The 8th International Workshop on Internet on Things: Privacy, Security and Trust IoTPST2018 In Conjunction with ICCCN 2018 http://savannahstate.edu/iotpst/ July 30 -August 2, 2018, Hangzhou, China Internet of Things (IoT) technology, a new paradigm of the development of the Internet, has been developed and applied into cyber-physical social systems such as industrial control systems and healthcare information systems. The growth and application of these IoT devices such as smart phones, sensors, healthcare wearables, connected vehicles, smart home gadgets and appliances are expected to improve the intelligence of cyber physical systems, enhance the reliability, resilience, operational efficiency, and energy efficiency of current information systems while reducing system costs and resource consumption. However, when IoT devices are pervasively used in cyber physical systems, their security, privacy and trustworthiness have become critical issues. In October 2016, 150,000 compromised IoT devices composed of CCTV cameras and digital video recorders were used as botnets by hackers to launch massive and sustained Distributed Denial of Service (DDoS) attacks that have caused outages and network congestion for a large number of websites. By the year 2020, it says that 50 billion devices will be exposed to cyber attacks. Moreover, specific features such as portability, mobility, and sensitivity of IoT devices, further impose the challenge of security and privacy in those systems. Despite recent advances, many research issues still remain in the design of secure, privacy-preserving, or trust architectures, protocols, algorithms, services, and applications on mobile and wireless systems. For example, when IoT devices have more storage space, high bandwidth, and super sensing capability, more sensitive information will be stored in those devices. On the other hand, operating systems running on those devices are not as powerful and reliable as those on traditional computers. Both OS layer and higher-level layer protocols are expected to enhance the security and preserve the privacy of those devices. With more IoT devices being used in cyber physical social systems, novel trust models are essential for new applications. New cryptographic algorithms, key distribution schemes and access control policies are also encouraged to addressing security issues of IoT special characteristics. Other issues such as malware, cyber threat, intrusion detection, attack modeling, security analysis, identity management and anonymity techniques also need to be revisited in the IoT systems. This workshop aims to bring together the technologists and researchers who share interest in the area of IoT security, privacy and trust, as well as explore new venues of collaboration. The main purpose is to promote discussions of research and relevant activities in the models and designs of secure, privacy preserving, or trust architectures, protocols, algorithms, services, and applications, as well as analysis on cyber threat in IoT systems. It also aims at increasing the synergy between academic and industry professionals working in this area. We plan to seek papers that address theoretical,

experimental research, and work in-progress for IoT security, privacy and trust related issues that include, but are not limited to, the following: • • • • • • • • • • • •

Internet of Things Security Healthcare Information Systems Self-protecting computing systems Cryptography for Mobile and Wireless Systems Cryptography for Cloud Computing, Fog/Edge Computing Wireless Local Area Networks Wireless Sensor Networks Wireless Mesh Networks Wireless Ad-hoc Networks Vehicular Networks Body-area Networks Cellular Networks

• • • • • • • • • • • • •

WiMAX Networks Machine to Machine (M2M) Netwroks Software Defined Networks (SDN) Social Networks Smart Grid RFID-based Systems Mobile Cloud Cyber-Physical Systems (CPS) Location-based Service Systems Mobile Healthcare Systems Smart Building Systems Big Data IoT Cyber Security Education

Instructions for Authors Authors are invited to submit manuscripts reporting original unpublished research and recent developments in the topics related to the workshop. Submissions should include a title, abstract, keywords, author(s) and affiliation(s) with postal and e-mail address(es) of the corresponding author. Submitted manuscripts must be formatted in standard IEEE camera-ready format (double-column, 10-pt font) and must be submitted via EasyChair (http://www.easychair.org/) as PDF files (formatted for 8.5x11-inch paper). The manuscripts should be no longer than 6 pages. Two additional page is permitted if the authors are willing to pay an over-length charge at the time of publication (manuscripts should not exceed 8 pages). Submitted papers cannot have been previously published in or be under consideration for publication in another journal or conference. The workshop Program Committee reserves the right to not review papers that either exceed the length specification or have been submitted or published elsewhere. Submissions must include a title, abstract, keywords, author(s) and affiliation(s) with postal and e-mail address(es). All authors of a paper must be registered in the RIGHT order via EasyChair at the SUBMISSION TIME and cannot be changed after the submission due time at EasyChair. The paper title and author name list/order cannot be changed during the final camera-ready submission.

