posted by organizer: afurfaro || 1896 views || tracked by 4 users: [display]

IoT&Security 2022 : 1st International Workshop on IoT and Security

FacebookTwitterLinkedInGoogle

Link: http://cyber-science.org/2022/assets/files/ws-ss/dasc/IoT&Security2022_CFP.pdf
 
When Sep 12, 2022 - Sep 12, 2022
Where Calabria,Italy
Submission Deadline Jun 1, 2022
Notification Due Jul 1, 2022
Final Version Due Jul 15, 2022
Categories    IOT   intrusion detection systems   security
 

Call For Papers

Call for Papers


1st International Workshop on IoT and Security (IoT&Security)


** Deadline Abstract Submission: June 1st 2022 **


[Apologies for cross and multiple postings]


-------------------------------------------------------------------------------------------------------------------








Co-located with IEEE DASC 2022


Workshop date: 12nd Sept 2022 (TO BE CONFIRMED)


(Conference: 12nd-15th of Sept, 2022)


Calabria, Italy





-------------------------------------------------------------------------------------------------------------------








IMPORTANT DATES








Papers Submission due: June 1, 2022


Authors Notification: July 1, 2022


Camera-ready Submission: July 15, 2022



SCOPE


The proliferation of IoT devices in everyday human life has made their security a critical requirement. Currently those devices are not very secure because of several reasons. First, manufacturers do not account much for security, releasing products that are vulnerable to attacks, thus leaving users with security issues that are unlikely to be resolved. Second, many IoT devices do not have enough computing power to run an antivirus or even do not allow one to install an antivirus. Finally, the heterogeneity which characterizes the IoT in terms of applications, hardware, and software, expands the attack surface, while at the same time increases the difficulty of deploying all-encompassing security solutions. Despite some sort of security provided by IoT enabling technologies (e.g., communication protocols), or by intrusion prevention systems (e.g., network firewalls), attackers still find ways to compromise devices, or the communication between them. Unlike laptop and desktop computers (which have frequent on-off cycles), many IoT devices such as webcams and wireless routers operate 24/7 unattended. This makes IoT devices particularly prone to various attacks, such as attacks aiming at recruiting devices for botnets. This makes IoT networks dangerous not only for themselves but also for remote systems that are victims of attacks launched by infected IoT devices. Moreover, IoT-based systems that handle sensitive data (e.g., healthcare IS) need to promptly react to malicious activities in order to prevent private data from leaving the network. IoT networks, thus, must be equipped with some sort security mechanism, such as intrusion detection systems, intrusion prevention systems, attack reaction systems, proactive defense mechanisms, etc.








TOPICS








The main topics include but are not limited to:


- Intrusion Detection Systems (Machine learning based IDS; Host-based IDS; Network-based IDS; Anomaly-based IDS; Signature-based IDS; Specification-based IDS; Distributed IDS; Privacy preserving IDS)


- Malware/Botnet detection


- Security for VANETS/MANETS


- Security for IoT-based systems (industrial control, healthcare monitoring, Cyber Physical Systems, domotic)


- Security for cloud-based IoT applications


- Security at the edge/fog


- Attack detection and countermeasures


- Game theory for the IoT security


- Security resources placement strategies


- Security for software defined IoT networks


- Security for narrowband IoT networks


- Security for SCADA-based systems


- IoT firmware analysis


- Automatic exploit generation for IoT devices


- Side channel attacks for IoT devices


- Cryptography for IoT


- Tamperproofing techniques for IoT




















SUBMISSION and Camera Ready Preparation


Please refer to the conference submission link below: (http://cyber-science.org/2022/dasc/papersubmission/)








General Chairs








Antonella Guzzo, University of Calabria, Italy


Michele Ianni, University of Calabria, Italy


Antonino Rullo, University of Calabria, Italy


Angelo Furfaro, University of Calabria, Italy








Program Committee








Amit Kumar Singh, National Institute of Technology Patna, India


Andrea Pugliese, University of Calabria, Italy


Areeba Umair, Federico II University, Italy


Carmelo Felicetti, University of Calabria, Italy


Claudia Greco, University of Calabria, Italy


Edoardo Serra, Boise State University, USA


Elio Masciari, Federico II University, Italy


Gianluca Lax, University of Reggio Calabria, Italy


Gwanggil Jeon, Incheon National University, Korea


Lin Yang, Huazhong Agricultural University, China


Marco Fisichella, L3S Research Center of Leibniz University, Germany


Mohammad Mehedi Hassan, King Saudi University, Saudi Arabia


Niccolo' Marastoni, University of Verona, Italy


Zia Ush Shamszaman, Teesside University, United Kingdom

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CSW 2024   2024 3rd International Conference on Cyber Security
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
SOFTFM 2024   3rd International Conference on Software Engineering Advances and Formal Methods
ICBICC 2024   2024 International Conference on Big Data, IoT, and Cloud Computing (ICBICC 2024)
WiMoNe 2024   16th International Conference on Wireless & Mobile Networks
ICISS 2024   The 20th International Conference on Information Systems Security (ICISS-2024)
IOTCB 2024   3rd International Conference on IOT, Cloud and Big Data
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
IoT-SECFOR 2024   The 8th International Workshop on Security and Forensics of IoT