| |||||||||||||||
Journal of Computer Networks 2018 : Special Issue: Security and Privacy for the Internet of Things, Elsevier Journal of Computer Networks | |||||||||||||||
Link: https://www.journals.elsevier.com/computer-networks/call-for-papers/special-issue-security-privacy-internet-of-things | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Special Issue: Security and Privacy for the Internet of Things
Elsevier Journal of Computer Networks - The International Journal of Computer and Telecommunications Networking ________________________________________ Scope The Internet of Things (IoT) is rapidly evolving from theory to real-life and large scale deployments. Examples include smart homes, industrial manufacturing, distributed sensing and tracking for logistics, and monitoring for transportation systems. While some IoT devices today provide basic security protection, security and privacy is very often centralized in the cloud and proprietary. Furthermore, large numbers of insecure devices can be integrated in a botnet and used to run denial of service attacks. To foster trust, the myriad of IoT devices IoT have to be designed and built with security and privacy in mind. As devices become smaller and may only use a limited amount of energy, guaranteeing security becomes a difficult task. Furthermore, the role the edge plays in protecting and scaling IoT devices is largely unclear. This special issue is devoted to all aspects of IoT security and privacy, addressing the threats posed by the widespread use of the IoT. Topics of interest include, but are not limited to: • Security and privacy solutions for the IoT • Secure and privacy-enhancing protocols for the IoT • Distributed security for the cloud, the edge, and IoT devices • Mitigation of security risks posed by large numbers of insecure devices. • “Successful” attack instances in today’s IoT and proposed mitigations • Threat models and attack strategies in the IoT • Malware and intrusion detection for the IoT • Trust and collaboration among IoT devices • Security management that supports scalable IoT security • Self-healing and attack resilience for the IoT • Industrial case studies and best practices including large-scale IoT test beds • Embedded security and hardware security mechanism for protecting the IoT ________________________________________ Submission, Review, and Selection Submitted articles must be original, unpublished, and not currently under review by other journals. Submitted articles must be written clearly, in good English, and should not exceed 20 pages (double-spaced). If a preliminary version of the paper was published in conference proceedings, the authors must clearly state this during the submission and the submitted manuscript must be a substantial extension of the earlier manuscript. In this case, the authors are also required to clearly explain the enhancements made in the journal version. Manuscripts should be submitted online through the Elsevier Editorial System http://ees.elsevier.com/comnet/ and authors should select “IoT Security” as the article type for submission. Each submission will undergo a quick evaluation of its fit to the call, then a conference-style review by the members of the program committee, and a first feedback to authors with rejection, acceptance, or revision decision. If required, we plan shepherding papers that are conditionally accepted. The reviewers will check revised versions and a final decision will be made. ________________________________________ Important dates: • Deadline for submission: August 06, 2018 • Feedback to authors: September 15, 2018 • Final version: October 15 2018 • Final decision: November 01 2018 ________________________________________ Editorial Board • David Barrera (Polytechnique Montreal) • Frank Piessens (KU Leuven) • Hsu-Chun Hsiao (National Taiwan University) • Kapil Singh (IBM Research) • Mauro Conti (University of Padua) • Nils Ole Tippenhauer (Singapore University) • Nuno Neves (Universidade de Lisboa) • Rodrigo Roman (Univ. Malaga) • Samuel Marchal (Aalto University) • Yier Jin (Univ. Florida) Guest Editors: • Andreas Wespi, IBM Zurich Research Laboratory, Switzerland • Matthias Schunter, Intel Labs, Germany |
|