Review and Publication of Manuscripts Submitted papers will be reviewed by the workshop Program Committee and judged on originality, technical correctness, relevance, and quality of presentation and the comments will be provided to the authors. Workshop papers will be in the same proceedings of the main conference papers. An accepted paper must be presented at the

ICCCN 2018 venue by one of the authors registered at the full registration rate. If any accepted paper is not registered, the paper will be removed from the workshop program and the proceedings. Each workshop registration covers up to two workshop papers by an author. Accepted and registered papers will be published in proceedings that will be available through Xplore. Papers that are not presented at the ICCCN 2018 venue by one of the registered co-authors will not appear in Xplore.

Important Dates • • • •

Paper submission due: March 31, 2018 Acceptance notification: April 28, 2018 Camera-ready due: May 10, 2018 Workshop: August 2, 2018

The 8th International Workshop on Internet on Things ...

Distributed Denial of Service (DDoS) attacks that have caused outages and network congestion for a large ... or trust architectures, protocols, algorithms, services, and applications on mobile and wireless systems. ... layer protocols are expected to enhance the security and preserve the privacy of those devices. With more ...

83KB Sizes 1 Downloads 261 Views

Recommend Documents

8th International Conference on
Ana Colubi (Oviedo, Spain). Thierry Denoeux (Compiegne, France). Massimo ... Statistical Software for Imprecise. • Dempster-Shafer Theory. • Applications in ...

Proceedings 1st International Workshop on Comparative Empirical ...
Jun 30, 2012 - and Jochen Hoenicke of University of Freiburg, with particular focus on proof ...... quires a bigger participant critical mass, we suggest that the ...

Proceedings 1st International Workshop on Comparative Empirical ...
Jun 30, 2012 - held on June 30th, 2012 in Manchester, UK, in conjunction with the International .... On the Organisation of Program Verification Competitions . ...... is only measuring the ability of the analyzer to warn for any call to realloc: ....

call for papers - The International Workshop on Non-Intrusive Load ...
The 3rd International Workshop on Non-Intrusive Load Monitoring (NILM) will be held in Vancouver, Canada from May 14 to 15, 2016. This year's venue will be ...

call for papers - The International Workshop on Non-Intrusive Load ...
We invite all researchers working on NILM-related topics to submit 4-page papers to the conference for oral presentation or presentation during a poster session.

Swapsies on the Internet
Jul 6, 2015 - “speaks for” and “says” authentication constructs [21] and propose an obeys ... machines on open networks are not mutually suspicious, and that any ...... of trust relationships between high-level system components. (typically .

Proceedings of the 5th International Workshop on ...
The data set contains keyphrases (i.e. controlled and un- controlled terms) assigned by professional index- ..... We conclude that there is definitely still room.

Second International Workshop on Teaching and Learning in the 21st ...
Educational technology needs support of the teachers who integrate ... Professor Dr. Abtar Kaur – Professor, Faculty of Education and Languages, Open ...

Second International Workshop on Teaching and Learning in the 21st ...
Educational technology needs support of the teachers who integrate technology into the curriculum, align it with student learning goals, and use it for engaged ...

Workshop on Bitcoin
Jun 7, 2016 - cryptocurrencies goes beyond their direct application, and blockchain ... by an anonymous developer using a pseudonym "Satoshi Nakamoto".

Workshop on Bitcoin
Jun 7, 2016 - In this workshop, we will study Bitcoin and cryptographic currencies in ... advanced features, the technology at the core of Bitcoin and its ...

Corrigendum on the Schedule of the Training-Workshop on Records ...
There was a problem previewing this document. Retrying... Download ... Corrigendum on the Schedule of the Training-Workshop on Records Management.pdf.

1st International Workshop on Inductive Reasoning and Machine ...
Jun 1, 2009 - 1st International Workshop on Inductive Reasoning and. Machine Learning (IRMLeS) 2009 ..... Data Analysis. Avg. num. r/u: 173.2. Median r/u: ...

3rd International Workshop on Pattern Recognition ...
electronic health records recording patient conditions, diagnostic tests, labs, imaging exams, genomics, proteomics, treatments, ... Olav Skrøvseth, University Hospital of North Norway. Rogerio Abreu De Paula, IBM Brazil ..... gram for World-Leading

3rd International Workshop on Nonlinear and ...
... the CPGR node of. H3ABioNet. Continued on page 3. Participants at the Symposium .... gene-mapping studies in the. African Continent. Participants at the ...

3rd International workshop on crocodylian ... - Wiley Online Library
Oct 16, 2008 - This compilation represents the second set of crocodylian genetics and genomic articles pub- lished in a Special Issue of JEZ. Most of these articles were presented in April of 2007, in. Panama City, Panama for the 3rd Crocodylian. Gen