posted by user: zaigham || 3643 views || tracked by 6 users: [display]

Book-IoTSecurity 2019 : Springer book on: Security Privacy & Trust in IoT


When N/A
Where N/A
Submission Deadline Aug 20, 2018
Categories    IOT   security   privacy   trust

Call For Papers


***** Security, Privacy and Trust in the IoT Environment *****

Edited by: Professor Zaigham Mahmood
(Univ of Derby UK, Debesis Eduction UK, Shijiazhuang Tiedao Uni China)
To be published by Springer in 2019

***** Chapter Proposal Submission Deadline: 20 August 2018
***** Proposals to be sent to:

1. Introduction

The Internet of Things (IoT) is a network of devices or “things” connected through wireless and wired connections that provides a pervasive environment where a person or device can interact at any time with the digital and physical world. With time, the number and variety of such devices is on the increase; devices themselves are getting smarter than before; and users’ expectations in terms of adaptive and self-governing environments are also increasing. This connectivity and resulting smarter living, although highly attractive and profitable, has many inherent issues as well. The most challenging of these relate to the privacy/security of data, user trust in systems, and user authentication mechanisms. This requires novel network architectures and middleware platforms deploying new emerging communication technologies, adoption of novel context-aware connectivity approaches, and automation of connectivity of a diverse range of tools and devices - ensuring that IoT has a seamless connectivity of devices, and interaction between devices is trust worthy from users’ perspective.

2. Suggested Topics

Focus of the book is on the issues of privacy, security and trust relating to IoT environments; and technical solutions to address the key challenges. Some of the relevant topics include the following:

Context based security, privacy and trust issue in IoT environment
Connectivity issues due to pervasiveness of digital devices
Trusted computing – as security protection solution
Cryptography – as security protection solution
Challenges due to scalability, harmonisation and homogeneity
Security/privacy frameworks and trust methodologies
Limitations of orchestration and integration of services in IoT environment
Automation of security/privacy methods and technologies
Coupling between smart devices and physical environment
Vulnerabilities in critical infrastructures (energy, telecom, utilities)
Open issues relating to reliability and availability of devices and services
Device authentication and trust mechanisms in the context of IoT
Anonymisation of user data and protocol metadata
Security/privacy issues of scalability of devices, secure setup and configuration
Methodologies for role based and attribute-based access controls
M2M interactions and trustworthiness of connectivity
Issues due to hybridised man-machine interactions for smart environments
Analysis/measurement of trust in digital interactions
Current developments in security/privacy maturity models and frameworks
Cyber security technologies and frameworks for IoT infrastructures
Threat modelling to validate security approaches for distributing computing
Secure coding and vulnerability testing in relation to IoT connectivity
Privacy and data protection regulations and safeguards
Security testing of devices’ connectivity in the IoT paradigm
Connectivity issues relating to diversity of IoT devices
Alternative IoT architectures from security, privacy, trust perspective
Security/privacy/trust solutions for IoT layers (device, gateway/fog, edge/cloud, application)
Open issues and solutions to attacks on infrastructures control systems
Big Data challenges, inherent issues and solutions in the IoT context

3. Aim and Objectives

The aim of the proposed book is to report and discuss the related topics to benefit other researchers/practitioners as well as to advance the existing body of knowledge in the proposed subject area. The objectives are:
· To capture latest research and report on challenges and solutions with respect to privacy, security and trust in the IoT vision
· To present case Studies, balanced view of inherent issues, and identify further research directions and technologies in this area

4. Submission Procedure

Researchers and practitioners are invited to submit 1-2-page chapter proposals clearly stating the objective, scope and structure of the proposed chapters - by the deadline mentioned above. Authors of accepted proposals will be notified within two weeks (in most cases) and given guidelines for full chapter preparation. Completed chapters should be approximately 10,000 words or 20 pages in length – longer chapters will also be acceptable. Full chapters will be reviewed following a double-blind peer review process to ensure relevance, quality, originality and high information content. Proposals (and full chapters, after the acceptance of the proposal), in the form of WORD files, should be sent to:

5. Important dates

· Chapter proposals due date: 20 August 2018
· Notification of acceptance: within 2 weeks of receipt of proposals
· Full chapters due date: within 6 weeks of acceptance notification
· Chapter reviews feedback: within 2 months of chapters due date
· Revised chapters due date: within 3 weeks of review feedback
· Manuscript submission to Springer: February 2019

For Enquiries:
Please contact the editor:


Related Resources

CEVVE 2023   2023 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2023)
IEEE COINS 2023   IEEE COINS 2023 - Berlin, Germany - July 23-25 - Hybrid (In-Person & Virtual)
blockchain_ml_iot 2023   Network (MDPI) Special Issue - Blockchain and Machine Learning for IoT: Security and Privacy Challenges
CSW 2023   2023 International Workshop on Cyber Security (CSW 2023)
Call for Book Chapter 2023   Decoding Cultural Heritage: a critical dissection and taxonomy of human creativity through digital tools
IEEE ICISPP 2023   IEEE--2023 4th International Conference on Information Security and Privacy Protection (ICISPP 2023)
Oikography 2023   Oikography: Homemaking through Photography
WIFS 2023   IEEE International Workshop on Information Forensics and Security
CPSIOT 2023   2023International Conference on Cyber Physical Systems and IoT(CPSIOT 2023)