posted by user: romanUMA || 10085 views || tracked by 16 users: [display]

SecIoT 2010 : 1st Workshop on the Security of the Internet of Things

FacebookTwitterLinkedInGoogle

Link: http://www.isac.uma.es/seciot10/
 
When Nov 29, 2010 - Nov 29, 2010
Where Tokyo, Japan
Submission Deadline Sep 17, 2010
Notification Due Oct 5, 2010
Final Version Due Oct 12, 2010
Categories    internet of things   security   wsn   RFID
 

Call For Papers

-------------------------------------------------------------------------
The 1st Workshop on the Security of the Internet of Things
(SecIoT 2010)
Tokyo (Japan), November 29, 2010
http://www.isac.uma.es/seciot10
in conjunction with
Internet Of Things 2010, November 29 - December 1, 2010
-------------------------------------------------------------------------
..............................
NEW DEADLINE: September 17th.
..............................

Important Dates:
----------------

Paper Submission due: 17 September 2010 (Extended)
Acceptance notification: 5 October 2010
Final papers due: 12 October 2010

Overview/Scope:
---------------

While there are many definitions of the Internet of Things (IoT), all of them
revolve around the same central concept: a world-wide network of interconnected
objects. These objets will make use of multiple technological building blocks,
such as wireless communication, sensors, actuators, and RFID, in order to allow
people and things to be connected anytime anyplace, with anything and anyone.
However, before this new vision takes its first steps, it is essential to
consider the security implications of billions of intelligent things
cooperating with other real and virtual entities over the Internet. In fact,
we need to plan well in advance what kind of technological mechanisms,
protocols and standard infrastructures we will need in order to protect the
IoT. Failure to do so will result in a weak infrastructure, which will be
surely exploited by malicious entities performing attacks such as
accessing personal information or manipulating the elements of the real world.
The setback caused by the lack of trust on the IoT can be disastrous for
the realization of this vision.

Securing the IoT is a very complex task, because there are plenty of
factors that must be taken into account. Not only it is necessary to
protect its different building blocks, but it is also vital to consider
how these blocks will work together and what kind of interoperable
security mechanisms must be created. Besides, there will be multiple
actors, such as human beings, machines, and the very own objects, that
will use the services provided by the IoT, and it is necessary to
assure a certain level of security during their cooperation. Moreover,
the management of all the information produced by these interactions
raises many security concerns, such as privacy issues, that must be
addressed and solved. Therefore, the goal of this workshop is to bring
together researchers and industry experts in areas relevant to the security
of the Internet of Things. As this workshop is the first in this area, it
is also its objective to serve as a forum for not only presenting
state-of-the-art research, but also for debating the role of security and
its practical implications in the development of the IoT.

Topics of interest for the workshop include the following:
----------------------------------------------------------

* New security problems in the context of the IoT.
* Privacy risks and data management problems.
* Identifying, authenticating, and authorizing entities.
* Development of trust frameworks for secure collaboration.
* New cryptographic primitives for constrained "things".
* Connecting heterogeneous ecosystems and technologies.
* Legal Challenges and Governance Issues.
* Resilience to external and internal attacks.
* Context-Aware Security.
* Providing protection to an IP-connected IoT.
* Web services security and other application-layer issues.

Submission Guidelines:
----------------------

Submitted papers must not substantially overlap papers that have been published
or that are simultaneously submitted to a journal or a conference with
proceedings. Submission of a paper should be regarded as an undertaking
that, should the paper be accepted, at least one of the authors will
register for the conference and present the work. All accepted workshop
papers will be published in a single workshop proceedings volume.

Papers must be submitted using the workshop web site and following the
requirements stated there. All Paper submissions should be anonymized
to facilitate blind review. Submission should be in IEEE 8.5x11 conference
format and should not exceed 8 pages. Submission should be formatted in
strict accordance with the IEEE Computer Society author guidelines:
http://www.ieee.org/web/publications/pubservices/confpub/AuthorTools/
conferenceTemplates.html

Authors of selected papers will be invited to submit an extended version for
possible publication in the "Protecting the Internet of Things" special issue
of Wiley's Security and Communication Networks Journal. This journal is
indexed in almost all important technical journal index systems, such as ISI,
SCI, EI, SCOPUS, etc.


Committees
----------
General Co-Chairs:
- Jim Clarke (Waterford Institute of Technology, Ireland)
- Rodrigo Roman (University of Malaga, Spain)

Program Co-Chairs:
- Stefanos Gritzalis (University of the Aegean, Greece)
- Jianying Zhou (Institute for Infocomm Research, Singapore)

Program Committee:
- Alessandro Acquisti (Carnegie Mellon University, USA)
- Hani Alzaid (Queensland University of Technology, Australia)
- Levente Buttyan (BME, Hungary)
- Barbara Daskala (ENISA, Greece)
- John Dominque (Knowledge Media Institute, The Open University, UK)
- Alex Gluhak (University of Surrey, UK)
- Antonio Jara (University of Murcia, Spain)
- Marc Joye (Technicolor, France)
- Jin Kwak (Soonchunhyang University, Korea)
- Andre Koenig (Technische Universität Darmstadt, Germany)
- Manik Lal Das (Dhirubhai Ambani Inst. for Information and Communication Tech., India)
- Costas Lambrinoudakis (University of Piraeus, Greece)
- Albert Levi (Sabanci University, Turkey)
- Javier Lopez (University of Malaga, Spain)
- Christoph P. Mayer (University of Karlsruhe, Germany)
- Yi Mu (University of Wollongong, Australia)
- Barry Mulcahy (Waterford Institute of Technology, Ireland)
- Aljosa Pasic (Atos Origin, Spain)
- Michel Riguidel (Institut Télécom/Télécom ParisTech, France)
- Panagiotis Rizomiliotis (University of the Aegean, Greece)
- Matt Robshaw (Orange Labs, France)
- Gokay Saldamli (Bogazici University, Turkey)
- Stefaan Seys (K.U.Leuven, Belgium)
- Nicolas Sklavos (Tech. Educational Institute of Patras, Greece)
- Neeraj Suri (Technische Universitaet Darmstadt, Germany)
- Rolf H. Weber (University of Zurich, Switzerland)
- Duncan Wong (City University of Hong Kong, China)
- Yanjiang Yang (Institute for Infocomm Research, Singapore)
- Yunlei Zhao (Fudan University, China)
- Wen Tao Zhu (CAS, China)

Related Resources

IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience
IEEE-Ei/Scopus-SGGEA 2024   2024 Asia Conference on Smart Grid, Green Energy and Applications (SGGEA 2024) -EI Compendex
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
ICIME--EI 2025   2025 13th International Conference on Information Management and Engineering (ICIME 2025)
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
ICISPP--Ei 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICCCI--EI 2025   2025 7th International Conference on Computer Communication and the Internet (ICCCI 2025)
MATHCS 2024   2nd International Conference on Mathematics, Computer Science & Engineering