posted by user: maxima1996 || 4565 views || tracked by 10 users: [display]

Call for Chapters 2014 : Securing the Internet of Things through Progressive Threat Detection and Management

FacebookTwitterLinkedInGoogle

Link: http://www.igi-global.com/publish/call-for-papers/call-details/1302
 
When Sep 15, 2014 - Jan 30, 2015
Where N/A
Submission Deadline Sep 15, 2014
Notification Due Nov 15, 2014
Final Version Due Dec 30, 2014
Categories    IOT   security   iot security
 

Call For Papers

Call for Chapters: Securing the Internet of Things through Progressive Threat Detection and Management


Editors
=======

Hani Alzaid, Center for Cyber Security, King Abdulaziz City for Science and Technology, Riyadh, Saudi Arabia
Basel Alomair, Center for Cyber Security, King Abdulaziz City for Science and Technology, Riyadh, Saudi Arabia
Saleh Almotiri, National Cyber Security Center, Riyadh, Saudi Arabia
Nidal Nasser, Alfaisal University, Riyadh, Saudi Arabia



International Advisory Committee
================================

Javier Lopez, Network, Information and Computer Security Lab, University of Malaga.
Radha Poovendran, Network Security Lab, University of Washington.
Hossam Hussanein, Queens Telecommuincations Research Lab, Queens University.
Anis Koubaa, Prince Sultan University/CISTER Research Unit.



Call for Chapters
=================

Proposals Submission Deadline: Sep 15, 2014
Full Chapters Due: Oct 30, 2014


Introduction
============

For release in the Advances in Information Security, Privacy, and Ethics (AISPE) Book Series.

ISSN: 1948-9730

The Advances in Information Security, Privacy, & Ethics (AISPE) Book Series is the source for this research, as the series provides only the most cutting-edge research on how information is utilized in the digital age.

Recently, Radio Frequency Identification (RFID) technology has achieved a widespread applicability in identification and tracking applications. For example, RFID tags are alternatives of barcode systems that are attached to objects to read objects information using reader. RFID technology is simple and easy to implement, but this technology cannot detect any environmental or physical parameters such as temperature, humidity, and pulse rate. Hence, sensors are used and becoming popular in many monitoring and surveillance applications since they are cheap, easy to deploy, configure, monitor and control. However, RFID readers and sensors have a very short communication range. Wi-Fi network with larger communication range can increase the coverage area of a monitoring application and form a network of immense capabilities by working with sensor, RFID, and other technologies, known as Internet of Things (IoT).
IoT is a network of things that allows objects interaction through the use of sensors, RFID tags, and other wireless technologies and thus, brings thousands of everyday use objects such as home appliances, PDA, cell phones, home laptops, and vehicles under the same network. For instance, a weight scale device can display weight information on an iPhone and send weight information to a doctor by integrating the weight scale with Wi-Fi or short range radio technologies (e.g., Bluetooth). If cloths have RFID tags, a washing machine with a RFID reader can read cloths information and adjust water requirement and washing time accordingly. Recently IoT has attracted a widespread interest and applicability. However, designing a large scale future IoT architecture using short communication range and resource constrained sensor and RFID networks is a great challenge. More importantly, bringing all these wireless devices to one architecture may open new doors for attacks. The main purpose of this book is to highlight challenges centered on IoT and its security.


Objective
=========

The main objectives of this comprehensive and timely book are to: publish high quality original works highlighting IoT security issues. The book will present state-of-the-art methodologies in IoT security, implementation, applications, modeling for threats detections and countermeasures; illustrate the benefits of detection and prevention threats applications in IoT networks, modeling, and analysis. The book will also identify the main issues that face efficient and effective countermeasures implementation in IoT security; demonstrate by examples how the performance of IoT security can be evaluated. This book will provide professors, researchers, students, and professionals with cutting-edge research on threat detections, preventions, and countermeasures of IoT security; present the trends in countermeasures (modeling, application, analysis, etc); discuss the main features of current IoT security simulations. The book will also point out the main trends in IoT security evaluation and their tools, introduce the most popular academic and professional IoT simulators, and finally, provide a complete compilation of the problems that arise during the use of IoT security and the solutions that are applied to them.


Target Audience
===============

The intended audience includes academics, researchers, post-graduate students, developers, professionals, network designers, network analysts, telecommunication system designers, technology specialists, practitioners, and people who are interested in using simulation in computer network security. Another projected audience is the researchers and academicians who identify methodologies, concepts, tools, and applications through reference citations, literature reviews, quantitative/qualitative results, and discussions. The book is designed to be a first choice reference at university libraries, academic institutions, research and development centers, information technology centers, and any institutions interested in using, designing, modeling, and analyzing computer networks security. The book is designed to be used as a textbook for courses teaching computer networks security, simulation, and modeling for under/post graduate students.



Recommended Topics
==================

Proposals and chapters of interest include, but are not limited to, the following topic:

Definition, features and types of IoT.
Implementation, application and modeling for threats detections and countermeasures destined for IoT networks.
State-of-the-art methodologies in IoT security.
IoT and privacy.
IoT and Integrity.
IoT and Confidentiality.
IoT and Authentication.
IoT case studies, field studies, and applications.
IoT implementation issues.
User experience with IoT.
User interface of IoT technology.
Demonstrate by examples how the performance of IoT security can be evaluated and measured.
Introduce the most popular academic and professional IoT simulators in which security can be implemented. This includes discussion on the main features of current IoT security simulations. Also it includes demonstration by examples how the performance of IoT security can be evaluated and measured.



Submission Procedure
====================

Contributors are invited to submit on or before April 15, 2014, a 2-3 page chapter proposal clearly explaining the mission, priorities, structure, and format of his/her proposed chapter. Submissions should be made through the link at the bottom of this page. Authors of accepted proposals will be notified by May 15, 2014 about the status of their proposals, and chapter guidelines will be sent accordingly. Full chapters are expected to be submitted by August 30, 2014. All submitted chapters are subject to double blind reviews. Contributors may also be requested to serve as reviewers for this project.


Publisher
=========

This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the "Information Science Reference" (formerly Idea Group Reference), "Medical Information Science Reference," "Business Science Reference," and "Engineering Science Reference" imprints. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2015.

Important Dates
===============

Proposal Submission Deadline: Sep. 15, 2014
Full Chapter Submission: Oct. 30, 2014
Review Results: Nov. 15, 2014
Revised Chapter Submission: Dec. 30, 2015

Inquiries
=========

Hani Alzaid
hmalzaid@kacst.edu.sa

Related Resources

SI Wiley SPE 2018   Call for Papers for Special Issue on Integration of Cloud, IoT and Big Data Analytics
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
PerIoT 2018   Second International Workshop on Mobile and Pervasive Internet of Things (co-located with IEEE PerCom 2018)
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
ICIOT 2018   The 3rd International Congress on Internet of Things
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
WICSPIT 2018   Workshop on Innovative CyberSecurity and Privacy for Internet of Things
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
Multimedia Analysis for IoT 2018   Multimedia Analysis for Internet-of-Things