| |||||||||||||||
SI-IoT Security 2019 : Special Issue on Internet of Things Security and Forensics | |||||||||||||||
Link: https://www.journals.elsevier.com/ad-hoc-networks/call-for-papers/special-issue-internet-of-things-security-and-forensics | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Special Issue on Internet of Things Security and Forensics
Ad Hoc Networks (IF: 3.151) Editors in Chief Ian Akyildiz, Georgia Institute of Technology Guest Editors Monther Aldwairi, Zayed University Nasir Memon, New York University Vashek (Vaclav) Matyas, Masaryk University Important dates Submission deadline: June 13th 2019 Acceptance Notification: Oct 19th 2019 Revised Papers Due: Dec 19th 2019 https://www.journals.elsevier.com/ad-hoc-networks/call-for-papers/special-issue-internet-of-things-security-and-forensics Internet of Things (IoT) adoption rates and market share are growing significantly. With their limitless applications, we are witnessing increased level of connectivity and integration. Average homes already using numerous wirelessly interconnected smart gadgets facilitating data transfer and access. Companies are racing to get their share of the "IoT pie" and those small or integrated devices are not designed with security in mind. Just recently, Mirai botnet attack used IoT to perform DDOS attack that took down many popular websites. As IoT devices find their way into manufacturing facilities and critical infrastructure, the threat is immanent. As the security community moves towards securing IoT devices, the concern remains over the security of billions of already deployed old IoT devices and whether they can be patched or updated. Hard-coding configurations and passwords, and that devices are free from known vulnerabilities when sold could result in dire consequences. The lack of security standards for IoT devices has resulted in significant waves of attacks. We're beyond attacks on smart TVs and home surveillance cameras. We are witnessing increased industrial control systems and infrastructure attacks including: gas pumps, robots, cars, hospitals systems, implantable medical devices, heating controllers, payment machines, warships...etc. |
|