posted by organizer: afurfaro || 1891 views || tracked by 4 users: [display]

IoT&Security 2022 : 1st International Workshop on IoT and Security


When Sep 12, 2022 - Sep 12, 2022
Where Calabria,Italy
Submission Deadline Jun 1, 2022
Notification Due Jul 1, 2022
Final Version Due Jul 15, 2022
Categories    IOT   intrusion detection systems   security

Call For Papers

Call for Papers

1st International Workshop on IoT and Security (IoT&Security)

** Deadline Abstract Submission: June 1st 2022 **

[Apologies for cross and multiple postings]


Co-located with IEEE DASC 2022

Workshop date: 12nd Sept 2022 (TO BE CONFIRMED)

(Conference: 12nd-15th of Sept, 2022)

Calabria, Italy



Papers Submission due: June 1, 2022

Authors Notification: July 1, 2022

Camera-ready Submission: July 15, 2022


The proliferation of IoT devices in everyday human life has made their security a critical requirement. Currently those devices are not very secure because of several reasons. First, manufacturers do not account much for security, releasing products that are vulnerable to attacks, thus leaving users with security issues that are unlikely to be resolved. Second, many IoT devices do not have enough computing power to run an antivirus or even do not allow one to install an antivirus. Finally, the heterogeneity which characterizes the IoT in terms of applications, hardware, and software, expands the attack surface, while at the same time increases the difficulty of deploying all-encompassing security solutions. Despite some sort of security provided by IoT enabling technologies (e.g., communication protocols), or by intrusion prevention systems (e.g., network firewalls), attackers still find ways to compromise devices, or the communication between them. Unlike laptop and desktop computers (which have frequent on-off cycles), many IoT devices such as webcams and wireless routers operate 24/7 unattended. This makes IoT devices particularly prone to various attacks, such as attacks aiming at recruiting devices for botnets. This makes IoT networks dangerous not only for themselves but also for remote systems that are victims of attacks launched by infected IoT devices. Moreover, IoT-based systems that handle sensitive data (e.g., healthcare IS) need to promptly react to malicious activities in order to prevent private data from leaving the network. IoT networks, thus, must be equipped with some sort security mechanism, such as intrusion detection systems, intrusion prevention systems, attack reaction systems, proactive defense mechanisms, etc.


The main topics include but are not limited to:

- Intrusion Detection Systems (Machine learning based IDS; Host-based IDS; Network-based IDS; Anomaly-based IDS; Signature-based IDS; Specification-based IDS; Distributed IDS; Privacy preserving IDS)

- Malware/Botnet detection

- Security for VANETS/MANETS

- Security for IoT-based systems (industrial control, healthcare monitoring, Cyber Physical Systems, domotic)

- Security for cloud-based IoT applications

- Security at the edge/fog

- Attack detection and countermeasures

- Game theory for the IoT security

- Security resources placement strategies

- Security for software defined IoT networks

- Security for narrowband IoT networks

- Security for SCADA-based systems

- IoT firmware analysis

- Automatic exploit generation for IoT devices

- Side channel attacks for IoT devices

- Cryptography for IoT

- Tamperproofing techniques for IoT

SUBMISSION and Camera Ready Preparation

Please refer to the conference submission link below: (

General Chairs

Antonella Guzzo, University of Calabria, Italy

Michele Ianni, University of Calabria, Italy

Antonino Rullo, University of Calabria, Italy

Angelo Furfaro, University of Calabria, Italy

Program Committee

Amit Kumar Singh, National Institute of Technology Patna, India

Andrea Pugliese, University of Calabria, Italy

Areeba Umair, Federico II University, Italy

Carmelo Felicetti, University of Calabria, Italy

Claudia Greco, University of Calabria, Italy

Edoardo Serra, Boise State University, USA

Elio Masciari, Federico II University, Italy

Gianluca Lax, University of Reggio Calabria, Italy

Gwanggil Jeon, Incheon National University, Korea

Lin Yang, Huazhong Agricultural University, China

Marco Fisichella, L3S Research Center of Leibniz University, Germany

Mohammad Mehedi Hassan, King Saudi University, Saudi Arabia

Niccolo' Marastoni, University of Verona, Italy

Zia Ush Shamszaman, Teesside University, United Kingdom

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CSW 2024   2024 3rd International Conference on Cyber Security
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
SOFTFM 2024   3rd International Conference on Software Engineering Advances and Formal Methods
ICBICC 2024   2024 International Conference on Big Data, IoT, and Cloud Computing (ICBICC 2024)
WiMoNe 2024   16th International Conference on Wireless & Mobile Networks
ICISS 2024   The 20th International Conference on Information Systems Security (ICISS-2024)
IOTCB 2024   3rd International Conference on IOT, Cloud and Big Data
IoT-SECFOR 2024   The 8th International Workshop on Security and Forensics of IoT