posted by organizer: JuanERubio || 767 views || tracked by 5 users: [display]

WIIoTS 2018 : Workshop on Industrial Internet of Things Security

FacebookTwitterLinkedInGoogle

 
When Jun 4, 2018 - Jun 7, 2018
Where Bilbao, Spain
Submission Deadline Mar 27, 2018
Notification Due Apr 25, 2018
Final Version Due May 10, 2018
Categories    SCADA   internet of things   industrial control networks   industry 4.0
 

Call For Papers

The Industrial Internet of Things (IIoT) is an emerging paradigm in today’s (control) industry, comprising Internet-enabled cyber-physical devices with the ability to couple to the new interconnection technologies such as cloud/fog computing. Under this perspective, the new industrial cyber-physical “things” can be accessible and available from remote locations, the information of which can be processed and stored in distributed locations, favouring the cooperation, the performance in field, and the achievement of operational tasks working at optimal times. However, the incorporation of the IIoT in the new scenarios of the fourth industrial revolution, also known as Industry 4.0, entails having to consider the new security and privacy issues that can threaten the wellbeing of the new IIoT ecosystem and its coexistence with the existing industrial technologies, with a high risk of impact on the end-users.

Therefore, this workshop will create a collaboration platform for experts from academia, governments and industry to address the new IIoT security and privacy challenges. Papers related to security and privacy of embedded systems working in industrial and control environments, such as SCADA, smart grid, smart cities, manufacturing systems, water systems, and in critical infrastructures in general, are all welcome at WIIoTS 2018. The technical topics of interest for this workshop include, but are not limited to:

• Interoperable IIoT ecosystem-level security and privacy challenges
• IIoT governance, regulation and standards
• Cross-layer threat modelling in IIoT and risk assessment
• Lightweight cryptography and key management
• Lightweight IIoT security protocols and AAA services for IIoT
• Collaborative and trustworthy IIoT frameworks and architectures
• Privacy-preserving models and anonymization techniques for IIoT
• Secure IIoT data storage and Big Data
• Location privacy and trust management
• Intrusion detection, anomaly diagnosis and situational awareness for IIoT
• Response and resilience to IIoT cyber-attacks
• Incident management and IIoT forensics
• Case studies and practical validations: SCADA, energy, water, smart factory, etc.

Important Dates:
================
• Extended Submission due: March 27, 2018 (GMT)
• Notification: April 25, 2018
• Camera-ready due: May 10, 2018

Program Chair:
==============
• Cristina Alcaraz (University of Malaga, Spain)

General Co-Chairs:
==================
• Javier Lopez (University of Malaga, Spain)
• Yan Zhang (University of Oslo, Norway)

Technical Program Committee:
============================
• Alvaro Cardenas (University of Dallas, USA)
• Christos Xenakis (University of Piraeus)
• Dimitris Gritzalis (Athens University of Economics and Business)
• Federica Pascucci (University of Roma Tre, Italy)
• Kim-Kwang Raymond Choo (University of Texas, USA)
• Luca Faramondi (University Campus Bio-Medico)
• Mihalis Psarakis (University of Piraeus, Greece)
• Nils Ole Tippenhauer (Information Systems Technology and Design (ISTD), Singapore)
• Panayiotis kotzanikolaou (University of Piraeus, Greece)
• Rakesh Bobba (Oregon State University, USA)
• Rodrigo Roman (University of Malaga, Spain)
• Sherali Zeadally (University of Kentucky, USA)
• Urko Zurutuza Ortega (University of Mondragon, Spain)
• Xinyi Huang (Fujian Normal University, China)

Publicity Chair:
================
• Juan E. Rubio (University of Malaga, Spain)

Submission Instructions:
========================
Final submissions must not substantially overlap papers already or simultaneously submitted to a journal or a conference with proceedings. Their contents should be written in English with a maximum paper length of six (6) printed pages see web conference for instructions. Papers must be submitted through EDAS.

"IEEE reserves the right to exclude a paper from distribution after the conference, including IEEE Xplore® Digital Library, if the paper is not presented by the author at the conference."

Contact:
========
Email: alcaraz@lcc.uma.es
WIIoTS Home: http://globaliotsummit.org

Related Resources

FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
IJIS-IoTSec 2018   Springer IJIS Special Issue on IoT Security and Privacy
SECITC 2018   11th International Conference on Security for Information Technology and Communications
Symmetry-SI 2018   Symmetry and Asymmetry Applications for Internet of Things Security and Privacy
SPIoT 2018   The 7th International Symposium on Security and Privacy on Internet of Things
Journal of Computer Networks 2018   Special Issue: Security and Privacy for the Internet of Things, Elsevier Journal of Computer Networks
Special Issue A&DC IoT 2018   SENSORS (Q1) Special Issue: Algorithm and Distributed Computing for the Internet of Things
CICET 2018   The International Conference on Recent Advancements in Computing, IoT and Computer Engineering Technology 2018
SI-IoT-SECFOR 2018   Special Issue on Security and Forensics of Internet-of-Things: Problems and Solutions
BC4IOT 2018   BlockChain for the Internet of Things