IEEE Workshop on Advanced Security and Privacy Solutions in Internet of Vehicles (IEEE-ASP-IoV)
Event submitted on Monday, June 8th 2020, approved by Charles Villanueva ✓
This event has been tagged as follows:
We love these niche events, and this one looks special. If you work in the automotive industry then this is a Cybersecurity conference that you’d be unwise to miss. This is a physical event taking place in Taiwan. We wish the organizers the best of luck with it.
The following description was either submitted by the Conference Organizer on Monday, June 8th 2020, or created by us.
Over the last few years, people are witnessing a revolution in mobile communication and computation technologies. The Internet of Things (IoT) evolution has given birth to several new groundbreaking applications, such as the Internet of Vehicles (IoV), smart cities, and cyber-physical systems (CPS).
In the Internet of Vehicles (IoV), the vehicles include several sensors and cameras to obtain and communicate information from their surroundings. This information can be helpful in safe navigation, detecting hurdles, optimizing routes, and traffic management.
For efficient decision making, in IoVs, we use Vehicle to Vehicle (V2V) communication to complement on-board sensors’ inputs and provide better services. A key concern when relying on sensor-data is the vulnerability of data. Malicious actors tend to inject false data or alter communication among normal vehicles. Therefore, there is a need to discuss the solutions that provide authentication to both communicating entities and secure data from malicious entities.
This workshop will publish state-of-the-art approaches to secure the IoV infrastructure.
Specifically, ASP-IoV workshop will provide a high-quality forum for participants across research and industry. Organizers aim to attract contributions from both academic and industrial organizations addressing emerging security and privacy issues in distributed sensor networks and IoV and to publish consolidated research results focusing on analyzing security and privacy threats, applying cutting-edge technologies to provide secure and privacy-preserving communications in this field.
Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of the area. Papers that shed new light on past or informally known results by means of sound formal theory or thorough empirical analysis will also be welcomed.