Track 3: Call for Paper

Internet of Things (IoT) is a rapidly developing research area cross various technological fields including computer science, electronic engineering, mobile and wireless communications, embedded systems, etc. Many technologies serve as the building blocks of this new paradigm, such as wireless sensor networks (WSN), RFID, cloud services, machine-to-machine interfaces (M2M), and so on. However, IoT introduces new challenges for the security of systems and processes and the privacy of individuals. Protecting the information in IoT is a complex and difficult task. IoT requires global connectivity and accessibility which means anyone can access in anytime and anyway. It results in that the number of attack vectors available to malicious attackers might become staggering. Furthermore, the inherent complexity of the IoT, where multiple heterogeneous entities located in different contexts can exchange information with each other, further complicates the design and deployment of efficient, interoperable and scalable security mechanisms. The ubiquitous and clouding computing also makes the problem of privacy leakage get urgent. As a result, there is an increasing demand for development of new security and privacy approaches to guarantee the security, privacy, integrity and availability of resources in IoTs.

Topics of Interest: We invite authors from academia and industry to submit their original research as well as review articles to present latest progresses for current development or future goals in this field.Interest include, but are not limited to:
- Cyber security in the IoT
- Secure policy, model and architecture for the IoT
- Security and privacy for the IoT network and systems
- Secure communication technologies for the IoT
- Security and privacy in sensor networks applied to the IoT
- Intrusion detection and avoidance techniques for the IoT
- Identity, authentication, authorization and accounting techniques for the IoT
- Threat and vulnerability modeling for the IoT
- Lightweight cryptographic solutions for the IoT
- Key agreement, distribution and management techniques for the IoT
- Trust establishment, negotiation and management techniques for the IoT
- Trusted network computing, operating systems, software and applications for the IoT
- Risk and reputation management techniques for the IoT
- Secure network protocols and frameworks for the IoT
- Secure access control technologies and frameworks for the IoT
- Secure solutions for realization of IoT