posted by organizer: JuanERubio || 240 views || tracked by 4 users: [display]

WIIoTS 2018 : Workshop on Industrial Internet of Things Security

FacebookTwitterLinkedInGoogle

 
When Jun 4, 2018 - Jun 7, 2018
Where Bilbao, Spain
Submission Deadline Feb 16, 2018
Notification Due Mar 31, 2018
Final Version Due Apr 30, 2018
Categories    SCADA   internet of things   industrial control networks   industry 4.0
 

Call For Papers

The Industrial Internet of Things (IIoT) is an emerging paradigm in today’s (control) industry, comprising Internet-enabled cyber-physical devices with the ability to couple to the new interconnection technologies such as cloud/fog computing. Under this perspective, the new industrial cyber-physical “things” can be accessible and available from remote locations, the information of which can be processed and stored in distributed locations, favouring the cooperation, the performance in field, and the achievement of operational tasks working at optimal times. However, the incorporation of the IIoT in the new scenarios of the fourth industrial revolution, also known as Industry 4.0, entails having to consider the new security and privacy issues that can threaten the wellbeing of the new IIoT ecosystem and its coexistence with the existing industrial technologies, with a high risk of impact on the end-users.

Therefore, this workshop will create a collaboration platform for experts from academia, governments and industry to address the new IIoT security and privacy challenges. Papers related to security and privacy of embedded systems working in industrial and control environments, such as SCADA, smart grid, smart cities, manufacturing systems, water systems, and in critical infrastructures in general, are all welcome at WIIoTS 2018. The technical topics of interest for this workshop include, but are not limited to:

• Interoperable IIoT ecosystem-level security and privacy challenges
• IIoT governance, regulation and standards
• Cross-layer threat modelling in IIoT and risk assessment
• Lightweight cryptography and key management
• Lightweight IIoT security protocols and AAA services for IIoT
• Collaborative and trustworthy IIoT frameworks and architectures
• Privacy-preserving models and anonymization techniques for IIoT
• Secure IIoT data storage and Big Data
• Location privacy and trust management
• Intrusion detection, anomaly diagnosis and situational awareness for IIoT
• Response and resilience to IIoT cyber-attacks
• Incident management and IIoT forensics
• Case studies and practical validations: SCADA, energy, water, smart factory, etc.

Important Dates:
================
• Submission due: Feb 16, 2018 (GMT)
• Notification: Mar 31, 2018
• Camera-ready due: Apr 30, 2018

Program Chair:
==============
• Cristina Alcaraz (University of Malaga, Spain)

General Co-Chairs:
==================
• Javier Lopez (University of Malaga, Spain)
• Yan Zhang (University of Oslo, Norway)

Technical Program Committee:
============================
• Alvaro Cardenas (University of Dallas, USA)
• Christos Xenakis (University of Piraeus)
• Dimitris Gritzalis (Athens University of Economics and Business)
• Federica Pascucci (University of Roma Tre, Italy)
• Kim-Kwang Raymond Choo (University of Texas, USA)
• Luca Faramondi (University Campus Bio-Medico)
• Mihalis Psarakis (University of Piraeus, Greece)
• Nils Ole Tippenhauer (Information Systems Technology and Design (ISTD), Singapore)
• Panayiotis kotzanikolaou (University of Piraeus, Greece)
• Rakesh Bobba (Oregon State University, USA)
• Rodrigo Roman (University of Malaga, Spain)
• Sherali Zeadally (University of Kentucky, USA)
• Urko Zurutuza Ortega (University of Mondragon, Spain)
• Xinyi Huang (Fujian Normal University, China)

Publicity Chair:
================
• Juan E. Rubio (University of Malaga, Spain)

Submission Instructions:
========================
Final submissions must not substantially overlap papers already or simultaneously submitted to a journal or a conference with proceedings. Their contents should be written in English with a maximum paper length of six (6) printed pages see web conference for instructions. Papers must be submitted through EDAS.

"IEEE reserves the right to exclude a paper from distribution after the conference, including IEEE Xplore® Digital Library, if the paper is not presented by the author at the conference."

Contact:
========
Email: rubio@lcc.uma.es
WIIoTS Home: http://globaliotsummit.org

Related Resources

FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
IFIP IIP 2018   10th International Conference on Intelligent Information Processing
ES 2018   The 6th International Conference on Enterprise Systems
ICISA 2018   9th iCatse Conference on Information Science and Applications
FiCloud 2018   The IEEE 6th International Conference on Future Internet of Things and Cloud
ICIOT 2018   The 3rd International Congress on Internet of Things
ICMU 2018   The 11th International Conference on Mobile Computing and Ubiquitous Networking
CICET 2018   The International Conference on Recent Advancements in Computing, IoT and Computer Engineering Technology 2018
QUORS 2018   The 12th IEEE International Workshop on Quality Oriented Reuse of Software
ACM CPSS 2018   4th ACM Cyber-Physical System Security Workshop