| |||||||||||||||
SPT-IoT 2019 : The Third International Workshop on Security, Privacy and Trust in the Internet of Things | |||||||||||||||
Link: https://sites.google.com/view/spt-iot/home | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The Internet of Things (IoT) is a novel design paradigm, envisioned as a network of billions or trillions of “Things” communicating with one another and rapidly gaining global attention from academia, industry, and government. Pervasive computing is at the heart of IoT and forms a fundamental building block necessary to realize the IoT. Equipped with pervasive technologies such as RFID and smart dust together with tiny sensors, actuators and machine-to-machine (M2M) communication technologies, IoT has the potential to offer innovative solutions to global challenges faced by ageing populations, growing cost of healthcare, climate change, bio security, as well as how we manage our environment and natural resources. The heterogeneous nature of the IoT as well as the computational constraints of many of the building blocks of the IoT make security, privacy and trust an extremely challenging problem to solve on one hand, while security, privacy and trust play a critical role for most, if not all, applications of IoT in domains such as surveillance, healthcare, security, transport, food safety, manufacturing, logistics and supply chain management. Without effective solutions for security, privacy and trust, reliable data fusion and mining, qualified services with context-aware intelligence and enhanced user acceptance and experience cannot be achieved.
The IEEE Percom workshop on Security, Privacy and Trust for IoT aims to provide a forum that brings together researchers from academia as well as practitioners from industry, standardization bodies, and government to meet and exchange ideas on recent research and future directions for the IoT with a specific focus on IoT security, privacy and trust. The technical discussion will be focused on the communications and network security aspects of IoT and the key enabling technologies for IoT, especially M2M communications and networking, RFID technology and Near Field Communications (NFC), the challenges to security, privacy and trust presented and novel approaches to solving these challenges. The technical topics of interest to the workshop include, but are not limited to: - IoT secure access network technologies and capillary networks - IoT secure network infrastructure - IoT security protocols and IoT networking and communication security - Methods for secure by design IoT - Methods for IoT security analysis and audit - Identification and biometrics in IoT - Security of Big Data in IoT - Privacy and anonymization techniques in IoT - Cyber physical systems security - Circuit and system design for secure “Things” - Secure firmware and secure firmware update for “Things” - Secure Cloud of Things - Trust management architectures - Security in pervasive and ubiquitous computing including Smart Objects - Secure sensing - Embedded Platforms for Cryptography (implementations for performance-optimized, resource-constrained, energy-efficient platforms) - Hardware security primitives and lightweight security solutions - Secure pervasive/Ubiquitous Computing Software and Systems - Digital forensics in IoT - Ethics and legal considerations in IoT including liability and policy enforcement in IoT Paper Submission Prospective authors are invited to submit full papers (up to 6 pages in length) electronically through the EDAS system using the standard IEEE template for conference papers. Papers must be original material not currently under review by another conference or journal. All submitted papers will be subjected to multiple independent peer reviews. Submission implies the willingness of at least one of the authors to register and present the paper. Each accepted workshop paper requires a full PerCom registration (no registration is available for workshops only). All accepted papers will be published by the IEEE Press and will appear in the Conference Proceedings and on IEEE Xplore. During the initial paper submission process via EDAS, it is the authors' responsibility to ensure that the author list and the paper title of the submitted .pdf file is an exact match to the author list and paper title on the EDAS registration page. In particular, the EDAS registration page must include all co-authors, not just the submitting author. Failure to comply with this rule might result in your paper being withdrawn from the review process. All submissions should be written in English with a maximum paper length of six (6) printed pages (minimum 10-point font) including figures, without incurring additional page charges. The authors will be able to buy an additional page for the camera-ready version. Only PDF files will be accepted for the review process and all submissions must be done through EDAS. The IEEE LaTeX and Microsoft Word templates, as well as formatting instructions, can be found here: https://www.ieee.org/conferences/publishing/templates.html EDAS paper submission link: https://www.edas.info/newPaper.php?c=25228 |
|