posted by user: aawad || 7284 views || tracked by 28 users: [display]

Smart-City-IoT-Security 2017 : Special Issue on Security of IoT-enabled Infrastructures in Smart Cities

FacebookTwitterLinkedInGoogle

Link: https://www.journals.elsevier.com/ad-hoc-networks/call-for-papers/special-issue-on-security-of-iot-enabled-infrastructures-in
 
When N/A
Where N/A
Submission Deadline Sep 1, 2017
Notification Due Jan 1, 2018
Final Version Due Jul 1, 2018
Categories    security   IOT   infrastructures   smart cities
 

Call For Papers

More details are here:

https://www.journals.elsevier.com/ad-hoc-networks/call-for-papers/special-issue-on-security-of-iot-enabled-infrastructures-in

Theme and Scope:
Internet of Things (IoT) is a paradigm that involves a network of physical objects containing embedded technologies to collect, communicate, sense, and interact with their internal states or the external environment through wireless or wired connections. IoT uses unique addressing schemes and network infrastructures to create new application or services. Smart cities are developed urban environments where any citizen can use any service anywhere and anytime. IoT has become a generator of smart cities aiming at overcoming the problems inherent in traditional urban developments. The nature of IoT information exchange among the connected objects “Things” and remote locations for data storage and data processing gives the ability to collect numerous amounts of data about individuals, and other things in the smart city. Hence, these data can be passed to malicious or have vulnerabilities such as man-in-the-middle attack or denial-of-service (DoS) attacks. Therefore, collected and transferred bands of data via IoT infrastructure would affect the national security and privacy.

Driven by the concept that IoT is the major builder in the coming smart cities, security and privacy have become inevitable requirements not only for personal safety, but also for assuring the sustainability of the ubiquitous city. Although, there are available researches that address the security challenges in IoT data, this special issue aims to address the security and privacy challenges emerging from deploying IoT in smart cities with a special emphasize on the IoT device, infrastructures, networking, and protocols. In addition, the special issue provides an up-to-date statement of the current research progresses in IoT security, privacy challenges, and mitigation approaches for protecting the individuals’ safety and the sustainability of the smart city.

Topics of Interest:
The topics of interest include but are not limited to:
-- Innovative techniques for IoT infrastructure security
-- Internet of Things (IoT) devices and protocols security
-- Cross-domain trust management in smart communities
-- Cloud computing-based security solutions for IoT data
-- Security and privacy frameworks for IoT-based smart cities
-- Critical infrastructures resilience and security in smart cities
-- Biometric modalities involved in IoT security for smart cities
-- Security challenges and mitigation approaches for smart cities
-- Cyber attacks detection and prevention systems for IoT networks
-- Interoperable security for urban planning and applications
-- Ethics, legal, and social considerations in IoT security

Publication Plan:
-- Submission deadline: December 01, 2017
-- Guest editors’ constructive rejection: January 01, 2018
-- First review completed: April 01, 2018
-- Revised manuscript due: July 01, 2018
-- Second review completed: August 01, 2018
-- Revised manuscript due: September 01, 2018
-- Final acceptance notification: October 01, 2018
-- Publication date: Fourth quarter of 2018

Submission Guidelines:
All manuscripts and any supplementary material should be submitted through Elsevier Editorial System (EES). The authors must select as “Smart-City-IoT-Security” when they reach the “Article Type” step in the submission process. The EES website is located at: http://ees.elsevier.com/adhoc/

Review Strategy:
A constructive rejection approach will be applied prior to the review process. All the submissions will be initially screened by the guest editors as soon as the submission deadline passes. The rejection criteria at this stage include out-of-scope submissions, plagiarized manuscripts, and the submissions with no research substances. The authors will initially be notified about the rejected manuscripts within the following month after the submission deadline. A rigorous review process will be carried out on the rest of the submissions, and according to the publication plan. The submitted manuscripts will be reviewed by at least two independent reviewers based on their originality, quality, and their relevance to the theme of the special issue.

Lead Guest Editor:
Ali Ismail Awad, Department of Computer Science, Electrical and Space Engineering, Luleå University of Technology, Luleå, Sweden, ali.awad[at]ltu.se

Guest Editors:
Steven Furnell, Centre for Security, Communications and Network Research, Plymouth University, United Kingdom, S.Furnell[at]plymouth.ac.uk

Abbas M. Hassan, Department of Architecture, Faculty of Engineering, Al Azhar University, Qena, Egypt, arch_abbas2002[at]yahoo.com

Theo Tryfonas, Department of Civil Engineering, University of Bristol, United Kingdom, theo.tryfonas[at]bristol.ac.uk
=====================================================================================================

Related Resources

FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
TSEC-NextSecSociety 2017   Journal of Cyber Security Technology Special Issue on Secure Smart Society in Next Generation Networking Paradigm
FiCloud 2018   The IEEE 6th International Conference on Future Internet of Things and Cloud
IEEE WF-5G 2018   IEEE 5G World Forum 2018
eCrime 2018   13th Symposium on Electronic Crime Research
CCSEA 2018   8th International Conference on Computer Science, Engineering and Applications
ICC C-IoT 2018   IEEE ICC Workshop on Convergent Internet of Things (C-IoT)
IJMSA 2017   International Journal of Modeling, Simulation and Applications
USENIX-Security 2018   27th USENIX Security Symposium