| |||||||||||||||
IoT-SECFOR 2019 : The 3rd International Workshop on Security and Forensics of IoT | |||||||||||||||
Link: https://www.ares-conference.eu/workshops/iot-secfor-2019/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Internet-of-Things (IoT) are becoming increasingly prevalent in our society, as the backbone of interconnected smart homes, smart hospitals, smart cities, smart wearables and other smart environments. IoT leverage embedded technologies equipped with sensors and communication capabilities; they are able to broadcast their presence to other objects and interact with them using different protocols. Gartner predicts that, by 2020, 21 billion IoT endpoints will be in use. Along with usability, efficiency, and cost savings benefits, increasingly, the use of IoT pose security risks and raise challenges to digital forensics. The massive DDoS caused by the Mirai botnet which exploited IoT devices is a recent example. This workshop aims to bring together researchers and practitioners from both communities – security and forensics – to discuss problems and solutions regarding IoT.
TOPICS OF INTEREST INCLUDE, BUT ARE NOT LIMITED TO: Adaptive security in IoT Challenges related to IoT forensics and security Coexistence of different security protocols in IoT Covert communication in IoT Cryptography protocols and algorithms for IoT Cybercrimes exploiting IoT Data analysis of IoT for forensic investigation Data ownership and attack simulation methods for IoT networks and devices Identification/preservation of evidence for digital forensic investigations involving IoT Intrusion and malware detection/prevention technologies for IoTLegal and human aspects of security and forensics of IoT Models for risk identification and assessment in IoT networks Privacy and trust in IoT Security and forensic aspects in Cyber physical IoT systems Security applications and management of IoT Security architectures and protection mechanisms for IoT Security in Wireless Sensor Networks applied to IoT Threat models and attack strategies for IoT |
|