S&P in IoT
Call for Book Chapters
on "Security and Privacy in the Internet of Things"
|A book edited by:
||Dr. Mohammad Ahsan Chishti, Assistant Professor Department of CSE, National Institute of Technology Srinagar, J&K, India.
Syed Rameem Zahra , Ph.D Scholar Department of CSE, National Institute of Technology Srinagar, J&K, India.
IoT is a huge network of devices that are able to sense and hold sensitive information about their owner/surroundings. IoT has seen its journey from implausible and impossible to sustainable and tenable. Its rate of expansion into various grounds from agriculture to sports; personal health to intelligent traffic detection; waste management to smart homes is astonishing, dramatic, and unforeseen. With such vast adaptability and functionality, its security remains the biggest concern because, in contrast to the traditional networks, IoT faces huge vulnerabilities, some of which are inherent and others explicit. The existing security solutions cannot be implemented in IoT because of its unique characteristics. Therefore, there is a dire need to develop novel security procedures befitting IoT. Recent ransomware attacks like WannaCry and NotPetya have shattered the illusion that a back-up can protect an organizations digital data from being hacked. If huge organizations were forced to pay ransom, one can only imagine the situation when a single individual is involved.
- Objective of the Book:
The main objective of this book is to dwell into all the security aspects of IoT, starting from the IoT data centric security to human centric security. This will also provide a publication avenue for researchers working on the security and privacy of Internet of Things.
- Recommended topics include, but are not limited to the following:
- Intrinsic Security vulnerabilities of IoT devices
- IoT algorithms, protocols and technologies along with their security issues
- IoT security architecture
- IoT applications and their S&P concerns
- Hardware level security of IoT devices
- Loopholes in IoT security services
- Cyber-attacks on IoT environments
- Methodologies adopted by recent IoT attacks like Dyn, Mirai, Reeper, etc.
- Solutions to deal with high level IoT attacks
- Security awareness of IoT
- Security issues in authentication, authorization, confidentiality, integrity and availability of IoT
- Fog architecture for securing IoT
- Blockchain architecture for securing IoT
- Blockchain based solutions for various security issues of IoT
- Fuzzy logic based solutions for various security issues of IoT
- Machine Learning and deep learning based solutions for various security issues of IoT
- Open source tools for IoT security
- Important Dates:
||Full Chapter Submission Deadline (Hard Deadline)
||Final Decision Notification
||Camera ready Submission
||Tentative Date of Publication
- Click here for Submission
- Manuscript Guidelines
- Inquiries can be forwarded to:
Dr. Mohammad Ahsan Chishti, Assistant Professor Department of CSE, National Institute of Technology Srinagar, J&K, India.
Syed Rameem Zahra, Ph.D Scholar Department of CSE, National Institute of Technology Srinagar, J&K, India.