August 8, 2018 - August 10, 2018
Singapore (City), Singapore
Conference Description (submitted by organizer)
In our daily life, we interact with lots of IT devices. We use these connected devices for lots of purposes such as to access documents in the cloud, visualize photos, measure the temperature in a smart home, etc. This trend has been called the Internet of Things (IoT).
The potential use cases for IoT are quite varied. For example, IoT can be used in the healthcare sector to monitor body functions in a remote way. Another scenario which is attracting attention is the interconnection of vehicles, forming a particular type of network referred to as VANET. This enables driving vehicles to enjoy advanced safety-related, traffic management infotainment services.
Despite the huge amount of benefits that these devices and networks provide, security and privacy cannot be taken for granted. In an era in which our data lives in the cloud and it is shared among many people and devices, security and privacy are key pieces of the jigsaw. Even more, the widespread interest in the IoT and its associated technologies (RFID, NFC, etc.) and the criticality of their applications (medical, monitoring, etc.) call for developing tailored approaches suitable for their constrained resources. Thus, the time is now for searching for novel approaches in this regard.
The workshop targets to address novel approaches in security and privacy in the field. Expected contributions have to identify novel models, techniques, protocols, algorithms or architectures, etc. that provide the said properties. Papers focusing on particular IoT settings (e.g. healthcare, vehicular networks, etc.) fall within the scope. As a difference with other venues, controversial approaches (i.e., those that are based on opposite foundations as the mainstream) are welcome. Position papers and work in progress submissions will also be considered.
Scientists and practitioners all over the world are invited to take part in this Workshop. Proposals which include an implementation and evaluation of the proposed approach would stand out from the rest.
Selected (and presented) papers, after further extensions, will be published in the Special Issue of the SePrIoT conference in the Mobile Networks and Applications Journal. Furthermore, other outstanding papers will be considered for publication in the EAI Endorsed Transactions on Security and Safety.