posted by organizer: afurfaro || 2050 views || tracked by 4 users: [display]

IoT&Security 2022 : 1st International Workshop on IoT and Security

FacebookTwitterLinkedInGoogle

Link: http://cyber-science.org/2022/assets/files/ws-ss/dasc/IoT&Security2022_CFP.pdf
 
When Sep 12, 2022 - Sep 12, 2022
Where Calabria,Italy
Submission Deadline Jun 1, 2022
Notification Due Jul 1, 2022
Final Version Due Jul 15, 2022
Categories    IOT   intrusion detection systems   security
 

Call For Papers

Call for Papers


1st International Workshop on IoT and Security (IoT&Security)


** Deadline Abstract Submission: June 1st 2022 **


[Apologies for cross and multiple postings]


-------------------------------------------------------------------------------------------------------------------








Co-located with IEEE DASC 2022


Workshop date: 12nd Sept 2022 (TO BE CONFIRMED)


(Conference: 12nd-15th of Sept, 2022)


Calabria, Italy





-------------------------------------------------------------------------------------------------------------------








IMPORTANT DATES








Papers Submission due: June 1, 2022


Authors Notification: July 1, 2022


Camera-ready Submission: July 15, 2022



SCOPE


The proliferation of IoT devices in everyday human life has made their security a critical requirement. Currently those devices are not very secure because of several reasons. First, manufacturers do not account much for security, releasing products that are vulnerable to attacks, thus leaving users with security issues that are unlikely to be resolved. Second, many IoT devices do not have enough computing power to run an antivirus or even do not allow one to install an antivirus. Finally, the heterogeneity which characterizes the IoT in terms of applications, hardware, and software, expands the attack surface, while at the same time increases the difficulty of deploying all-encompassing security solutions. Despite some sort of security provided by IoT enabling technologies (e.g., communication protocols), or by intrusion prevention systems (e.g., network firewalls), attackers still find ways to compromise devices, or the communication between them. Unlike laptop and desktop computers (which have frequent on-off cycles), many IoT devices such as webcams and wireless routers operate 24/7 unattended. This makes IoT devices particularly prone to various attacks, such as attacks aiming at recruiting devices for botnets. This makes IoT networks dangerous not only for themselves but also for remote systems that are victims of attacks launched by infected IoT devices. Moreover, IoT-based systems that handle sensitive data (e.g., healthcare IS) need to promptly react to malicious activities in order to prevent private data from leaving the network. IoT networks, thus, must be equipped with some sort security mechanism, such as intrusion detection systems, intrusion prevention systems, attack reaction systems, proactive defense mechanisms, etc.








TOPICS








The main topics include but are not limited to:


- Intrusion Detection Systems (Machine learning based IDS; Host-based IDS; Network-based IDS; Anomaly-based IDS; Signature-based IDS; Specification-based IDS; Distributed IDS; Privacy preserving IDS)


- Malware/Botnet detection


- Security for VANETS/MANETS


- Security for IoT-based systems (industrial control, healthcare monitoring, Cyber Physical Systems, domotic)


- Security for cloud-based IoT applications


- Security at the edge/fog


- Attack detection and countermeasures


- Game theory for the IoT security


- Security resources placement strategies


- Security for software defined IoT networks


- Security for narrowband IoT networks


- Security for SCADA-based systems


- IoT firmware analysis


- Automatic exploit generation for IoT devices


- Side channel attacks for IoT devices


- Cryptography for IoT


- Tamperproofing techniques for IoT




















SUBMISSION and Camera Ready Preparation


Please refer to the conference submission link below: (http://cyber-science.org/2022/dasc/papersubmission/)








General Chairs








Antonella Guzzo, University of Calabria, Italy


Michele Ianni, University of Calabria, Italy


Antonino Rullo, University of Calabria, Italy


Angelo Furfaro, University of Calabria, Italy








Program Committee








Amit Kumar Singh, National Institute of Technology Patna, India


Andrea Pugliese, University of Calabria, Italy


Areeba Umair, Federico II University, Italy


Carmelo Felicetti, University of Calabria, Italy


Claudia Greco, University of Calabria, Italy


Edoardo Serra, Boise State University, USA


Elio Masciari, Federico II University, Italy


Gianluca Lax, University of Reggio Calabria, Italy


Gwanggil Jeon, Incheon National University, Korea


Lin Yang, Huazhong Agricultural University, China


Marco Fisichella, L3S Research Center of Leibniz University, Germany


Mohammad Mehedi Hassan, King Saudi University, Saudi Arabia


Niccolo' Marastoni, University of Verona, Italy


Zia Ush Shamszaman, Teesside University, United Kingdom

Related Resources

AIDLTSecurity 2024   AI and Distributed Ledger Technologies for IoT Security, Privacy, and Trust
ARIA 2024   11th International Conference on Artificial Intelligence & Applications
IoTBDS 2025   10th International Conference on Internet of Things, Big Data and Security
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
AIDD 2024   2nd International Conference on AI, Data Mining and Data Science
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
ICBICC 2024   2024 International Conference on Big Data, IoT, and Cloud Computing (ICBICC 2024)
RSEJ 2024   Renewable and Sustainable Energy: An International Journal