SecRIot 2019: 1st International Workshop on Security and Reliability of IoT Systems Nomikos Conference Center Santorini Island, Greece, May 29-31, 2019 |
Conference website | https://sites.google.com/view/secriot-2019 |
Submission link | https://easychair.org/conferences/?conf=secriot2019 |
Submission deadline | March 18, 2019 |
The next years more than 20 billion devices will be interconnected. The Internet of Things provides unparallelled opportunities for the development of new novel services. Currently most of the new electronic devices are offering from basic to advanced networking capabilities in the context of smart environments. Newer vehicles are partially or completely autonomous, powered by modern microprocessors, hundreds of sensors and Internet enabled services. The same applies to robotic and medical devices and almost every other advanced equipment. Despite the longstanding efforts of the scientific community to secure Internet and Network communications, Operating Systems and Software Applications only a limited amount of this knowledge has been applied to the IoT ecosystems. Most of the IoT devices, including modern vehicles suffer from numerous and multilayered vulnerabilities. Default, weak or no password authentication for remote connections, unencrypted traffic or obsolete and insecure cryptographic algorithms, outdated, unmanaged and vulnerable software are among the most serious problems of the IoT landscape. Even more alarming is the unregulated manufacturing process of many IoT constructors. Aiming to reduce the cost and minimize the time to market of their products, minimal or none effort is put to secure and support them sufficiently. Worse, there are recorded cases of IoT devices delivered with preinstalled malware that demonstrate total lack of operations security in the supply chain. In contrary to software applications in PCs and mobile devices, the owners are not likely to replace their devices because of security problems. As consequence these systems remain vulnerable for extended periods. Recent very large scale DDoS attacks based and executed entirely by IoT Botnets, signify the magnitude of the problem.
The aim of this workshop is to bring together researchers and professionals that are responsible for the secure design, deployment and operation of current and future IoT systems. Topics of interest include, but are not limited to:
- IoT Security and Privacy
- IoT Intrusion Detection and Prevention Systems
- Cyber Physical Security and IoT
- Secure Design Methodologies for IoT Systems
- Secure Hardware and Software Codesign
- Development of Secure Embedded Systems
- Secure Embedded Operation Systems
- IoT Malware
- Autonomous Vehicles Cybersecurity
- Secure Network Protocols for IoT Systems
- IoT and Blockchain
- Secure Manufacturing Process of IoT Devices
- Privacy Protection in IoT Environments
- Security and Privacy of Medical Devices
- IoT Trust and Reliability
- Reliable Robotic Devices
Submission Guidelines
Prospective authors are invited to submit high-quality original technical papers reporting original research of theoretical or applied nature for presentation at the workshop and publication in the WPSN 2019 Proceedings. All papers will be reviewed and evaluated by independent experts and selected based on their originality, merit, and relevance to the workshop. Accepted and presented papers will be published as part of the DCOSS 2019 conference proceedings.
Note that the workshop follows single-blind review policy. The names and affiliations of all the authors must be presented in the submitted manuscript.
No-show papers submitted by authors who did not present the paper in-person will not be included in the workshop proceedings. No refund of the paid fees can be claimed by the no-show author. Presentations by proxies are not allowed, unless explicitly approved by the organizers.
The manuscripts must be prepared in English, following the IEEE two-column Manuscript Templates for Conference Proceedings (available here) with a maximum length of eight (8) printed pages including text, figures, and references. Authors may add at most two (2) pages, but only for an appendix, i.e. these two pages contain supplementary material only. The additional two pages will incur overlength charges at $100/page.
List of Topics
- IoT
- Security
- Embedded Systems
- Reliability
- Trust
Venue
The conference will be held in Nomikos Conference Center.
Contact
All questions about submissions should be emailed to Ms. Kyriaki Chantzi.