Workshop to be held in conjunction with the 10th IEEE International Conference on Internet of Things (iThings 2017)
Welcome to SITN-2017 workshop!
The Internet of Things (IoT) presents unprecedented opportunities for building smart society. Big data collected from numerous “Things”, connected across different interfaces and locations, facilitate smarter decision making and personalised services. Although all the hope of anticipated benefits from IoT, security remains a big challenge to overcome. Manufacturers are yet shipping IoT devices with security flaws, which put users or even the other parts of our connected cyber world at risk. Those vulnerable IoT devices would be easily exploited to launch massive cyberattacks to other online services or IT infrastructures. All the privacy, robustness and security issues are challenging the movement towards smart society.
The SITN-2017 workshop is an international event, which aims to bring together expertise from academia and industry to build secure IoT infrastructures for smart society. It also provides a venue for international researchers and leading industrial experts in IoT and cyber-security to establish future partnerships and research collaborations.
The SITN-2017 workshop will be held in University of Exeter and in collaboration with The Edinburgh Napier University, Technical University of Denmark, The Cyber Academy and SICSA on the 21st – 23rd of June 2017 and in parallel with The 10th IEEE International Conference on Internet of Things. All interested stakeholders from academia and industry are invited to submit their original work on building secure IoT infrastructures for Smart Society to the SITN-2017 workshop.
Call for papers:
SITN 2017 will be held on 21-23 June 2017 in Exeter, Devon, UK. Topics of interest include, but are not limited to:
- Threat Models in Internet of Things
- Attack Strategies for Internet of Things
- Security Architectures
- Security in Wireless Sensor Networks
- Reliable Interactions with Network Services
- System and Data Integrity
- Scalability and Robustness for Internet of Things
- Identity Management in Internet of Things
- Trustworthiness in Internet of Things
- Secure Operating Systems
- Secure routing for Internet of Things
- Privacy in Internet of Things
- Adaptive Security in Internet of Things
- Secure IoT interactions
- Secure IoT architecture design
- Digital forensics for IoT
- Malware Detection
- Intrusion Detection and Prevention Systems (IDPS) for IoT
- Dr. Naghmeh Moradpoor; Edinburgh Napier University (ENU), UK
- Dr. Zhiyuan Tan; Edinburgh Napier University (ENU), UK
- Dr. Weizhi MENG; Technical University of Denmark (DTU), Denmark
- Prof. Jiankun Hu, University of New South Wales at the Australian Defence Force Academy, Australia
- Prof. Xiangjian He, University of Technology, Sydney (UTS), Australia
- Prof. Ren Ping Liu, University of Technology, Sydney (UTS), Australia
- Prof. Xinheng Wang, University of the West of Scotland, UK
- Associate Prof. Kim-Kwang Raymond Choo, The University of Texas at San Antonio, USA
- Dr. Shancang Li, University of the West of England, UK
- Dr. Wei Jiang, German Research Centre for Artificial Intelligence, German
- Yan Li, Advanced Digital Sciences Center, Singapore
- Shaoying Cai, Hunan University, China
- Dr. Rameez Asif, Edinburgh Napier University, UK
- Dr. Chunbo Luo, University of Exeter, UK
- Dr. Xavier Bellekens, University of Abertay, UK
|Paper Submission Deadline:||22 March, 2017|
|Authors Notification:||22 April, 2017|
|Camera-Ready Paper Due:||15 May, 2017|
|Early Registration Due:||15 May, 2017|
|Conference Date:||21-23 June, 2017|
Paper submission guideline:
All papers need to be submitted electronically through the workshop submission website with PDF format. The materials presented in the papers should not be published or under submission elsewhere. Extended versions of selected papers will be invited for possible publication in the Journal of Cyber Security Technology. Each paper is limited to 8 pages (or 10 pages with over length charge) including figures and references using IEEE Computer Society Proceedings Manuscripts style (two columns, single-spaced, 10 fonts). You can confirm the IEEE Computer Society Proceedings Author Guidelines here. Manuscript Templates for Conference Proceedings can be found here. Once accepted, the paper will be included into the IEEE conference proceedings published by IEEE Computer Society Press (indexed by EI). At least one of the authors of any accepted paper is requested to register the paper at the workshop.
Journal Special Issue:
Distinguished papers selected from SITN-2017, after further extensions, will be recommended for submission and publication in Journals of Cyber Security Technology.