In our daily life we interact with lots of IT devices. We use these connected devices for lots of purposes such as to access documents in the cloud, visualize photos, measure the temperaturein a smart home, etc. This trend has been called Internet of Things (IoT).
The potential use cases for IoT are quite varied. For example, IoT can be used in the healthcaresector to monitor body functions in a remote way. Another scenario which is attracting attentionis the interconnection of vehicles, forming a particular type of network referred to as VANET. This enables driving vehicles to enjoy advanced safety-related, traffic management orinfotainment services.
Despite the huge amount of benefits that these devices and networks provide, security andprivacy cannot be taken for granted. In an era in which our data lives in the cloud and it isshared among many people and devices, security and privacy are key pieces of the jigsaw. Even more, the widespread interest in the IoT and its associated technologies (RFID, NFC, etc.)and the criticality of their applications (medical, monitoring, etc.) call for developing tailoredapproaches suitable for their constrained resources. Thus, the time is now for searching fornovel approaches in this regard.
The workshop targets to address novel approaches in security and privacy in the field. Expected contributions have to identify novel models, techniques, protocols, algorithms or architectures, etc. that provide the said properties. Papers focusing on particular IoT settings (e.g. healthcare, vehicular networks, etc.) fall within the scope. As a difference with other venues, controversial approaches (i.e., those that are based on opposite foundations as the mainstream) are welcome. Position papers and work in progress submissions will also be considered.
Scientists and practitioners all over the world are invited to take part in this Workshop. Proposals which include an implementation and evaluation of the proposed approach would stand out over the rest.
Selected (and presented) papers, after further extensions, will be published in the Special Issue of the SePrIoT conference in the Mobile Networks and Applications Journal. Furthermore, other outstanding papers will be considered for publication in the EAI Endorsed Transactions on Security and Safety.
TOPICS
Privacy and anonymity in the IoT
Authentication and access control in the IoT
Confidentiality in the IoT
Trust in the IoT
Risk management/ assessment in the IoT
Security architectures in the IoT
Hardware security for the IoT
Cryptographic algorithms in the IoT
Secure and private location-based services for the IoT
Novel applications, services and secure mechanisms for IoT-enabled settings (e.g.healthcare services, VANETs, etc.)
10月22日
2017
10月24日
2017
初稿截稿日期
初稿录用通知日期
终稿截稿日期
注册截止日期
留言