable cybersecurity solutions, more proprietary software that is hard to update and patch, and poor security design), whereas security countermeasures have developed comparatively slowly.
This edited book will encompass both management and technical cybersecurity and privacy (including compliance) research in the IoT domain. Of particular interest is research that integrates management and technical approaches to IoT security and privacy; research that studies the real-world problem of IoT security in organizations, and research that contributes sound practical advice to industry. The topics covered by the book will present a collection of high-quality research works concerning IoT architecture, security techniques, and application areas. These will make the book unique in its contents and theme.
The book outlines key emerging trends in IoT security and privacy that span the entire IoT architecture (perception, network, and applications) layers, with a focus on different critical IoT applications such as smart homes and cities, e-health, critical infrastructure, and industrial IoT (IIoT) applications. The state-of-the-art body of knowledge presented in this book is a vital need for researchers, practitioners, and postgraduate students in the IoT development and deployment domains.
Topics of interest include, but not limited to:
== Practical Security and Privacy Perspectives:
— IoT devices and protocols security
— Attack detection and prevention in IoT
— Privacy-preserving techniques in IoT
— Secure integration of IoT and cloud /Edge computing
— Machine learning techniques for IoT security
— Secure network architecture for IoT
— Secure data management approaches
— Security in cyber-physical systems
— Authentication and access control
— Blockchain technologies for reliable and trustworthy IoTs
== Management Security and Privacy Perspectives:
— Cybersecurity prevention and response strategies
— Emergent cybersecurity risks arising from IoT-enabled 5G
— Situation awareness of IoT environment
— Risk identification, assessment, and mitigation
— Governance, policy, and compliance
— Awareness and training approaches
— Security architecture and frameworks
— Threat and vulnerability analysis
The tentative schedule of the book publication is as follows:
Deadline for chapter submission: October 01, 2021
Author notification: December 01, 2021
Final version due: February 01, 2022
Acceptance notification: February 15, 2022
Publication date: Second quarter of 2022
Authors are invited to submit original, high-quality, unpublished results of both practical and management security and privacy domains. Prospective authors need to electronically submit their contributions using the EasyChair submission system. Submitted manuscripts will be refereed by at least two independent and expert reviewers for quality, correctness, originality, and relevance. The accepted contributions will be published as a book volume by CRC Press.
== Please consider the following points when preparing your manuscript:
— The optimum manuscript length is 20-30 A4 pages.
— The publication of the selected chapters will be free of charge.
— Submitted manuscripts should conform to the author’s guidelines of the CRC Press mentioned in the following two points (Please review the book website).
— Latex is the preferable word processing tool for preparing the chapters.
— MS Word is an acceptable word processing tool for preparing the chapters.
Ali Ismail Awad
Department of Computer Science, Electrical and Space Engineering
Luleå University of Technology
School of Computing and Information Systems
University of Melbourne
Kim-Kwang Raymond Choo
Cloud Technology Endowed Professor
The University of Texas at San Antonio
Canadian Institute for Cybersecurity (CIC)
Faculty of Computer Science
University of New Brunswick (UNB)
College of Engineering