posted by organizer: ychallal || 4691 views || tracked by 18 users: [display]

Ad Hoc Networks 2014 : Special Issue on Internet of Things Security and Privacy


When N/A
Where N/A
Submission Deadline May 15, 2014
Notification Due Oct 15, 2014
Final Version Due Dec 15, 2014
Categories    networking   security   communications   systems

Call For Papers

A Special Issue of Elsevier Ad Hoc Networks on

“Internet of Things security and privacy: design methods, detection, prevention and countermeasures”


SCOPE of The Special Issue
Recent advances in information and communication technologies and embedded systems have given rise to a new disruptive technology: the Internet of Things (IoT). This major development will lead to major changes in usage and to a transformation of the technological ecosystem in all its complexity.
IoT will allow people and objects in the physical world as well as data and virtual environments to interact with each other so as to create smart environments such as smart transport systems, smart cities, smart health, smart energy, etc., as part of a prosperous digital society. IoT is likely to improve the quality of people’s lives, create new markets and new jobs, increase economic growth and be an impetus for competition.
However, IoT raises important questions and introduces new challenges for the security of systems and processes and the privacy of individuals. Some IoT applications are tightly linked to sensitive infrastructures and strategic services such as the distribution of water and electricity and the surveillance of assets. Other applications handle sensitive information about people, such as their location and movements, or their health and purchasing preferences. Confidence in and acceptance of IoT will depend on the protection it provides to people’s privacy and the levels of security it guarantees to systems and processes.
IoT will enable objects to become active participants: these objects will be able to recognize events and changes in their environment and to sense and react autonomously without human intervention. Introducing objects into the control processes makes IoT security very difficult to address. Indeed, the Internet of Things is a complex system in which people interact with the technological ecosystem based on smart objects through complex processes. The interactions of these four IoT components: persons, intelligent objects, technological ecosystem, and processes highlight a systemic and cognitive dimension to the security of IoT. The interaction of people with the technological ecosystem requires the protection of their privacy. Similarly, their interaction with control processes requires to guaranteeing their safety. Processes must ensure their reliability and realize the objectives for which they are designed.
The move towards a greater autonomy for objects will bring the security of technologies and processes and the privacy of individuals into sharper focus. Furthermore, in parallel with the increasing autonomy of objects to perceive and act on the environment, IoT security should move towards a greater autonomy in perceiving threats and reacting to attacks.

This special issue aims to bring together state-of-the-art contributions on Internet of Things Security and Privacy: design methods of secure IoT applications and architectures, security attacks detection, prevention and counter measures. Original, unpublished contributions are solicited in all aspects of this discipline.

About the Topics of Interest
In particular, the topic of interest includes but is not limited to

• Methods for secure by design IoT
• Methods for IoT security analysis and audit
• Privacy and anonymization techniques in IoT
• Secure cloud of things
• Trust management architectures
• Lightweight security solutions
• Authentication and access control in IoT
• Identification and biometrics in IoT
• Liability and policy enforcement in IoT
• Virtualization and auto-immunity of smart objects
• Security of Big data in IoT
• Cyber physical systems security
• Cyber attacks detection and prevention
• Ethics and legal considerations in IoT

Editor in Chief
Ian Akyildiz
Georgia Institute of Technology

Guest Editors
Yacine Challal
University of Technology of Compiegne, France

Enrico Natalizio
University of Technology of Compiegne, France

Sevil Sen
Hacettepe University, Turkey

Anna Maria Vegni
University of "Roma TRE", Italia

Important Dates
- Submission deadline: May 15th, 2014
- First round notification: July 15th, 2014
- Second round deadline: August 31st, 2014
- Final notification: October 15th, 2014
- Final papers: December 15th, 2014

Submission Format and Guideline
All submitted papers must be clearly written in excellent English and contain only original work, which has not been published by or is currently under review for any other journal or conference. Papers must not exceed 25 pages (one-column, at least 11pt fonts) including figures, tables, and references. A detailed submission guideline is available as “Guide to Authors” at
All manuscripts and any supplementary material should be submitted through Elsevier Editorial System (EES). The authors must select as “SI: IoT Security and Privacy” when they reach the “Article Type” step in the submission process. The EES website is located at:
All papers will be peer-reviewed by three independent reviewers. Requests for additional information should be addressed to the guest editors.

Related Resources

WICSPIT 2017   IoTBDS/SMARTGREENS Workshop -- Innovative CyberSecurity and Privacy for Internet of Things: Strategies, Technologies, and Implementations
ATN 2016   Acta Technica Napocensis- Electronics and Telecommunications 4/2016
Future_Internet-SI 2016   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
AEIJ 2016   Advanced Energy: An International Journal
ACISP 2017   Australasian Conference on Information Security and Privacy
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
IoT 2017   The 3rd International Workshop on Internet of Things
IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security
WiOpt 2017   Modeling and Optimization in Mobile, Ad-Hoc and Wireless Networks
AIP Special Issue 2016   Journal Acta Informatica Pragensia - Special Issue on Systems