posted by user: gkvk70 || 6609 views || tracked by 11 users: [display]

Symmetry-SI 2018 : Symmetry and Asymmetry Applications for Internet of Things Security and Privacy

FacebookTwitterLinkedInGoogle

Link: http://www.mdpi.com/journal/symmetry/special_issues/Symmetry-Asymmetry-Applications-Internet-Things-Security-Privacy
 
When N/A
Where N/A
Submission Deadline Oct 15, 2018
Categories    security   privacy   IOT   internet of things
 

Call For Papers

Symmetry Journal, MDPI, Impact Factor 1.457
Special Issue on Symmetry and Asymmetry Applications for Internet of Things Security and Privacy.

Dear Colleagues,

Nowadays, embedded systems have become an essential part of modern life. It is predicted that, in the near future, over 90% of computer applications will be embedded systems, and most of them will be small in size, with very low power consumption and high performance. Embedded systems is the keystone for the realization and deployment of a plethora of Internet of Things (IoT) products and applications for both consumer and industrial markets. In fact, the ability of “things” (along with sensors and actuators) to inter-operate within the existing Internet infrastructure paves the way toward the Internet of Everything (IoE), and gives momentum to modern technologies, including smart grids, smart homes, intelligent transportation, and smart cities.

However, IoT brings along major challenges regarding the security and privacy of the underlying systems and processes. For instance, certain IoT applications can be tightly linked to sensitive infrastructures and strategic services, such as the distribution of water and electricity. The array of challenges include ways to securing constrained objects, authenticate and authorize objects, manage object updates, secure communication, safeguard data privacy and integrity, detect and manage vulnerabilities, incidents, etc. These challenges are expected to worsen due to several reasons pertaining to a) the number of these “things”, which is expected to reach 30 billion objects by 2020, b) the unattended, complex, and often hostile environments in which these objects frequently operate, c) the complexity of the hardware/software IoT platforms and the communication processes involving both human-to-machine and machine-to-machine interactions, and d) the absence of standardization.

The goal of this special issue is to address the aforementioned challenges and foster the dissemination of the latest technologies, solutions, case studies, and prototypes regarding IoT security and privacy. Only high-quality articles describing previously unpublished, original, state-of-the-art research, and not currently under review by a conference or journal will be considered.

Dr. Weizhi Meng
Dr. Georgios Kambourakis
Prof. Dr. Christian Probst
Guest Editors

* Manuscript Submission Information *

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Symmetry is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1,200 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

* Keywords *

- Post-quantum security for IoT
- Secure design for IoT
- Efficient implementation of cryptographic algorithms; Side-channel analysis for IoT devices
- Security analysis and audit for IoT
- Privacy and anonymization techniques in IoT
- Trust management architectures
- Lightweight security solutions
- Survivability and performance modelling for IoT Encryption, authentication, availability assurance for IoT
- Authentication and access control in IoT Identification and biometrics in IoT
- Formal methods Symmetry technologies for IoT
- Asymmetry technologies for IoT Intrusion detection and prevention techniques for IoT

Related Resources

ICBTA 2024   ACM--2024 7th International Conference on Blockchain Technology and Applications (ICBTA 2024)
IEEE COINS 2024   IEEE COINS 2024 - London, UK - July 29-31 - Hybrid (In-Person & Virtual)
Call for Chapters - CRC Press 2024   Internet of Things: Challenges and Advances
CVIV 2024   2024 6th International Conference on Advances in Computer Vision, Image and Virtualization (CVIV 2024) -EI Compendex
DMBDA 2024   2024 7th International Conference on Data Mining and Big Data Analytics(DMBDA 2024)
JARES 2024   International Journal of Advance Robotics & Expert Systems
BDIOT 2024   ACM--2024 8th International Conference on Big Data and Internet of Things (BDIOT 2024)
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
CrossMED 2024   International Conference Landscapes Across the Mediterranean
CIoT 2024   6th International Conference on Internet of Things