C a l l F o r P a p e r s
Workshop on Industrial Internet of Things Security (WIIoTS)
Bilbao, Spain, June 4-7, 2018 (in conjunction with Global IoT Summit
2018)
http://globaliotsummit.org/sites/default/files/WIIoTS-2018.pdf
Submission due: Feb 16, 2018 (GMT)
Conference Outline:
The Industrial Internet of Things (IIoT) is an emerging paradigm in
today's (control) industry, comprising Internet-enabled cyber-physical
devices with the ability to couple to the new interconnection
technologies such as cloud/fog computing. Under this perspective, the
new industrial cyber-physical "things" can be accessible and
available from remote locations, the information of which can be
processed and stored in distributed locations, favouring the
cooperation, the performance in field, and the achievement of
operational tasks working at optimal times. However, the incorporation
of the IIoT in the new scenarios of the fourth industrial revolution,
also known as Industry 4.0, entails having to consider the new security
and privacy issues that can threaten the wellbeing of the new IIoT
ecosystem and its coexistence with the existing industrial technologies,
with a high risk of impact on the end-users.
Therefore, this workshop will create a collaboration platform for
experts from academia, governments and industry to address the new IIoT
security and privacy challenges. Papers related to security and privacy
of embedded systems working in industrial and control environments, such
as SCADA, smart grid, smart cities, manufacturing systems, water
systems, and in critical infrastructures in general, are all welcome at
WIIoTS 2018. The technical topics of interest for this workshop include,
but are not limited to:
• Interoperable IIoT ecosystem-level security and privacy challenges
• IIoT governance, regulation and standards
• Cross-layer threat modelling in IIoT and risk assessment
• Lightweight cryptography and key management
• Lightweight IIoT security protocols and AAA services for IIoT
• Collaborative and trustworthy IIoT frameworks and architectures
• Privacy-preserving models and anonymization techniques for IIoT
• Secure IIoT data storage and Big Data
• Location privacy and trust management
• Intrusion detection, anomaly diagnosis and situational awareness for
IIoT
• Response and resilience to IIoT cyber-attacks
• Incident management and IIoT forensics
• Case studies and practical validations: SCADA, energy, water, smart
factory, etc.
Important Dates:
================
• Submission due: Feb 16, 2018 (GMT)
• Notification: Mar 31, 2018
• Camera-ready due: Apr 30, 2018
Program Chair:
==============
• Cristina Alcaraz (University of Malaga, Spain)
General Co-Chairs:
==================
• Javier Lopez (University of Malaga, Spain)
• Yan Zhang (University of Oslo, Norway)
Technical Program Committee:
============================
• Alvaro Cardenas (University of Dallas, USA)
• Christos Xenakis (University of Piraeus)
• Dimitris Gritzalis (Athens University of Economics and Business)
• Federica Pascucci (University of Roma Tre, Italy)
• Kim-Kwang Raymond Choo (University of Texas, USA)
• Luca Faramondi (University Campus Bio-Medico)
• Mihalis Psarakis (University of Piraeus, Greece)
• Nils Ole Tippenhauer (Information Systems Technology and Design
(ISTD), Singapore)
• Panayiotis kotzanikolaou (University of Piraeus, Greece)
• Rakesh Bobba (Oregon State University, USA)
• Rodrigo Roman (University of Malaga, Spain)
• Sherali Zeadally (University of Kentucky, USA)
• Urko Zurutuza Ortega (University of Mondragon, Spain)
• Xinyi Huang (Fujian Normal University, China)
Publicity Chair:
================
• Juan E. Rubio (University of Malaga, Spain)
Submission Instructions:
========================
Final submissions must not substantially overlap papers already or
simultaneously submitted to a journal or a conference with proceedings.
Their contents should be written in English with a maximum paper length
of six (6) printed pages see web conference for instructions. Papers
must be submitted through EDAS.
"IEEE reserves the right to exclude a paper from distribution after the
conference, including IEEE Xplore® Digital Library, if the paper is not
presented by the author at the conference."
Contact:
========
Email: alcaraz@lcc.uma.es
WIIoTS Home: http://globaliotsummit.org
**********************************************************
*
* Contributions to be spread via DMANET are submitted to
*
* DMANET@zpr.uni-koeln.de
*
* Replies to a message carried on DMANET should NOT be
* addressed to DMANET but to the original sender. The
* original sender, however, is invited to prepare an
* update of the replies received and to communicate it
* via DMANET.
*
* DISCRETE MATHEMATICS AND ALGORITHMS NETWORK (DMANET)
* http://www.zaik.uni-koeln.de/AFS/publications/dmanet/
*
**********************************************************