posted by user: schunter || 7481 views || tracked by 13 users: [display]

Journal of Computer Networks 2018 : Special Issue: Security and Privacy for the Internet of Things, Elsevier Journal of Computer Networks

FacebookTwitterLinkedInGoogle

Link: https://www.journals.elsevier.com/computer-networks/call-for-papers/special-issue-security-privacy-internet-of-things
 
When Dec 1, 2018 - Dec 2, 2018
Where Journal
Submission Deadline Aug 6, 2018
Notification Due Sep 15, 2018
Final Version Due Oct 15, 2018
Categories    security   internet of things   privacy
 

Call For Papers

Special Issue: Security and Privacy for the Internet of Things

Elsevier Journal of Computer Networks
- The International Journal of Computer and Telecommunications Networking
________________________________________
Scope

The Internet of Things (IoT) is rapidly evolving from theory to real-life and large scale deployments. Examples include smart homes, industrial manufacturing, distributed sensing and tracking for logistics, and monitoring for transportation systems. While some IoT devices today provide basic security protection, security and privacy is very often centralized in the cloud and proprietary. Furthermore, large numbers of insecure devices can be integrated in a botnet and used to run denial of service attacks.
To foster trust, the myriad of IoT devices IoT have to be designed and built with security and privacy in mind. As devices become smaller and may only use a limited amount of energy, guaranteeing security becomes a difficult task. Furthermore, the role the edge plays in protecting and scaling IoT devices is largely unclear.
This special issue is devoted to all aspects of IoT security and privacy, addressing the threats posed by the widespread use of the IoT.

Topics of interest include, but are not limited to:
• Security and privacy solutions for the IoT
• Secure and privacy-enhancing protocols for the IoT
• Distributed security for the cloud, the edge, and IoT devices
• Mitigation of security risks posed by large numbers of insecure devices.
• “Successful” attack instances in today’s IoT and proposed mitigations
• Threat models and attack strategies in the IoT
• Malware and intrusion detection for the IoT
• Trust and collaboration among IoT devices
• Security management that supports scalable IoT security
• Self-healing and attack resilience for the IoT
• Industrial case studies and best practices including large-scale IoT test beds
• Embedded security and hardware security mechanism for protecting the IoT

________________________________________
Submission, Review, and Selection

Submitted articles must be original, unpublished, and not currently under review by other journals. Submitted articles must be written clearly, in good English, and should not exceed 20 pages (double-spaced). If a preliminary version of the paper was published in conference proceedings, the authors must clearly state this during the submission and the submitted manuscript must be a substantial extension of the earlier manuscript. In this case, the authors are also required to clearly explain the enhancements made in the journal version.
Manuscripts should be submitted online through the Elsevier Editorial System http://ees.elsevier.com/comnet/ and authors should select “IoT Security” as the article type for submission.
Each submission will undergo a quick evaluation of its fit to the call, then a conference-style review by the members of the program committee, and a first feedback to authors with rejection, acceptance, or revision decision. If required, we plan shepherding papers that are conditionally accepted. The reviewers will check revised versions and a final decision will be made.

________________________________________
Important dates:
• Deadline for submission: August 06, 2018
• Feedback to authors: September 15, 2018
• Final version: October 15 2018
• Final decision: November 01 2018

________________________________________
Editorial Board
• David Barrera (Polytechnique Montreal)
• Frank Piessens (KU Leuven)
• Hsu-Chun Hsiao (National Taiwan University)
• Kapil Singh (IBM Research)
• Mauro Conti (University of Padua)
• Nils Ole Tippenhauer (Singapore University)
• Nuno Neves (Universidade de Lisboa)
• Rodrigo Roman (Univ. Malaga)
• Samuel Marchal (Aalto University)
• Yier Jin (Univ. Florida)

Guest Editors:
• Andreas Wespi, IBM Zurich Research Laboratory, Switzerland
• Matthias Schunter, Intel Labs, Germany

Related Resources

IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
ICIME--EI 2025   2025 13th International Conference on Information Management and Engineering (ICIME 2025)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
ICISPP--Ei 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal
BDPC 2025   IEEE--2025 3rd International Conference on Big Data and Privacy Computing (BDPC 2025)
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience
NBIoT 2025   6th International Conference on Networks, Blockchain and Internet of Things