IoT is a huge network of devices that are able to sense and hold sensitive information about their owner/surroundings. IoT has seen its journey from implausible and impossible to sustainable and tenable. Its rate of expansion into various grounds from agriculture to sports; personal health to intelligent tra?c detection; waste management to smart homes is astonishing, dramatic, and unforeseen. With such vast adaptability and functionality, its security remains the biggest concern because, in contrast to the traditional networks, IoT faces huge vulnerabilities, some of which are inherent and others explicit. The existing security solutions cannot be implemented in IoT because of its unique characteristics. Therefore, there is a dire need to develop novel security procedures be?tting IoT. Recent ransomware attacks like WannaCry and NotPetya have shattered the illusion that a back-up can protect an organization’s digital data from being hacked. If huge organizations were forced to pay ransom, one can only imagine the situation when a single individual is involved.
- Objective of the Book:
The main objective of this book is to dwell into all the security aspects of IoT, starting from the IoT data centric security to human centric security. This will also provide a publication avenue for researchers working on the security and privacy of Internet of Things.
- Recommended topics include, but are not limited to the following:
- Intrinsic Security vulnerabilities of IoT devices
- IoT algorithms, protocols and technologies along with their security issues.
- IoT security architecture
- IoT applications and their S&P concerns
- Hardware level security of IoT devices
- Loopholes in IoT security services
- Cyber-attacks on IoT environments
- Methodologies adopted by recent IoT attacks like Dyn, Mirai, Reeper etc
- Solutions to deal with high level IoT attacks.
- Security awareness of IoT
- Security issues in authentication, authorization, confidentiality, integrity and availability of IoT
- Fog architecture for securing IoT
- Blockchain architecture for securing IoT
- Blockchain based solutions for various security issues of IoT
- Fuzzy logic based solutions for various security issues of IoT
- Machine Learning and deep learning based solutions for various security issues of IoT
- Open source tools for IoT security
- Proposal Submission Guidelines:
- Summary of topics to be discussed
The proposal must atleast be of two pages and should include the following:
- Important Dates:
|November 20, 2019:
||Proposal Submission Deadline
|December 05, 2019:
||Notification of Acceptance/Rejection
|January 31, 2020:
||Full Chapter Submission
|March 10, 2020:
||Review Results Returned
|April 10, 2020:
||Revised Manuscript Submission Deadline
|May 08, 2020:
||Final Decision Notification
- Inquiries can be forwarded to:
Dr. Mohammad Ahsan Chishti, Assistant Professor, National Institute of Technology Srinagar, India.
Syed Rameem Zahra, Ph.D Scholar, National Institute of Technology Srinagar, India.