posted by user: zaigham || 3407 views || tracked by 6 users: [display]

Book-IoTSecurity 2019 : Springer book on: Security Privacy & Trust in IoT


When N/A
Where N/A
Submission Deadline Aug 20, 2018
Categories    IOT   security   privacy   trust

Call For Papers


***** Security, Privacy and Trust in the IoT Environment *****

Edited by: Professor Zaigham Mahmood
(Univ of Derby UK, Debesis Eduction UK, Shijiazhuang Tiedao Uni China)
To be published by Springer in 2019

***** Chapter Proposal Submission Deadline: 20 August 2018
***** Proposals to be sent to:

1. Introduction

The Internet of Things (IoT) is a network of devices or “things” connected through wireless and wired connections that provides a pervasive environment where a person or device can interact at any time with the digital and physical world. With time, the number and variety of such devices is on the increase; devices themselves are getting smarter than before; and users’ expectations in terms of adaptive and self-governing environments are also increasing. This connectivity and resulting smarter living, although highly attractive and profitable, has many inherent issues as well. The most challenging of these relate to the privacy/security of data, user trust in systems, and user authentication mechanisms. This requires novel network architectures and middleware platforms deploying new emerging communication technologies, adoption of novel context-aware connectivity approaches, and automation of connectivity of a diverse range of tools and devices - ensuring that IoT has a seamless connectivity of devices, and interaction between devices is trust worthy from users’ perspective.

2. Suggested Topics

Focus of the book is on the issues of privacy, security and trust relating to IoT environments; and technical solutions to address the key challenges. Some of the relevant topics include the following:

Context based security, privacy and trust issue in IoT environment
Connectivity issues due to pervasiveness of digital devices
Trusted computing – as security protection solution
Cryptography – as security protection solution
Challenges due to scalability, harmonisation and homogeneity
Security/privacy frameworks and trust methodologies
Limitations of orchestration and integration of services in IoT environment
Automation of security/privacy methods and technologies
Coupling between smart devices and physical environment
Vulnerabilities in critical infrastructures (energy, telecom, utilities)
Open issues relating to reliability and availability of devices and services
Device authentication and trust mechanisms in the context of IoT
Anonymisation of user data and protocol metadata
Security/privacy issues of scalability of devices, secure setup and configuration
Methodologies for role based and attribute-based access controls
M2M interactions and trustworthiness of connectivity
Issues due to hybridised man-machine interactions for smart environments
Analysis/measurement of trust in digital interactions
Current developments in security/privacy maturity models and frameworks
Cyber security technologies and frameworks for IoT infrastructures
Threat modelling to validate security approaches for distributing computing
Secure coding and vulnerability testing in relation to IoT connectivity
Privacy and data protection regulations and safeguards
Security testing of devices’ connectivity in the IoT paradigm
Connectivity issues relating to diversity of IoT devices
Alternative IoT architectures from security, privacy, trust perspective
Security/privacy/trust solutions for IoT layers (device, gateway/fog, edge/cloud, application)
Open issues and solutions to attacks on infrastructures control systems
Big Data challenges, inherent issues and solutions in the IoT context

3. Aim and Objectives

The aim of the proposed book is to report and discuss the related topics to benefit other researchers/practitioners as well as to advance the existing body of knowledge in the proposed subject area. The objectives are:
· To capture latest research and report on challenges and solutions with respect to privacy, security and trust in the IoT vision
· To present case Studies, balanced view of inherent issues, and identify further research directions and technologies in this area

4. Submission Procedure

Researchers and practitioners are invited to submit 1-2-page chapter proposals clearly stating the objective, scope and structure of the proposed chapters - by the deadline mentioned above. Authors of accepted proposals will be notified within two weeks (in most cases) and given guidelines for full chapter preparation. Completed chapters should be approximately 10,000 words or 20 pages in length – longer chapters will also be acceptable. Full chapters will be reviewed following a double-blind peer review process to ensure relevance, quality, originality and high information content. Proposals (and full chapters, after the acceptance of the proposal), in the form of WORD files, should be sent to:

5. Important dates

· Chapter proposals due date: 20 August 2018
· Notification of acceptance: within 2 weeks of receipt of proposals
· Full chapters due date: within 6 weeks of acceptance notification
· Chapter reviews feedback: within 2 months of chapters due date
· Revised chapters due date: within 3 weeks of review feedback
· Manuscript submission to Springer: February 2019

For Enquiries:
Please contact the editor:


Related Resources

IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
Edited Book in Springer-Verlag 2022   Call for Book Chapters-Machine Learning and Deep Learning for Time Series Processing and Analysis
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
ML&DataAnalytics 2022   Call for Springer book Chapters ''Machine learning and data analytics for solving business problems: methods, applications, and case studies.'', Springer (USA)
WirelessConnect 2022   Springer Book - Towards a Wireless Connected World: Achievements and New Technologies
DLIS 2022   Deep Learning for IoT Security - Frontiers in Big Data Journal
IJSCAI 2022   International Journal on Soft Computing, Artificial Intelligence and Applications
ICDIS 2022   The 4th International Conference on Data Intelligence and Security
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
MoWiN 2022   11th International Conference on Mobile & Wireless Networks