posted by user: zaigham || 4134 views || tracked by 6 users: [display]

Book-IoTSecurity 2019 : Springer book on: Security Privacy & Trust in IoT

FacebookTwitterLinkedInGoogle

 
When N/A
Where N/A
Submission Deadline Aug 20, 2018
Categories    IOT   security   privacy   trust
 

Call For Papers

CALL FOR BOOK CHAPTERS

***** Security, Privacy and Trust in the IoT Environment *****

Edited by: Professor Zaigham Mahmood
(Univ of Derby UK, Debesis Eduction UK, Shijiazhuang Tiedao Uni China)
To be published by Springer in 2019

***** Chapter Proposal Submission Deadline: 20 August 2018
***** Proposals to be sent to: dr.z.mahmood@hotmail.co.uk

1. Introduction

The Internet of Things (IoT) is a network of devices or “things” connected through wireless and wired connections that provides a pervasive environment where a person or device can interact at any time with the digital and physical world. With time, the number and variety of such devices is on the increase; devices themselves are getting smarter than before; and users’ expectations in terms of adaptive and self-governing environments are also increasing. This connectivity and resulting smarter living, although highly attractive and profitable, has many inherent issues as well. The most challenging of these relate to the privacy/security of data, user trust in systems, and user authentication mechanisms. This requires novel network architectures and middleware platforms deploying new emerging communication technologies, adoption of novel context-aware connectivity approaches, and automation of connectivity of a diverse range of tools and devices - ensuring that IoT has a seamless connectivity of devices, and interaction between devices is trust worthy from users’ perspective.

2. Suggested Topics

Focus of the book is on the issues of privacy, security and trust relating to IoT environments; and technical solutions to address the key challenges. Some of the relevant topics include the following:

Context based security, privacy and trust issue in IoT environment
Connectivity issues due to pervasiveness of digital devices
Trusted computing – as security protection solution
Cryptography – as security protection solution
Challenges due to scalability, harmonisation and homogeneity
Security/privacy frameworks and trust methodologies
Limitations of orchestration and integration of services in IoT environment
Automation of security/privacy methods and technologies
Coupling between smart devices and physical environment
Vulnerabilities in critical infrastructures (energy, telecom, utilities)
Open issues relating to reliability and availability of devices and services
Device authentication and trust mechanisms in the context of IoT
Anonymisation of user data and protocol metadata
Security/privacy issues of scalability of devices, secure setup and configuration
Methodologies for role based and attribute-based access controls
M2M interactions and trustworthiness of connectivity
Issues due to hybridised man-machine interactions for smart environments
Analysis/measurement of trust in digital interactions
Current developments in security/privacy maturity models and frameworks
Cyber security technologies and frameworks for IoT infrastructures
Threat modelling to validate security approaches for distributing computing
Secure coding and vulnerability testing in relation to IoT connectivity
Privacy and data protection regulations and safeguards
Security testing of devices’ connectivity in the IoT paradigm
Connectivity issues relating to diversity of IoT devices
Alternative IoT architectures from security, privacy, trust perspective
Security/privacy/trust solutions for IoT layers (device, gateway/fog, edge/cloud, application)
Open issues and solutions to attacks on infrastructures control systems
Big Data challenges, inherent issues and solutions in the IoT context

3. Aim and Objectives

The aim of the proposed book is to report and discuss the related topics to benefit other researchers/practitioners as well as to advance the existing body of knowledge in the proposed subject area. The objectives are:
· To capture latest research and report on challenges and solutions with respect to privacy, security and trust in the IoT vision
· To present case Studies, balanced view of inherent issues, and identify further research directions and technologies in this area

4. Submission Procedure

Researchers and practitioners are invited to submit 1-2-page chapter proposals clearly stating the objective, scope and structure of the proposed chapters - by the deadline mentioned above. Authors of accepted proposals will be notified within two weeks (in most cases) and given guidelines for full chapter preparation. Completed chapters should be approximately 10,000 words or 20 pages in length – longer chapters will also be acceptable. Full chapters will be reviewed following a double-blind peer review process to ensure relevance, quality, originality and high information content. Proposals (and full chapters, after the acceptance of the proposal), in the form of WORD files, should be sent to: dr.z.mahmood@hotmail.co.uk

5. Important dates

· Chapter proposals due date: 20 August 2018
· Notification of acceptance: within 2 weeks of receipt of proposals
· Full chapters due date: within 6 weeks of acceptance notification
· Chapter reviews feedback: within 2 months of chapters due date
· Revised chapters due date: within 3 weeks of review feedback
· Manuscript submission to Springer: February 2019

For Enquiries:
Please contact the editor: dr.z.mahmood@hotmail.co.uk

.-------------------------------------------------------------------------------------

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
The Mississippi River: A Cultural Artery 2025   Call for Papers: The Mississippi: Soundings on America’s Arterial River
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
ICISPP--Ei 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)
CSF 2025   38th IEEE Computer Security Foundations Symposium - deadline 3
Call for Book Chapter 2024   Call for Chapters for Four Books of the Springer Edited Book Series “Decision Sciences and Data Analytics for Operations and Business Excellence”