IoT-Secure 2016 - International Workshop on Security in the IoT with Real-Time and Energy constraints (IoT-Secure 2016)
Topics/Call fo Papers
International Workshop on Security in the IoT with Real-Time and Energy constraints (IoT-Secure 2016)
http://icacci-conference.org/2016/tracks#11
In conjunction with ICACCI-2016, the 5th International Conference on Advances in Computing, Communications and Informatics, September 21-24, Jaipur, India.
ICACCI-2016 is technically co-sponsored by IEEE Communications Society and IEEE Systems, Man, and Cybernetics Society. The Conference is technically supported by IEEE SMCS Technical Committee on Soft Computing, IEEE ComSoc Internet Technical Committee (ITC) and IEEE ComSoc Technical Committee on Green Communications and Computing (TCGCC).
*Introduction*
Devices we use every day are becoming connected entities across the planet. The so-called IoT includes technologies which combine autonomous embedded sensory objects with communication intelligence. Most of applications in the IoT have consequently strong real time requirements and energy limitations. Moreover, the IoT can be affected by various categories of security: access to intellectual property, sabotage, espionage, cyber terrorism in critical infrastructures such as nuclear plants, railways and traffic monitoring. This imposes to design new cryptographic methods which are efficient both in terms of security, energy consumption and time overhead.
*Scope*
The focus and scope of IoT-Secure 2016 is solely on the security aspects of the Internet of Things which have strong real-time constraints and energy limitations. We will welcome papers both from theoretical and practical aspects. Prospective authors are invited to submit original, previously unpublished work, reporting on novel and significant research contributions, on-going research projects, experimental results and recent developments related to, but not limited, the following topics:
* Cyber-physical threats, vulnerability analysis, and countermeasures
* Critical infrastructure protection
* Communication overhead
* Energy-efficiency in security management
* Lightweight Encryption
* Real-Time Applications
* Real-time cryptosystem based on chaotic systems
* Security challenges in the Internet of Things
* Security and privacy of mobile systems
* Security in highly resource-constrained network
* Sensor network security
* Security Protocols for Sensor Networks
* Wireless communications security
* Important Dates *
Paper Submission: May 20, 2016
Author Notification: June 30, 2016
Final Manuscript Due: July 15, 2016
* Submission*
You should make your submissions through EDAS. https://edas.info/newPaper.php?c=22226
Unregistered authors should first create an account on EDAS to log on. The workshop only accepts full manuscripts in the standard IEEE camera-ready format (double column, 10-point font) with minimum 3 pages and maximum 5 pages.
* Publication*
Accepted and presented papers will be published in the ICACCI 2016 Proceedings which will be available through IEEE Xplore® after the conference.
* Registration*
Registration will be done through ICACCI-2016 registration system.
* Workshop organizers*
Maryline Chetto, University of Nantes, France, IRCCyN laboratory maryline.chetto-AT-univ-nantes.fr
Safwan El Assad, University of Nantes, France, IETR laboratory safwan.elassad-AT-univ-nantes.fr
* Program committee *
Olivier Deforges, INSA de Rennes, IETR, France
Wassim Hamidouche, INSA de Rennes, IETR, France
Audrey Queudet, University of Nantes, France
Santo Banerjee, University Putra Malaysia, Malaysia, Malaysia
Thang Hoang, University of Hanoï, Vietnam
Ion Tutanescu, University of Pitesti, Romania
Bassem Bakhache, Lebanese University, Lebanon
Mohamad Khalil, Lebanese University, Lebanon
Rima ASSAF, Lebanese University, Lebanon
Relu Tataru, Military Technical Academy, Romania
Ghada Zaibi, ENIS, University of Sfax, Tunisia
Ons Jallouli, University of Nantes, France
Mohammad Abu Taha, University of Nantes, France
Daniel Caragata, University of Valparaíso, Chile
Dalia Battikh, Lebanese University, Lebanon
Nabil Abdoun, University of Nantes, France.
http://icacci-conference.org/2016/tracks#11
In conjunction with ICACCI-2016, the 5th International Conference on Advances in Computing, Communications and Informatics, September 21-24, Jaipur, India.
ICACCI-2016 is technically co-sponsored by IEEE Communications Society and IEEE Systems, Man, and Cybernetics Society. The Conference is technically supported by IEEE SMCS Technical Committee on Soft Computing, IEEE ComSoc Internet Technical Committee (ITC) and IEEE ComSoc Technical Committee on Green Communications and Computing (TCGCC).
*Introduction*
Devices we use every day are becoming connected entities across the planet. The so-called IoT includes technologies which combine autonomous embedded sensory objects with communication intelligence. Most of applications in the IoT have consequently strong real time requirements and energy limitations. Moreover, the IoT can be affected by various categories of security: access to intellectual property, sabotage, espionage, cyber terrorism in critical infrastructures such as nuclear plants, railways and traffic monitoring. This imposes to design new cryptographic methods which are efficient both in terms of security, energy consumption and time overhead.
*Scope*
The focus and scope of IoT-Secure 2016 is solely on the security aspects of the Internet of Things which have strong real-time constraints and energy limitations. We will welcome papers both from theoretical and practical aspects. Prospective authors are invited to submit original, previously unpublished work, reporting on novel and significant research contributions, on-going research projects, experimental results and recent developments related to, but not limited, the following topics:
* Cyber-physical threats, vulnerability analysis, and countermeasures
* Critical infrastructure protection
* Communication overhead
* Energy-efficiency in security management
* Lightweight Encryption
* Real-Time Applications
* Real-time cryptosystem based on chaotic systems
* Security challenges in the Internet of Things
* Security and privacy of mobile systems
* Security in highly resource-constrained network
* Sensor network security
* Security Protocols for Sensor Networks
* Wireless communications security
* Important Dates *
Paper Submission: May 20, 2016
Author Notification: June 30, 2016
Final Manuscript Due: July 15, 2016
* Submission*
You should make your submissions through EDAS. https://edas.info/newPaper.php?c=22226
Unregistered authors should first create an account on EDAS to log on. The workshop only accepts full manuscripts in the standard IEEE camera-ready format (double column, 10-point font) with minimum 3 pages and maximum 5 pages.
* Publication*
Accepted and presented papers will be published in the ICACCI 2016 Proceedings which will be available through IEEE Xplore® after the conference.
* Registration*
Registration will be done through ICACCI-2016 registration system.
* Workshop organizers*
Maryline Chetto, University of Nantes, France, IRCCyN laboratory maryline.chetto-AT-univ-nantes.fr
Safwan El Assad, University of Nantes, France, IETR laboratory safwan.elassad-AT-univ-nantes.fr
* Program committee *
Olivier Deforges, INSA de Rennes, IETR, France
Wassim Hamidouche, INSA de Rennes, IETR, France
Audrey Queudet, University of Nantes, France
Santo Banerjee, University Putra Malaysia, Malaysia, Malaysia
Thang Hoang, University of Hanoï, Vietnam
Ion Tutanescu, University of Pitesti, Romania
Bassem Bakhache, Lebanese University, Lebanon
Mohamad Khalil, Lebanese University, Lebanon
Rima ASSAF, Lebanese University, Lebanon
Relu Tataru, Military Technical Academy, Romania
Ghada Zaibi, ENIS, University of Sfax, Tunisia
Ons Jallouli, University of Nantes, France
Mohammad Abu Taha, University of Nantes, France
Daniel Caragata, University of Valparaíso, Chile
Dalia Battikh, Lebanese University, Lebanon
Nabil Abdoun, University of Nantes, France.
Other CFPs
Last modified: 2016-02-28 23:04:15