posted by user: zaigham || 2984 views || tracked by 6 users: [display]

Book-IoTSecurity 2019 : Springer book on: Security Privacy & Trust in IoT


When N/A
Where N/A
Submission Deadline Aug 20, 2018
Categories    IOT   security   privacy   trust

Call For Papers


***** Security, Privacy and Trust in the IoT Environment *****

Edited by: Professor Zaigham Mahmood
(Univ of Derby UK, Debesis Eduction UK, Shijiazhuang Tiedao Uni China)
To be published by Springer in 2019

***** Chapter Proposal Submission Deadline: 20 August 2018
***** Proposals to be sent to:

1. Introduction

The Internet of Things (IoT) is a network of devices or “things” connected through wireless and wired connections that provides a pervasive environment where a person or device can interact at any time with the digital and physical world. With time, the number and variety of such devices is on the increase; devices themselves are getting smarter than before; and users’ expectations in terms of adaptive and self-governing environments are also increasing. This connectivity and resulting smarter living, although highly attractive and profitable, has many inherent issues as well. The most challenging of these relate to the privacy/security of data, user trust in systems, and user authentication mechanisms. This requires novel network architectures and middleware platforms deploying new emerging communication technologies, adoption of novel context-aware connectivity approaches, and automation of connectivity of a diverse range of tools and devices - ensuring that IoT has a seamless connectivity of devices, and interaction between devices is trust worthy from users’ perspective.

2. Suggested Topics

Focus of the book is on the issues of privacy, security and trust relating to IoT environments; and technical solutions to address the key challenges. Some of the relevant topics include the following:

Context based security, privacy and trust issue in IoT environment
Connectivity issues due to pervasiveness of digital devices
Trusted computing – as security protection solution
Cryptography – as security protection solution
Challenges due to scalability, harmonisation and homogeneity
Security/privacy frameworks and trust methodologies
Limitations of orchestration and integration of services in IoT environment
Automation of security/privacy methods and technologies
Coupling between smart devices and physical environment
Vulnerabilities in critical infrastructures (energy, telecom, utilities)
Open issues relating to reliability and availability of devices and services
Device authentication and trust mechanisms in the context of IoT
Anonymisation of user data and protocol metadata
Security/privacy issues of scalability of devices, secure setup and configuration
Methodologies for role based and attribute-based access controls
M2M interactions and trustworthiness of connectivity
Issues due to hybridised man-machine interactions for smart environments
Analysis/measurement of trust in digital interactions
Current developments in security/privacy maturity models and frameworks
Cyber security technologies and frameworks for IoT infrastructures
Threat modelling to validate security approaches for distributing computing
Secure coding and vulnerability testing in relation to IoT connectivity
Privacy and data protection regulations and safeguards
Security testing of devices’ connectivity in the IoT paradigm
Connectivity issues relating to diversity of IoT devices
Alternative IoT architectures from security, privacy, trust perspective
Security/privacy/trust solutions for IoT layers (device, gateway/fog, edge/cloud, application)
Open issues and solutions to attacks on infrastructures control systems
Big Data challenges, inherent issues and solutions in the IoT context

3. Aim and Objectives

The aim of the proposed book is to report and discuss the related topics to benefit other researchers/practitioners as well as to advance the existing body of knowledge in the proposed subject area. The objectives are:
· To capture latest research and report on challenges and solutions with respect to privacy, security and trust in the IoT vision
· To present case Studies, balanced view of inherent issues, and identify further research directions and technologies in this area

4. Submission Procedure

Researchers and practitioners are invited to submit 1-2-page chapter proposals clearly stating the objective, scope and structure of the proposed chapters - by the deadline mentioned above. Authors of accepted proposals will be notified within two weeks (in most cases) and given guidelines for full chapter preparation. Completed chapters should be approximately 10,000 words or 20 pages in length – longer chapters will also be acceptable. Full chapters will be reviewed following a double-blind peer review process to ensure relevance, quality, originality and high information content. Proposals (and full chapters, after the acceptance of the proposal), in the form of WORD files, should be sent to:

5. Important dates

· Chapter proposals due date: 20 August 2018
· Notification of acceptance: within 2 weeks of receipt of proposals
· Full chapters due date: within 6 weeks of acceptance notification
· Chapter reviews feedback: within 2 months of chapters due date
· Revised chapters due date: within 3 weeks of review feedback
· Manuscript submission to Springer: February 2019

For Enquiries:
Please contact the editor:


Related Resources

CEVVE 2021   2021 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2021)
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
blockchain_ml_iot 2021   Network and Electronics (MDPI) Joint Special Issue - Blockchain and Machine Learning for IoT: Security and Privacy Challenges
CPS Smart Cities Book 2021   Cyberphysical Smart Cities Infrastructures: Optimal Operation and Intelligent Decision Making
CIoT 2021   3rd International Conference on Internet of Things
EAI SecureComm 2021   17th EAI International Conference on Security and Privacy in Communication Networks (Springer, Scopus, ISI, Ei, more)
CRYPIS 2021   10th International Conference on Cryptography and Information Security
SI on SPIHG 2022   IEEE S&P CfP: Special Issue on Security and Privacy Issues of Home Globalization
CANS 2021   Cryptology and Network Security
CSPPSG 2021   MDPI Sensors - Special Issue on 'Cybersecurity and Privacy-Preserving in Modern Smart Grid'