Short Description and Goals
The next years more than 20 billion devices will be interconnected. The Internet of Things provides unparalleled opportunities for the development of new novel services. Currently most of the new electronic devices are offering from basic to advanced networking capabilities in the context of smart environments. Newer vehicles are partially or completely autonomous, powered by modern microprocessors, hundreds of sensors and Internet enabled services. The same applies to robotic and medical devices and almost every other advanced equipment. Despite the longstanding efforts of the scientific community to secure Internet and Network communications, Operating Systems and Software Applications only a limited amount of this knowledge has been applied to the IoT ecosystems. Most of the IoT devices, including modern vehicles suffer from numerous and multilayered vulnerabilities. Default, weak or no password authentication for remote connections, unencrypted traffic or obsolete and insecure cryptographic algorithms, outdated, unmanaged and vulnerable software are among the most serious problems of the IoT landscape. Even more alarming is the unregulated manufacturing process of many IoT constructors. Aiming to reduce the cost and minimize the time to market of their products, minimal or none effort is put to secure and support them sufficiently. Worse, there are recorded cases of IoT devices delivered with preinstalled malware that demonstrate total lack of operations security in the supply chain. In contrary to software applications in PCs and mobile devices, the owners are not likely to replace their devices because of security problems. As consequence these systems remain vulnerable for extended periods. Recent very large-scale DDoS attacks based and executed entirely by IoT Botnets, signify the magnitude of the problem.
Workshop Topics
The aim of this workshop is to bring together researchers and professionals that are responsible for the secure design, deployment and operation of current and future IoT systems. Topics of interest include, but are not limited to:
- IoT Security and Privacy
- IoT Intrusion Detection and Prevention Systems
- Cyber Physical Security and IoT
- Secure Design Methodologies for IoT Systems
- Secure Hardware and Software Codesign
- Development of Secure Embedded Systems
- Secure Embedded Operation Systems
- IoT Malware
- Autonomous Vehicles Cybersecurity
- Secure Network Protocols for IoT Systems
- IoT and Blockchain
- Secure Manufacturing Process of IoT Devices
- Privacy Protection in IoT Environments
- Security and Privacy of Medical Devices
- IoT Trust and Reliability
- Reliable Robotic Devices
Important Dates (for workshop papers only!)
- Workshop Paper Submission Deadline:
May 10, 2020, May 30, 2020
- Notification of Workshop Paper Acceptance:
June 1, 2020, June 15, 2020
- Camera-Ready Workshop Papers Due: June 28, 2020
- Early Registration Deadline: June 28, 2020
Submission Guidelines
Authors should submit original, unpublished research papers. All papers must not simultaneously be submitted to another journal or conference.
Papers and abstracts should be submitted through the main SEEDA-CECNSM 2020 submission website in PDF format. Authors should follow the SEEDA-CECNSM 2020 formatting as indicated here: https://hilab.di.ionio.gr/seeda2020/index.php/submissions/
By submitting a paper, authors implicitly agree that at least one of them will register to the SEEDA-CECNSM 2020 conference and present the paper. It is expected that at least one author will register for each accepted paper. Only papers that have been presented by their authors during the SEEDA-CECNSM 2020 conference will be published in the conference’s proceedings.
Extended versions of accepted papers will be considered for publication in the following Special Issue of the Computation journal:
https://www.mdpi.com/journal/computation/special_issues/advances_computation_engineering
Workshop Organizers
|
||
Associate Professor Periklis Chatzimisios, International Hellenic University, Greece – pchatzimisios@ihu.gr Dr. Periklis Chatzimisios serves as a Professor in the Department of Science and Technology at the International Hellenic University (IHU), Greece. In the past he has served as the Director of the Computing Systems, Security and Networks (CSSN) Research Lab and as the Vice Dean for the Faculty of Science and Technology. He is a Visiting Fellow in the Faculty of Science & Technology, at Bournemouth University, UK. For more than 15 years he has been a member and/or Chairman of the Scientific/Steering/Organizing Committee of hundreds of international conferences and Founder/Organizer/Co-Chair for many Workshops which are co-allocated with major IEEE conferences. He was recently appoointed as the Editor-in-Chief of the IEEE Standards E-Magazine (eZine) and he holds editorial board positions for several journals published by IEEE (such as IEEE Network, IEEE Communication Standards Magazine, IEEE Wireless Communication Magazine, IEEE Communications Surveys & Tutorials, IEEE Access, IEEE Communication Letters) and other publishing houses. He is the author/editor of 8 books and more than 140 peer-reviewed papers and book chapters on the topics of topics of performance evaluation and standardization activities of mobile/wireless communications, Internet of Things, 4th Industrial Revolution, security and vehicular networking. His published research work has received more than 4300 citations (H-index 32) by other researchers. He is regularly invited for talks, tutorials and seminars on topics related to his research interests..
|