posted by user: maxima1996 || 6243 views || tracked by 11 users: [display]

Call for Chapters 2014 : Securing the Internet of Things through Progressive Threat Detection and Management


When Jun 15, 2014 - Jan 30, 2015
Where N/A
Abstract Registration Due Jun 15, 2014
Submission Deadline Sep 15, 2014
Notification Due Nov 15, 2014
Final Version Due Dec 30, 2014
Categories    IOT   security   iot security

Call For Papers

Call for Chapters: Securing the Internet of Things through Progressive Threat Detection and Management


Hani Alzaid, Center for Cyber Security, King Abdulaziz City for Science and Technology, Riyadh, Saudi Arabia
Basel Alomair, Center for Cyber Security, King Abdulaziz City for Science and Technology, Riyadh, Saudi Arabia
Saleh Almotiri, National Cyber Security Center, Riyadh, Saudi Arabia
Nidal Nasser, Alfaisal University, Riyadh, Saudi Arabia

International Advisory Committee

Javier Lopez, Network, Information and Computer Security Lab, University of Malaga.
Radha Poovendran, Network Security Lab, University of Washington.
Hossam Hussanein, Queens Telecommuincations Research Lab, Queens University.
Anis Koubaa, Prince Sultan University/CISTER Research Unit.

Call for Chapters

Proposals Submission Deadline: Sep 15, 2014
Full Chapters Due: Oct 30, 2014


For release in the Advances in Information Security, Privacy, and Ethics (AISPE) Book Series.

ISSN: 1948-9730

The Advances in Information Security, Privacy, & Ethics (AISPE) Book Series is the source for this research, as the series provides only the most cutting-edge research on how information is utilized in the digital age.

Recently, Radio Frequency Identification (RFID) technology has achieved a widespread applicability in identification and tracking applications. For example, RFID tags are alternatives of barcode systems that are attached to objects to read objects information using reader. RFID technology is simple and easy to implement, but this technology cannot detect any environmental or physical parameters such as temperature, humidity, and pulse rate. Hence, sensors are used and becoming popular in many monitoring and surveillance applications since they are cheap, easy to deploy, configure, monitor and control. However, RFID readers and sensors have a very short communication range. Wi-Fi network with larger communication range can increase the coverage area of a monitoring application and form a network of immense capabilities by working with sensor, RFID, and other technologies, known as Internet of Things (IoT).
IoT is a network of things that allows objects interaction through the use of sensors, RFID tags, and other wireless technologies and thus, brings thousands of everyday use objects such as home appliances, PDA, cell phones, home laptops, and vehicles under the same network. For instance, a weight scale device can display weight information on an iPhone and send weight information to a doctor by integrating the weight scale with Wi-Fi or short range radio technologies (e.g., Bluetooth). If cloths have RFID tags, a washing machine with a RFID reader can read cloths information and adjust water requirement and washing time accordingly. Recently IoT has attracted a widespread interest and applicability. However, designing a large scale future IoT architecture using short communication range and resource constrained sensor and RFID networks is a great challenge. More importantly, bringing all these wireless devices to one architecture may open new doors for attacks. The main purpose of this book is to highlight challenges centered on IoT and its security.


The main objectives of this comprehensive and timely book are to: publish high quality original works highlighting IoT security issues. The book will present state-of-the-art methodologies in IoT security, implementation, applications, modeling for threats detections and countermeasures; illustrate the benefits of detection and prevention threats applications in IoT networks, modeling, and analysis. The book will also identify the main issues that face efficient and effective countermeasures implementation in IoT security; demonstrate by examples how the performance of IoT security can be evaluated. This book will provide professors, researchers, students, and professionals with cutting-edge research on threat detections, preventions, and countermeasures of IoT security; present the trends in countermeasures (modeling, application, analysis, etc); discuss the main features of current IoT security simulations. The book will also point out the main trends in IoT security evaluation and their tools, introduce the most popular academic and professional IoT simulators, and finally, provide a complete compilation of the problems that arise during the use of IoT security and the solutions that are applied to them.

Target Audience

The intended audience includes academics, researchers, post-graduate students, developers, professionals, network designers, network analysts, telecommunication system designers, technology specialists, practitioners, and people who are interested in using simulation in computer network security. Another projected audience is the researchers and academicians who identify methodologies, concepts, tools, and applications through reference citations, literature reviews, quantitative/qualitative results, and discussions. The book is designed to be a first choice reference at university libraries, academic institutions, research and development centers, information technology centers, and any institutions interested in using, designing, modeling, and analyzing computer networks security. The book is designed to be used as a textbook for courses teaching computer networks security, simulation, and modeling for under/post graduate students.

Recommended Topics

Proposals and chapters of interest include, but are not limited to, the following topic:

Definition, features and types of IoT.
Implementation, application and modeling for threats detections and countermeasures destined for IoT networks.
State-of-the-art methodologies in IoT security.
IoT and privacy.
IoT and Integrity.
IoT and Confidentiality.
IoT and Authentication.
IoT case studies, field studies, and applications.
IoT implementation issues.
User experience with IoT.
User interface of IoT technology.
Demonstrate by examples how the performance of IoT security can be evaluated and measured.
Introduce the most popular academic and professional IoT simulators in which security can be implemented. This includes discussion on the main features of current IoT security simulations. Also it includes demonstration by examples how the performance of IoT security can be evaluated and measured.

Submission Procedure

Contributors are invited to submit on or before April 15, 2014, a 2-3 page chapter proposal clearly explaining the mission, priorities, structure, and format of his/her proposed chapter. Submissions should be made through the link at the bottom of this page. Authors of accepted proposals will be notified by May 15, 2014 about the status of their proposals, and chapter guidelines will be sent accordingly. Full chapters are expected to be submitted by August 30, 2014. All submitted chapters are subject to double blind reviews. Contributors may also be requested to serve as reviewers for this project.


This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the "Information Science Reference" (formerly Idea Group Reference), "Medical Information Science Reference," "Business Science Reference," and "Engineering Science Reference" imprints. For additional information regarding the publisher, please visit This publication is anticipated to be released in 2015.

Important Dates

Proposal Submission Deadline: Sep. 15, 2014
Full Chapter Submission: Oct. 30, 2014
Review Results: Nov. 15, 2014
Revised Chapter Submission: Dec. 30, 2015


Hani Alzaid

Related Resources

SCOM 2022   10th International Conference on Soft Computing
IoT 2022   12th International Conference on the Internet of Things
BIOM 2022   2nd International Conference on Big Data, IoT and Machine Learning
SPIoT 2022   The 11th International Symposium on Security and Privacy on the Internet of Things
IJPLA 2022   International Journal of Programming Languages and Applications
Sensors (MDPI) SI 2022   Ethics, Privacy and Trust in IoT-Based Smart Homes and Buildings
CLBD 2022   3rd International Conference on Cloud and Big Data
Chatbot Technology 2022   Call for Chapters: Trends, Applications, and Challenges of Chatbot Technology
ATAIT 2022   International Symposium on Advanced Technologies and Applications in the Internet of Things