posted by user: viv || 3878 views || tracked by 12 users: [display]

IoT-SECFOR 2017 : International Workshop on Security and Forensics of IoT

FacebookTwitterLinkedInGoogle

Link: http://computing.derby.ac.uk/c/iot-secfor-2017/
 
When Jun 21, 2017 - Jun 23, 2017
Where Exeter, UK
Submission Deadline Mar 22, 2017
Notification Due Apr 22, 2017
Final Version Due May 17, 2017
Categories    IOT   security   digital forensics
 

Call For Papers

Workshop to be held in conjunction with the 10th IEEE International Conference on Internet of Things (iThings 2017: http://cse.stfx.ca/~iThings2017/)

SCOPE

Internet-of-Things (IoT) are becoming increasingly prevalent in our society, as the backbone of interconnected smart homes, smart hospitals, smart cities, smart wearables and other smart environments. IoT leverage embedded technologies equipped with sensors and communication capabilities; they are able to broadcast their presence to other objects and interact with them using different protocols. Gartner predicts that, by 2020, 21 Billion IoT endpoints will be in use. Along with usability, efficiency, and cost savings benefits, increasingly, the use of IoT pose security risks and raise challenges to digital forensics. The massive DDoS caused by the Mirai botnet which exploited IoT devices is a recent example.

This workshop aims to bring together researchers and practitioners from both communities – security and forensics – to discuss problems and solutions regarding IoT.

Topics of interest comprise, but are not limited to:

Security architectures and protection mechanisms for IoT
Threat models and attack strategies for IoT
Security applications and management of IoT
Intrusion and malware detection/prevention technologies for IoT
Cyber physical IoT systems
Security in Wireless Sensor Networks applied to IoT
Challenges related to IoT Forensics and security
Privacy and trust in IoT
Adaptive security in IoT
Identification/preservation of evidence for digital forensic investigations involving IoT
Data analysis of IoT for forensic investigation
Models for risk identification and assessment in IoT networks
Data ownership and attack simulation methods for IoT networks and devices
Legal and human aspects of security and forensics of IoT
IoT protocols (e.g, ZigBee) and implications for security and forensics
Coexistence of different protocols in IoT environments

ORGANISERS

Virginia N. L. Franqueira, University of Derby, UK
Xiaojun Zhai, University of Derby, UK
Paul Comerford, Wrexham Glyndwr University, UK

PC MEMBERS

Andrew Jones, University of Hertfordshire, UK
Richard Overill, King’s College London, UK
Andrew Marrington, Zayed University, AE
Pedro R. M. Inacio, University of Beira Interior, PT
Kofi Appiah, Nottingham Trent University, UK
Faycal Bensaali, Qatar University, QA
Abbes Amira, Qatar University, QA
Yanghong Tan, Hunan University, CN
Xingzhen Bai, Shandong University of Science and Technology, CN
Zhifeng Zhong, Hubei University, CN
George Grispos, The Irish Software Research Centre (LERO), IE
Ibrahim Baggili, University of New Haven, US
Vic Grout, Wrexham Glyndwr University, UK
Nathan Clarke, University of Plymouth, UK
Yijun Yu, The Open University, UK
Martin Schmiedecker, SBA Research, AT
Aleksandra Mileva, University Goce Delcev, MK
Tomasz Bosakowski, Staffordshire University, UK
Bogdan Ghita, University of Plymouth, UK
Kovila P. L. Coopamootoo, University of Derby, UK
Lily Meng, University of Hertfordshire, UK
Tanya Vladimirova, University of Leicester, UK
Klaus D McDonald-Maier, University of Essex, UK

SUBMISSION GUIDELINES

All papers need to be submitted electronically in PDF format via EasyChair; EasyChair submission point is https://easychair.org/conferences/?conf=iotsecfor2017. The materials presented in the papers should not be published or under submission elsewhere. Each paper is limited to 8 pages (or 10 pages with over-length charge) including figures and references using IEEE Computer Society Proceedings Manuscripts style (two columns, single-spaced, 10 fonts). You can confirm the IEEE Computer Society Proceedings Author Guidelines at the following web page:
http://www.computer.org/web/cs-cps/

Manuscript Templates for Conference Proceedings can be found at:
https://www.ieee.org/conferences_events/conferences/publishing/templates.html

Once accepted, the paper will be included into the IEEE conference proceedings published by IEEE Computer Society Press (indexed by EI). At least one of the authors of any accepted paper is requested to register the paper at the conference.

Related Resources

FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
TSEC-NextSecSociety 2017   Journal of Cyber Security Technology Special Issue on Secure Smart Society in Next Generation Networking Paradigm
IoT-CyberTrust 2018   IEEE Computer Special Issue on Cybertrust in the IoT Age
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
UNet 2018   Fourth International Symposium on Ubiquitous Networking
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
WCMC G-IoT 2018   WCMC Special Issue on The Green Internet of Things (G-IoT)
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
SIES 2018   13th IEEE International Symposium on Industrial Embedded Systems