ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

WIIoTS 2018 - Workshop on Industrial Internet of Things Security (WIIoTS)

Date2018-06-04 - 2018-06-06

Deadline2018-02-15

VenueGeneva, Switzerland Switzerland

Keywords

Websitehttps://globaliotsummit.org

Topics/Call fo Papers

The Industrial Internet of Things (IIoT) is an emerging paradigm in today’s (control) industry, comprising Internet-enabled cyber-physical devices with the ability to couple to the new interconnection technologies such as cloud/fog computing. Under this perspective, the new industrial cyber-physical “things” can be accessible and available from remote locations, the information of which can be processed and stored in distributed locations, favoring the cooperation, the performance in field, and the achievement of operational tasks working at optimal times. However, the incorporation of the IIoT in the new scenarios of the fourth industrial revolution, also known as Industry 4.0, entails having to consider the new security and privacy issues that can threaten the wellbeing of the new IIoT ecosystem and its coexistence with the existing industrial technologies, with a high risk of impact on the end-users.
Therefore, this workshop will create a collaboration platform for experts from academia, governments and industry to address the new IIoT security and privacy challenges. Papers related to security and privacy of embedded systems working in industrial and control environments, such as SCADA, smart grid, smart cities, manufacturing systems, water systems, and in critical infrastructures in general, are all welcome at WIIoTS 2018. The technical topics of interest for this workshop include, but are not limited to:
• Interoperable IIoT ecosystem-level security and privacy challenges
• IIoT governance, regulation and standards
• Cross-layer threat modelling in IIoT and risk assessment
• Lightweight cryptography and key management
• Lightweight IIoT security protocols and AAA services for IIoT
• Collaborative and trustworthy IIoT frameworks and architectures
• Privacy-preserving models and anonymization techniques for IIoT
• Secure IIoT data storage and Big Data
• Location privacy and trust management
• Intrusion detection, anomaly diagnosis and situational awareness for IIoT
• Response and resilience to IIoT cyber-attacks
• Incident management and IIoT forensics
• Case studies and practical validations: SCADA, energy, water, smart factory, etc.

Last modified: 2017-12-17 21:23:20