posted by organizer: afurfaro || 1215 views || tracked by 5 users: [display]

IoT&Security 2022 : 1st International Workshop on IoT and Security

FacebookTwitterLinkedInGoogle

Link: http://cyber-science.org/2022/assets/files/ws-ss/dasc/IoT&Security2022_CFP.pdf
 
When Sep 12, 2022 - Sep 12, 2022
Where Calabria,Italy
Submission Deadline Jun 1, 2022
Notification Due Jul 1, 2022
Final Version Due Jul 15, 2022
Categories    IOT   intrusion detection systems   security
 

Call For Papers

Call for Papers


1st International Workshop on IoT and Security (IoT&Security)


** Deadline Abstract Submission: June 1st 2022 **


[Apologies for cross and multiple postings]


-------------------------------------------------------------------------------------------------------------------








Co-located with IEEE DASC 2022


Workshop date: 12nd Sept 2022 (TO BE CONFIRMED)


(Conference: 12nd-15th of Sept, 2022)


Calabria, Italy





-------------------------------------------------------------------------------------------------------------------








IMPORTANT DATES








Papers Submission due: June 1, 2022


Authors Notification: July 1, 2022


Camera-ready Submission: July 15, 2022



SCOPE


The proliferation of IoT devices in everyday human life has made their security a critical requirement. Currently those devices are not very secure because of several reasons. First, manufacturers do not account much for security, releasing products that are vulnerable to attacks, thus leaving users with security issues that are unlikely to be resolved. Second, many IoT devices do not have enough computing power to run an antivirus or even do not allow one to install an antivirus. Finally, the heterogeneity which characterizes the IoT in terms of applications, hardware, and software, expands the attack surface, while at the same time increases the difficulty of deploying all-encompassing security solutions. Despite some sort of security provided by IoT enabling technologies (e.g., communication protocols), or by intrusion prevention systems (e.g., network firewalls), attackers still find ways to compromise devices, or the communication between them. Unlike laptop and desktop computers (which have frequent on-off cycles), many IoT devices such as webcams and wireless routers operate 24/7 unattended. This makes IoT devices particularly prone to various attacks, such as attacks aiming at recruiting devices for botnets. This makes IoT networks dangerous not only for themselves but also for remote systems that are victims of attacks launched by infected IoT devices. Moreover, IoT-based systems that handle sensitive data (e.g., healthcare IS) need to promptly react to malicious activities in order to prevent private data from leaving the network. IoT networks, thus, must be equipped with some sort security mechanism, such as intrusion detection systems, intrusion prevention systems, attack reaction systems, proactive defense mechanisms, etc.








TOPICS








The main topics include but are not limited to:


- Intrusion Detection Systems (Machine learning based IDS; Host-based IDS; Network-based IDS; Anomaly-based IDS; Signature-based IDS; Specification-based IDS; Distributed IDS; Privacy preserving IDS)


- Malware/Botnet detection


- Security for VANETS/MANETS


- Security for IoT-based systems (industrial control, healthcare monitoring, Cyber Physical Systems, domotic)


- Security for cloud-based IoT applications


- Security at the edge/fog


- Attack detection and countermeasures


- Game theory for the IoT security


- Security resources placement strategies


- Security for software defined IoT networks


- Security for narrowband IoT networks


- Security for SCADA-based systems


- IoT firmware analysis


- Automatic exploit generation for IoT devices


- Side channel attacks for IoT devices


- Cryptography for IoT


- Tamperproofing techniques for IoT




















SUBMISSION and Camera Ready Preparation


Please refer to the conference submission link below: (http://cyber-science.org/2022/dasc/papersubmission/)








General Chairs








Antonella Guzzo, University of Calabria, Italy


Michele Ianni, University of Calabria, Italy


Antonino Rullo, University of Calabria, Italy


Angelo Furfaro, University of Calabria, Italy








Program Committee








Amit Kumar Singh, National Institute of Technology Patna, India


Andrea Pugliese, University of Calabria, Italy


Areeba Umair, Federico II University, Italy


Carmelo Felicetti, University of Calabria, Italy


Claudia Greco, University of Calabria, Italy


Edoardo Serra, Boise State University, USA


Elio Masciari, Federico II University, Italy


Gianluca Lax, University of Reggio Calabria, Italy


Gwanggil Jeon, Incheon National University, Korea


Lin Yang, Huazhong Agricultural University, China


Marco Fisichella, L3S Research Center of Leibniz University, Germany


Mohammad Mehedi Hassan, King Saudi University, Saudi Arabia


Niccolo' Marastoni, University of Verona, Italy


Zia Ush Shamszaman, Teesside University, United Kingdom

Related Resources

doors 2023   3rd Edge Computing Workshop
CBW 2023   4th International Conference on Cloud, Big Data and Web Services
IoTBDS 2023   8th International Conference on Internet of Things, Big Data and Security
SPIoT 2022   The 11th International Symposium on Security and Privacy on the Internet of Things
IoT special issue 2022   Call for papers on the Special Issue titled Sustainability Privacy-Preserving of IoT-Based Application in Smart Healthcare
CPSIOT 2022   2022 International Conference on Cyber Physical Systems and IoT(CPSIOT 2022)
IJASA 2022   The International Journal of Ambient Systems and applications
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
IEEE CCNC STP-CPS 2023   5th International Workshop on Security Trust Privacy for Cyber-Physical Systems (STP-CPS'23) with IEEE CCNC 2023, 8-11 January, Las Vegas, NV, USA
CBIoT 2023   4th International Conference on Cloud, Big Data and IoT