posted by user: marmusha || 7924 views || tracked by 12 users: [display]

ASPI 2013 : International Workshop on Adaptive Security & Privacy Management for the Internet of Things

FacebookTwitterLinkedInGoogle

Link: http://asset.nr.no/asset/index.php/ASPI2013
 
When Sep 8, 2013 - Sep 8, 2013
Where Zurich, Switzerland
Submission Deadline Jul 15, 2013
Notification Due Jul 26, 2013
Final Version Due Jul 31, 2013
Categories    security   privacy   internet of things   ubiquitous computing
 

Call For Papers

Call for Papers: International Workshop on Adaptive Security &
Privacy Management for the Internet of Things (ASPI 2013)

Time and Location: September 8th (Sunday) 2013, Zurich, Switzerland


Co-located at the 15th ACM International Conference on Ubiquitous Computing
(UbiComp2013, http://www.ubicomp.org/ubicomp2013/)

Workshop Description

The Internet of Things (IoT) denotes the interconnection of highly heterogeneous networked entities and networks following a number of communication patterns such as: human-to-human (H2H), human-to-thing (H2T), thing-to-thing (T2T), or thing-to-things (T2Ts). Nowadays, the IoT presents a strong focus of research with various initiatives working on the (re)design, application, and use of existing and new Internet technology for the IoT. Several significant challenges should be addressed to fulfil the IoT vision, including security and privacy. The Internet is already under continuous threats and the addition of many additional types of devices and interaction will open new security breaches so as to spark new malicious actions. Security and privacy management for the IoT remains a core challenge.

Many IoT devices may have zero or minimal security by design because they are low resource, low power devices, designed to work as closed vertical services. Security threats and risks may be higher because devices are unattended, use local wireless communication that have no or weak encryption making them more susceptible to eavesdropping and because users find security too unusable to setup and operate and hence leave devices relatively unsecure. It may be easier to reproduce and fake data sources, access nodes and data sinks that interact with IoT devices in order to attack devices or the services they access. Devices can be moved between or removed from private, communal, public and hostile physical spaces with differing levels of infrastructural security and privacy. There is a higher risk of a loss of privacy for human users and organisations because of an increased ability to eavesdrop, because of wireless networks with soft boundaries, and because embedded environment devices can sense smaller amounts of physical trails with a greater degree of sensitivity and accuracy. A specific focus is on the need for IoT security and privacy to adapt to changing contexts. The adaptation has multiple dimensions. We can adapt existing conventional security models to more effectively secure an IoT. We can adapt security pre-planned and unplanned context changes such as different moving around in different physical spaces. IoT systems can be designed to self-adapt. IoT systems can adapt to the active (re) configuration and maintenance of IoT devices and systems of devices by users and by artificial agents.

The proposed workshop intends to bring together researchers and practitioners from relevant fields to present and disseminate ongoing research for vision for the security and privacy models, protocols, algorithms, context-awareness for security, and devices that can be implemented in the Internet of Things and to relate these to ubiquitous computing. It aims to facilitate knowledge transfer and synergy, bridge gaps between the IoT and UbiComp research communities and related groups for mutual benefit, to help identify opportunities and challenges for interested researchers, system developers and innovators.

It will cover topics at both theoretical and applied aspects in this multi-disciplinary research area. The workshop will be organised in a proactive and encompassing format, i.e., containing a mixture of invited talks, oral presentations and an open panel discussion. The organisers fully believe that the themes of the workshop will have a significant impact to develop secure ubiquitous computing services based on the Internet of Things, and have the determination to organise the same workshop in the coming years. Through the workshop it is expected that a core research community in this area can be formed that nurtures relevant research and facilitates dissemination of results and will feed these into UbiComp. The workshop will include a programme committee consisting of high profile researchers in relevant research areas and a specific plan to promote it. In addition to publication in ACM digital library, selected accepted papers will be published in an international Journal and potentially a book - refer to the publication section below.

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICIME--EI 2025   2025 13th International Conference on Information Management and Engineering (ICIME 2025)
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
ICISPP 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
SEAS 2025   14th International Conference on Software Engineering and Applications
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
IoTBDS 2025   10th International Conference on Internet of Things, Big Data and Security
IMCOM 2025   19th International Conference on Ubiquitous Information Management and Communication
NMCO 2025   11th International Conference on Networks, Mobile Communication