posted by user: aawad || 9074 views || tracked by 5 users: [display]

IoTSP 2022 : Internet of Things Security and Privacy: Practical and Management Perspectives

FacebookTwitterLinkedInGoogle

Link: http://staff.www.ltu.se/~ismawa/iotsp/
 
When Mar 3, 2021 - Apr 30, 2023
Where N/A
Submission Deadline Jun 15, 2022
Notification Due Jul 1, 2022
Final Version Due Aug 1, 2022
Categories    iot security   iot privacy   cyber-physical systems   management security
 

Call For Papers

== Call for book Chapters==

Internet of Things Security and Privacy: Practical and Management Perspectives

Aims and Scope:
The Internet of Things (IoT) is an emerging paradigm due to extensive developments in information and communication technology (ICT). The purpose of IoT is to expand the functions of the first version of the Internet by increasing the ability to connect numerous objects. The wide facilities offered by IoT and other sensing facilities have led to a huge amount of data generated from versatile domains, thus, cybersecurity has become an inevitable requirement not only for personal safety but also for assuring the sustainability of the IoT paradigm itself. From the perspective of the organizational technology layer, attack surfaces have dramatically expanded (e.g., new entry points from endpoints and legacy devices, more vulnerable industrial control systems without suitable cybersecurity solutions, more proprietary software that is hard to update and patch, and poor security design), whereas security countermeasures have developed comparatively slowly.

This edited book will encompass both management and technical cybersecurity and privacy (including compliance) research in the IoT domain. Of particular interest is research that integrates management and technical approaches to IoT security and privacy; research that studies the real-world problem of IoT security in organizations, and research that contributes sound practical advice to industry. The topics covered by the book will present a collection of high-quality research works concerning IoT architecture, security techniques, and application areas. These will make the book unique in its contents and theme.

The book outlines key emerging trends in IoT security and privacy that span the entire IoT architecture (perception, network, and applications) layers, with a focus on different critical IoT applications such as smart homes and cities, e-health, critical infrastructure, and industrial IoT (IIoT) applications. The state-of-the-art body of knowledge presented in this book is a vital need for researchers, practitioners, and postgraduate students in the IoT development and deployment domains.

Topics of interest include, but not limited to:

== Practical Security and Privacy Perspectives:
— IoT devices and protocols security
— Attack detection and prevention in IoT
— Privacy-preserving techniques in IoT
— Secure integration of IoT and cloud /Edge computing
— Machine learning techniques for IoT security
— Secure network architecture for IoT
— Secure data management approaches
— Security in cyber-physical systems
— Authentication and access control
— Blockchain technologies for reliable and trustworthy IoTs
== Management Security and Privacy Perspectives:
— Cybersecurity prevention and response strategies
— Emergent cybersecurity risks arising from IoT-enabled 5G
— Situation awareness of IoT environment
— Risk identification, assessment, and mitigation
— Governance, policy, and compliance
— Awareness and training approaches
— Security architecture and frameworks
— Threat and vulnerability analysis


Publication Schedule:
The tentative schedule of the book publication is as follows:
Deadline for chapter submission: June 15, 2022
Author notification: July 01, 2022
Final version due: August 01, 2022
Acceptance notification: August 15, 2022
Publication date: Fourth quarter of 2022


Submission Procedure:
Authors are invited to submit original, high-quality, unpublished results of both practical and management security and privacy domains. Prospective authors need to electronically submit their contributions using the EasyChair submission system. Submitted manuscripts will be refereed by at least two independent and expert reviewers for quality, correctness, originality, and relevance. The accepted contributions will be published as a book volume by CRC Press.

== Please consider the following points when preparing your manuscript:
— The optimum manuscript length is 20-30 A4 pages.
— The publication of the selected chapters will be free of charge.
— Submitted manuscripts should conform to the author’s guidelines of the CRC Press mentioned in the following two points (Please review the book website).
— Latex is the preferable word processing tool for preparing the chapters.
— MS Word is an acceptable word processing tool for preparing the chapters.


Book Editors:
Ali Ismail Awad
Department of Computer Science, Electrical and Space Engineering
Luleå University of Technology
Luleå, Sweden
E-mail: ali.awad[at]ltu.se


Atif Ahmad
School of Computing and Information Systems
University of Melbourne
Melbourne, Australia
E-mail: atif[at]unimelb.edu.au


Kim-Kwang Raymond Choo
Cloud Technology Endowed Professor
The University of Texas at San Antonio
Texas, USA
E-mail: raymond.choo[at]fulbrightmail.org


Saqib Hakak
Canadian Institute for Cybersecurity (CIC)
Faculty of Computer Science
University of New Brunswick (UNB)
Fredericton, Canada
E-mail: saqib.hakak[at]unb.ca


Mohsen Guizani
College of Engineering
Qatar University
Doha, Qatar
E-mail: mguizani[at]qu.edu.qa

Related Resources

ICIME--EI 2025   2025 13th International Conference on Information Management and Engineering (ICIME 2025)
IEEE ICPS 2025   8th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS)
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
BDE--EI 2025   2025 7th International Conference on Big Data Engineering (BDE 2025)
ICITS--EI 2025   2025 The 13th International Conference on Information Technology and Science (ICITS 2025)
ICISPP--Ei 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)
ICISPP 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)
ICCCI--EI 2025   2025 7th International Conference on Computer Communication and the Internet (ICCCI 2025)