posted by organizer: ychallal || 5783 views || tracked by 17 users: [display]

Ad Hoc Networks 2014 : Special Issue on Internet of Things Security and Privacy


When N/A
Where N/A
Submission Deadline May 15, 2014
Notification Due Oct 15, 2014
Final Version Due Dec 15, 2014
Categories    networking   security   communications   systems

Call For Papers

A Special Issue of Elsevier Ad Hoc Networks on

“Internet of Things security and privacy: design methods, detection, prevention and countermeasures”


SCOPE of The Special Issue
Recent advances in information and communication technologies and embedded systems have given rise to a new disruptive technology: the Internet of Things (IoT). This major development will lead to major changes in usage and to a transformation of the technological ecosystem in all its complexity.
IoT will allow people and objects in the physical world as well as data and virtual environments to interact with each other so as to create smart environments such as smart transport systems, smart cities, smart health, smart energy, etc., as part of a prosperous digital society. IoT is likely to improve the quality of people’s lives, create new markets and new jobs, increase economic growth and be an impetus for competition.
However, IoT raises important questions and introduces new challenges for the security of systems and processes and the privacy of individuals. Some IoT applications are tightly linked to sensitive infrastructures and strategic services such as the distribution of water and electricity and the surveillance of assets. Other applications handle sensitive information about people, such as their location and movements, or their health and purchasing preferences. Confidence in and acceptance of IoT will depend on the protection it provides to people’s privacy and the levels of security it guarantees to systems and processes.
IoT will enable objects to become active participants: these objects will be able to recognize events and changes in their environment and to sense and react autonomously without human intervention. Introducing objects into the control processes makes IoT security very difficult to address. Indeed, the Internet of Things is a complex system in which people interact with the technological ecosystem based on smart objects through complex processes. The interactions of these four IoT components: persons, intelligent objects, technological ecosystem, and processes highlight a systemic and cognitive dimension to the security of IoT. The interaction of people with the technological ecosystem requires the protection of their privacy. Similarly, their interaction with control processes requires to guaranteeing their safety. Processes must ensure their reliability and realize the objectives for which they are designed.
The move towards a greater autonomy for objects will bring the security of technologies and processes and the privacy of individuals into sharper focus. Furthermore, in parallel with the increasing autonomy of objects to perceive and act on the environment, IoT security should move towards a greater autonomy in perceiving threats and reacting to attacks.

This special issue aims to bring together state-of-the-art contributions on Internet of Things Security and Privacy: design methods of secure IoT applications and architectures, security attacks detection, prevention and counter measures. Original, unpublished contributions are solicited in all aspects of this discipline.

About the Topics of Interest
In particular, the topic of interest includes but is not limited to

• Methods for secure by design IoT
• Methods for IoT security analysis and audit
• Privacy and anonymization techniques in IoT
• Secure cloud of things
• Trust management architectures
• Lightweight security solutions
• Authentication and access control in IoT
• Identification and biometrics in IoT
• Liability and policy enforcement in IoT
• Virtualization and auto-immunity of smart objects
• Security of Big data in IoT
• Cyber physical systems security
• Cyber attacks detection and prevention
• Ethics and legal considerations in IoT

Editor in Chief
Ian Akyildiz
Georgia Institute of Technology

Guest Editors
Yacine Challal
University of Technology of Compiegne, France

Enrico Natalizio
University of Technology of Compiegne, France

Sevil Sen
Hacettepe University, Turkey

Anna Maria Vegni
University of "Roma TRE", Italia

Important Dates
- Submission deadline: May 15th, 2014
- First round notification: July 15th, 2014
- Second round deadline: August 31st, 2014
- Final notification: October 15th, 2014
- Final papers: December 15th, 2014

Submission Format and Guideline
All submitted papers must be clearly written in excellent English and contain only original work, which has not been published by or is currently under review for any other journal or conference. Papers must not exceed 25 pages (one-column, at least 11pt fonts) including figures, tables, and references. A detailed submission guideline is available as “Guide to Authors” at
All manuscripts and any supplementary material should be submitted through Elsevier Editorial System (EES). The authors must select as “SI: IoT Security and Privacy” when they reach the “Article Type” step in the submission process. The EES website is located at:
All papers will be peer-reviewed by three independent reviewers. Requests for additional information should be addressed to the guest editors.

Related Resources

SCN-CyberIoT 2017   Special Issue on Cybersecurity in the Internet of Things - Security and Communication Networks Journal
ATN 2017   Acta Technica Napocensis- Electronics and Telecommunications 2/2017
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
INFOCOM 2018   IEEE International Conference on Computer Communications
SI:WSN 2017   Special Issue on: Intelligent Techniques for Ad-hoc and Wireless Sensor Networks
SoICT 2017   The Eighth International Symposium on Information and Communication Technology
IoTBDS 2018   3rd International Conference on Internet of Things, Big Data and Security
IEEE - ICCC 2017   3rd IEEE International Conference on Computer and Communications
SCN-SPMAP 2017   Security and Communication Networks Journal - SI on Security and Privacy in Mobile Applications and Platforms
ICCT 2017   17th IEEE International Conference on Communication Technology(ICCT 2017)-IEEE Xplore, Ei Compendex