IoTPST 2017 - 7th International Workshop on Internet on Things: Privacy, Security and Trust (IoTPST)
Topics/Call fo Papers
Internet of Things (IoT) technology, a new paradigm of the development of the Internet, has been developed and applied into cyber-physical social systems such as industrial control systems and healthcare information systems. The growth and application of these IoT devices such as smart phones, sensors, healthcare wearables, connected vehicles, smart home gadgets and appliances are expected to improve the intelligence of cyber physical systems, enhance the reliability, resilience, operational efficiency, and energy efficiency of current information systems while reducing system costs and resource consumption. However, when IoT devices are pervasively used in cyber physical systems, their security, privacy and trustworthiness have become critical issues. In October 2016, 150,000 compromised IoT devices composed of CCTV cameras and digital video recorders were used as botnets by hackers to launch massive and sustained Distributed Denial of Service (DDoS) attacks that have caused outages and network congestion for a large number of websites. By the year 2020, it says that 50 billion devices will be exposed to cyber attacks.
Moreover, specific features such as portability, mobility, and sensitivity of IoT devices, further impose the challenge of security and privacy in those systems. Despite recent advances, many research issues still remain in the design of secure, privacy-preserving, or trust architectures, protocols, algorithms, services, and applications on mobile and wireless systems. For example, when IoT devices have more storage space, high bandwidth, and super sensing capability, more sensitive information will be stored in those devices. On the other hand, operating systems running on those devices are not as powerful and reliable as those on traditional computers. Both OS layer and higher-level layer protocols are expected to enhance the security and preserve the privacy of those devices. With more IoT devices being used in cyber physical social systems, novel trust models are essential for new applications. New cryptographic algorithms, key distribution schemes and access control policies are also encouraged to addressing security issues of IoT special characteristics. Other issues such as malware, cyber threat, intrusion detection, attack modeling, security analysis, identity management and anonymity techniques also need to be revisited in the IoT systems.
This workshop aims to bring together the technologists and researchers who share interest in the area of IoT security, privacy and trust, as well as explore new venues of collaboration. The main purpose is to promote discussions of research and relevant activities in the models and designs of secure, privacy preserving, or trust architectures, protocols, algorithms, services, and applications, as well as analysis on cyber threat in IoT systems. It also aims at increasing the synergy between academic and industry professionals working in this area. We plan to seek papers that address theoretical, experimental research, and work in-progress for IoT security, privacy and trust related issues that include, but are not limited to, the following:
Internet of Things Security
Healthcare Information Systems
Self-protecting computing systems
Cryptography for Mobile and Wireless Systems
Cryptography for Cloud Computing, Fog/Edge Computing
Wireless Local Area Networks
Wireless Sensor Networks
Wireless Mesh Networks
Wireless Ad-hoc Networks
Vehicular Networks
Body-area Networks
Cellular Networks (4G, 5G, …)
WiMAX Networks
Machine to Machine (M2M) Netwroks
Software Defined Networks (SDN)
Social Networks
Smart Grid
RFID-based Systems
Mobile Cloud
Cyber-Physical Systems (CPS)
Internet of Things
Location-based Service Systems
Mobile Healthcare Systems
Smart Building Systems
Big Data
IoT Cyber Security Education
Moreover, specific features such as portability, mobility, and sensitivity of IoT devices, further impose the challenge of security and privacy in those systems. Despite recent advances, many research issues still remain in the design of secure, privacy-preserving, or trust architectures, protocols, algorithms, services, and applications on mobile and wireless systems. For example, when IoT devices have more storage space, high bandwidth, and super sensing capability, more sensitive information will be stored in those devices. On the other hand, operating systems running on those devices are not as powerful and reliable as those on traditional computers. Both OS layer and higher-level layer protocols are expected to enhance the security and preserve the privacy of those devices. With more IoT devices being used in cyber physical social systems, novel trust models are essential for new applications. New cryptographic algorithms, key distribution schemes and access control policies are also encouraged to addressing security issues of IoT special characteristics. Other issues such as malware, cyber threat, intrusion detection, attack modeling, security analysis, identity management and anonymity techniques also need to be revisited in the IoT systems.
This workshop aims to bring together the technologists and researchers who share interest in the area of IoT security, privacy and trust, as well as explore new venues of collaboration. The main purpose is to promote discussions of research and relevant activities in the models and designs of secure, privacy preserving, or trust architectures, protocols, algorithms, services, and applications, as well as analysis on cyber threat in IoT systems. It also aims at increasing the synergy between academic and industry professionals working in this area. We plan to seek papers that address theoretical, experimental research, and work in-progress for IoT security, privacy and trust related issues that include, but are not limited to, the following:
Internet of Things Security
Healthcare Information Systems
Self-protecting computing systems
Cryptography for Mobile and Wireless Systems
Cryptography for Cloud Computing, Fog/Edge Computing
Wireless Local Area Networks
Wireless Sensor Networks
Wireless Mesh Networks
Wireless Ad-hoc Networks
Vehicular Networks
Body-area Networks
Cellular Networks (4G, 5G, …)
WiMAX Networks
Machine to Machine (M2M) Netwroks
Software Defined Networks (SDN)
Social Networks
Smart Grid
RFID-based Systems
Mobile Cloud
Cyber-Physical Systems (CPS)
Internet of Things
Location-based Service Systems
Mobile Healthcare Systems
Smart Building Systems
Big Data
IoT Cyber Security Education
Other CFPs
- 7th Workshop on Industrial Internet of Things Communication Networks – (IioTCom)
- 7th International conference on Internet Technologies & Applications
- 14th International Joint Conference on Computer Science and Software Engineering (JCSSE2017)
- 3rd International Conference on Social Sciences, Humanities & Business 2017
- 2017 International Conference on Earth Science, Energy and Environment Protection
Last modified: 2017-03-13 23:08:08