The next years more than 20 billion devices will be interconnected. The Internet of Things provides unparalleled opportunities for the development of new novel services. Currently most of the new electronic devices are offering from basic to advanced networking capabilities in the context of smart environments, powered by modern microprocessors, hundreds of sensors and Internet enabled services. The longstanding efforts of the scientific community to secure Internet and Network communications, Operating Systems and Software Applications proved inefficient. Most of the IoT devices, suffer from numerous and multilayered vulnerabilities. Even more alarming is the unregulated manufacturing process of many IoT constructors. Aiming to reduce the cost and minimize the time to market of their products, minimal or none effort is put to secure and support them sufficiently. Worse, there are recorded cases of IoT devices delivered with preinstalled malware that demonstrate total lack of operations security in the supply chain. In contrary to software applications in PCs and mobile devices, the owners are not likely to replace their devices because of security problems. As consequence these systems remain vulnerable for extended periods.The next years more than 20 billion devices will be interconnected. The Internet of Things provides unparalleled opportunities for the development of new novel services. Currently most of the new electronic devices are offering from basic to advanced networking capabilities in the context of smart environments, powered by modern microprocessors, hundreds of sensors and Internet enabled services. The longstanding efforts of the scientific community to secure Internet and Network communications, Operating Systems and Software Applications proved inefficient. Most of the IoT devices, suffer from numerous and multilayered vulnerabilities. Even more alarming is the unregulated manufacturing process of many IoT constructors. Aiming to reduce the cost and minimize the time to market of their products, minimal or none effort is put to secure and support them sufficiently. Worse, there are recorded cases of IoT devices delivered with preinstalled malware that demonstrate total lack of operations security in the supply chain. In contrary to software applications in PCs and mobile devices, the owners are not likely to replace their devices because of security problems. As consequence these systems remain vulnerable for extended periods.
Against this background, we organise a special track of SEEDA‐CECNSM which aims to attract submissions from researchers and professionals that are responsible for the secure design, deployment and operation of current and future IoT systems. Topics of interest include, but are not limited to:
Topics
- IoT Security and Privacy
- IoT Intrusion Detection and Prevention Systems
- Cyber Physical Security and IoT
- Secure Design Methodologies for IoT Systems
- Secure Hardware and Software Codesign
- Development of Secure Embedded Systems
- IoT Malware
- Autonomous Vehicles Cybersecurity
- IoT and Blockchain
- Privacy Protection in IoT Environments
- Security and Privacy of Medical Devices
- IoT Trust and Reliability
Paper Submission
- Papers due: June 22, 2019
- Notification due: June 30, 2019
- Camera‐ready due: July 14, 2019
- Conference date: September 20‐22, 2019
Organisers and Co‐Chairs
Athanasios Kakarountas, University of Thessaly
Georgios Spathoulas, University of Thessaly
Submission Guidelines
(1) Short papers (3‐4 pages) are also accepted.
(2) Please follow the instructions (https://seeda2019.unipi.gr/authors/) for the submission process and choose “Special Track 8…” for the Topic selection.
Contact Information
kakarountas@uth.gr // gspathoulas@uth.gr
Download file from here