SePrIoT 2017

1st Workshop on Security and Privacy in the Internet Of Things (SePrIoT)

SePrIoT schedule_v2

In our daily life we interact with lots of IT devices. We use these connected devices for lots of purposes such as to access documents in the cloud, visualize photos, measure the temperaturein a smart home, etc. This trend has been called Internet of Things (IoT).

The potential use cases for IoT are quite varied. For example, IoT can be used in the healthcaresector to monitor body functions in a remote way. Another scenario which is attracting attentionis the interconnection of vehicles, forming a particular type of network referred to as VANET. This enables driving vehicles to enjoy advanced safety-related, traffic management orinfotainment services.

Despite the huge amount of benefits that these devices and networks provide, security andprivacy cannot be taken for granted. In an era in which our data lives in the cloud and it isshared among many people and devices, security and privacy are key pieces of the jigsaw. Even more, the widespread interest in the IoT and its associated technologies (RFID, NFC, etc.)and the criticality of their applications (medical, monitoring, etc.) call for developing tailoredapproaches suitable for their constrained resources. Thus, the time is now for searching fornovel approaches in this regard.

The workshop targets to address novel approaches in security and privacy in the field. Expected contributions have to identify novel models, techniques, protocols, algorithms or architectures, etc. that provide the said properties. Papers focusing on particular IoT settings (e.g. healthcare, vehicular networks, etc.) fall within the scope. As a difference with other venues, controversial approaches (i.e., those that are based on opposite foundations as the mainstream) are welcome. Position papers and work in progress submissions will also be considered.

Scientists and practitioners all over the world are invited to take part in this Workshop. Proposals which include an implementation and evaluation of the proposed approach would stand out over the rest.

Selected (and presented) papers, after further extensions, will be published in the Special Issue of the SePrIoT conference in the Mobile Networks and Applications Journal. Furthermore, other outstanding papers will be considered for publication in the EAI Endorsed Transactions on Security and Safety.

TOPICS

  • Privacy and anonymity in the IoT
  • Authentication and access control in the IoT
  • Confidentiality in the IoT
  • Trust in the IoT
  • Risk management/ assessment in the IoT
  • Security architectures in the IoT
  • Hardware security for the IoT
  • Cryptographic algorithms in the IoT
  • Secure and private location-based services for the IoT
  • Novel applications, services and secure mechanisms for IoT-enabled settings (e.g. healthcare services, VANETs, etc.)

DEADLINES

Full Paper Submission deadline

7 July 2017

Notification and Registration opens

31 July 2017

Camera-ready deadline

24 August 2017

PAPER SUBMISSION

Papers should be submitted through EAI ‘Confy’ system at Confy, and have to comply with the SPRINGER format (see Author’s kit section).

How do I submit a paper in Confy?

  1. Go to Confy website
  2. Login or sign up as new user
  3. Scroll the list of conferences open for submission
  4. Select SECURECOMM 2017
  5. Select the submission type (1st Workshop on Security and Privacy in the Internet Of Things (SePrIoT)
  6. Click the ‘submit a paper’ link and follow the instructions

Submission guidelines

  • Papers should be in English.
  • Workshop papers should have maximum 20 pages in length.
  • Previously published work may not be submitted, nor may the work be concurrently submitted to any other conference or journal. Such papers will be rejected without review.
  • The paper submissions must follow the SPRINGER formatting guidelines (see Author’s kit section).
  • Read the Publication Ethics and Malpractice Statement.

Instructions and Templates

Papers must be formatted using the SPRINGER Author’s Kit. Detailed instructions and templates are available.

ORGANIZING COMMITTEE

General Chair

José María de Fuentes, Computer Security Lab (COSEC), Carlos III University of Madrid, Spain

General Co-Chairs

Lorena González-Manzano, Computer Security Lab (COSEC), Carlos III University of Madrid, Spain
Pedro Peris-López, Computer Security Lab (COSEC), Carlos III University of Madrid, Spain

Technical Program Committee

Jemal Abawajy, Deakin University (Australia)
Mu’awya Al Dalaien, HCT-Khalifa City Women’s College (United Arab Emirates)
Nasour Bagheri, Shahid Rajaee Teachers Training University (Iran)
Rahmat Budiarto, Surya University (Indonesia)
Carmen Cámara, Universidad Carlos III de Madrid (Spain)
Kim-Kwang Raymond Choo, University of Texas at San Antonio (United States)
Juan Estévez-Tapiador, Universidad Carlos III de Madrid (Spain)
Flavio García, University of Birmingham (United Kingdom)
Ana Isabel González-Tablas, Universidad Carlos III de Madrid (Spain)
Flavio Lombardi, Università Roma Tre (Italy)
Javier López, Computer Science Department, University of Malaga (Spain)
Samuel Marchal, Aalto University (Finland)
Katerina Mitrokotsa, Chalmers University of Technology (Sweden)
Ana Nieto, Universidad de Málaga (Spain)
Panos Papadimitratos, KTH (Sweden)
Julian Schütte, Fraunhofer AISEC (Germany)
Jetzabel Serna-Olvera, Chair of Mobile Business and Multilateral Security, Goethe Universität, Frankfurt (Germany)
Agusti Solanas, Head of the Smart Health Research Group, Rovira I Virgili University (Spain)