| |||||||||||
Book-IoTSecurity 2019 : Springer book on: Security Privacy & Trust in IoT | |||||||||||
| |||||||||||
Call For Papers | |||||||||||
CALL FOR BOOK CHAPTERS
***** Security, Privacy and Trust in the IoT Environment ***** Edited by: Professor Zaigham Mahmood (Univ of Derby UK, Debesis Eduction UK, Shijiazhuang Tiedao Uni China) To be published by Springer in 2019 ***** Chapter Proposal Submission Deadline: 20 August 2018 ***** Proposals to be sent to: dr.z.mahmood@hotmail.co.uk 1. Introduction The Internet of Things (IoT) is a network of devices or “things” connected through wireless and wired connections that provides a pervasive environment where a person or device can interact at any time with the digital and physical world. With time, the number and variety of such devices is on the increase; devices themselves are getting smarter than before; and users’ expectations in terms of adaptive and self-governing environments are also increasing. This connectivity and resulting smarter living, although highly attractive and profitable, has many inherent issues as well. The most challenging of these relate to the privacy/security of data, user trust in systems, and user authentication mechanisms. This requires novel network architectures and middleware platforms deploying new emerging communication technologies, adoption of novel context-aware connectivity approaches, and automation of connectivity of a diverse range of tools and devices - ensuring that IoT has a seamless connectivity of devices, and interaction between devices is trust worthy from users’ perspective. 2. Suggested Topics Focus of the book is on the issues of privacy, security and trust relating to IoT environments; and technical solutions to address the key challenges. Some of the relevant topics include the following: Context based security, privacy and trust issue in IoT environment Connectivity issues due to pervasiveness of digital devices Trusted computing – as security protection solution Cryptography – as security protection solution Challenges due to scalability, harmonisation and homogeneity Security/privacy frameworks and trust methodologies Limitations of orchestration and integration of services in IoT environment Automation of security/privacy methods and technologies Coupling between smart devices and physical environment Vulnerabilities in critical infrastructures (energy, telecom, utilities) Open issues relating to reliability and availability of devices and services Device authentication and trust mechanisms in the context of IoT Anonymisation of user data and protocol metadata Security/privacy issues of scalability of devices, secure setup and configuration Methodologies for role based and attribute-based access controls M2M interactions and trustworthiness of connectivity Issues due to hybridised man-machine interactions for smart environments Analysis/measurement of trust in digital interactions Current developments in security/privacy maturity models and frameworks Cyber security technologies and frameworks for IoT infrastructures Threat modelling to validate security approaches for distributing computing Secure coding and vulnerability testing in relation to IoT connectivity Privacy and data protection regulations and safeguards Security testing of devices’ connectivity in the IoT paradigm Connectivity issues relating to diversity of IoT devices Alternative IoT architectures from security, privacy, trust perspective Security/privacy/trust solutions for IoT layers (device, gateway/fog, edge/cloud, application) Open issues and solutions to attacks on infrastructures control systems Big Data challenges, inherent issues and solutions in the IoT context 3. Aim and Objectives The aim of the proposed book is to report and discuss the related topics to benefit other researchers/practitioners as well as to advance the existing body of knowledge in the proposed subject area. The objectives are: · To capture latest research and report on challenges and solutions with respect to privacy, security and trust in the IoT vision · To present case Studies, balanced view of inherent issues, and identify further research directions and technologies in this area 4. Submission Procedure Researchers and practitioners are invited to submit 1-2-page chapter proposals clearly stating the objective, scope and structure of the proposed chapters - by the deadline mentioned above. Authors of accepted proposals will be notified within two weeks (in most cases) and given guidelines for full chapter preparation. Completed chapters should be approximately 10,000 words or 20 pages in length – longer chapters will also be acceptable. Full chapters will be reviewed following a double-blind peer review process to ensure relevance, quality, originality and high information content. Proposals (and full chapters, after the acceptance of the proposal), in the form of WORD files, should be sent to: dr.z.mahmood@hotmail.co.uk 5. Important dates · Chapter proposals due date: 20 August 2018 · Notification of acceptance: within 2 weeks of receipt of proposals · Full chapters due date: within 6 weeks of acceptance notification · Chapter reviews feedback: within 2 months of chapters due date · Revised chapters due date: within 3 weeks of review feedback · Manuscript submission to Springer: February 2019 For Enquiries: Please contact the editor: dr.z.mahmood@hotmail.co.uk .------------------------------------------------------------------------------------- |
|