IoTSP-2021: Internet of Things Security and Privacy: Practical and Management Perspectives |
Website | http://staff.www.ltu.se/~ismawa/iotsp/ |
Submission link | https://easychair.org/conferences/?conf=iotsp2021 |
Submission deadline | October 1, 2021 |
Call for Book Chapters
Internet of Things Security and Privacy: Practical and Management Perspectives
Aims and Scope:
The Internet of Things (IoT) is an emerging paradigm due to extensive developments in information and communication technology (ICT). The purpose of IoT is to expand the functions of the first version of the Internet by increasing the ability to connect numerous objects. The wide facilities offered by IoT and other sensing facilities have led to a huge amount of data generated from versatile domains, thus, cybersecurity has become an inevitable requirement not only for personal safety but also for assuring the sustainability of the IoT paradigm itself. From the perspective of the organizational technology layer, attack surfaces have dramatically expanded (e.g., new entry points from endpoints and legacy devices, more vulnerable industrial control systems without suitable cybersecurity solutions, more proprietary software that is hard to update and patch, and poor security design), whereas security countermeasures have developed comparatively slowly.
This edited book will encompass both management and technical cybersecurity and privacy (including compliance) research in the IoT domain. Of particular interest is research that integrates management and technical approaches to IoT security and privacy; research that studies the real-world problem of IoT security in organizations, and research that contributes sound practical advice to industry. The topics covered by the book will present a collection of high-quality research works concerning IoT architecture, security techniques, and application areas. These will make the book unique in its contents and theme.
The book outlines key emerging trends in IoT security and privacy that span the entire IoT architecture (perception, network, and applications) layers, with a focus on different critical IoT applications such as smart homes and cities, e-health, critical infrastructure, and industrial IoT (IIoT) applications. The state-of-the-art body of knowledge presented in this book is a vital need for researchers, practitioners, and postgraduate students in the IoT development and deployment domains.
Topics of interest include, but not limited to:
Practical Security and Privacy Perspectives:
- IoT devices and protocols security
- Attack detection and prevention in IoT
- Privacy-preserving techniques in IoT
- Secure integration of IoT and cloud /Edge computing
- Machine learning techniques for IoT security
- Secure network architecture for IoT
- Secure data management approaches
- Security in cyber-physical systems
- Authentication and access control
- Blockchain technologies for reliable and trustworthy IoTs
Management Security and Privacy Perspectives:
- Cybersecurity prevention and response strategies
- Emergent cybersecurity risks arising from IoT-enabled 5G
- Situation awareness of IoT environment
- Risk identification, assessment, and mitigation
- Governance, policy, and compliance
- Awareness and training approaches
- Security architecture and frameworks
- Threat and vulnerability analysis
Publication Schedule:
The tentative schedule of the book publication is as follows:
- Deadline for chapter submission: October 01, 2021
- Author notification: December 01, 2021
- Final version due: February 01, 2022
- Acceptance notification: February 15, 2022
- Publication date: Second quarter of 2022
Submission Procedure:
- The optimum manuscript length is 20-30 A4 pages.
- The publication of the accepted chapters will be free of charge.
- Submitted manuscripts should conform to the author’s guidelines of the CRC Press mentioned in the following two points.
- Latex is the preferable word processing tool for preparing the chapters (Template, Instructions).
- MS Word is an acceptable word processing tool for preparing the chapters (Template, Instructions).
Book Editors:
Ali Ismail Awad (ResearchGate, Google Scholar) Department of Computer Science, Electrical and Space EngineeringLuleå University of TechnologyLuleå, Sweden, E-mail: ali.awad[at]ltu.se
Atif Ahmad (ResearchGate, Google Scholar) School of Computing and Information SystemsUniversity of MelbourneMelbourne, Australia, E-mail: atif[at]unimelb.edu.au
Kim-Kwang Raymond Choo (ResearchGate, Google Scholar) Cloud Technology Endowed ProfessorThe University of Texas at San AntonioTexas, USA, E-mail: raymond.choo[at]fulbrightmail.org
Saqib Hakak (ResearchGate, Google Scholar) Canadian Institute for Cybersecurity (CIC)Faculty of Computer ScienceUniversity of New Brunswick (UNB)Fredericton, Canada, E-mail: saqib.hakak[at]unb.ca
Mohsen Guizani (Google Scholar) College of EngineeringQatar UniversityDoha, Qatar, mE-mail: mguizani[at]qu.edu.qa