CFP: International Workshop on Security in the IoT with Real-Time and Energy constraints (IoT-Secure 2016)

http://icacci-conference.org/2016/tracks#11

In conjunction with ICACCI-2016, the 5th International Conference on Advances in Computing, Communications and Informatics, September 21-24, Jaipur, India.

ICACCI-2016 is technically co-sponsored by IEEE Communications Society and IEEE Systems, Man, and Cybernetics Society. The Conference is technically supported by IEEE SMCS Technical Committee on Soft Computing, IEEE ComSoc Internet Technical Committee (ITC) and IEEE ComSoc Technical Committee on Green Communications and Computing (TCGCC).

*Introduction*
Devices we use every day are becoming connected entities across the planet. The so-called IoT includes technologies which combine autonomous embedded sensory objects with communication intelligence. Most of the applications in the IoT have consequently strong real-time requirements and energy limitations. Moreover, the IoT can be affected by various categories of security: access to intellectual property, sabotage, espionage, cyber terrorism in critical infrastructures such as nuclear plants, railways and traffic monitoring. This imposes to design new cryptographic methods which are efficient both in terms of security, energy consumption, and time overhead.

*Scope*
The focus and scope of IoT-Secure 2016 is solely on the security aspects of the Internet of Things which have strong real-time constraints and energy limitations. We will welcome papers both from theoretical and practical aspects. Prospective authors are invited to submit original, previously unpublished work, reporting on novel and significant research contributions, on-going research projects, experimental results and recent developments related to, but not limited, the following topics:

* Cyber-physical threats, vulnerability analysis, and countermeasures
* Critical infrastructure protection
* Communication overhead
* Energy-efficiency in security management
* Lightweight Encryption
* Real-Time Applications
* Real-time cryptosystem based on chaotic systems
* Security challenges in the Internet of Things
* Security and privacy of mobile systems
* Security in highly resource-constrained network
* Sensor network security
* Security Protocols for Sensor Networks
* Wireless communications security
* …

* Important Dates *
Paper Submission: July 5, 2016 09:29:00 IST
Author Notification: July 25, 2016
Final Manuscript Due: August 10, 2016

* Submission*
You should make your submissions through EDAS.

Unregistered authors should first create an account on EDAS to log on. The workshop only accepts full manuscripts in the standard IEEE camera-ready format (double column, 10-point font) with minimum 3 pages and maximum 8 pages.

* Publication*
Accepted and presented papers will be published in the ICACCI 2016 Proceedings which will be available through IEEE Xplore® after the conference.

* Registration*
Registration will be done through ICACCI-2016 registration system.

* Workshop organizers*
Maryline Chetto, University of Nantes, France, IRCCyN laboratory {maryline.chetto@univ-nantes.fr}
Safwan El Assad, University of Nantes, France, IETR laboratory {safwan.elassad@univ-nantes.fr}

* Program committee *
Olivier Deforges, INSA de Rennes, IETR, France
Wassim Hamidouche, INSA de Rennes, IETR, France
Audrey Queudet, University of Nantes, France
Santo Banerjee, University Putra Malaysia, Malaysia, Malaysia
Thang Hoang, University of Hanoï, Vietnam
Ion Tutanescu, University of Pitesti, Romania
Bassem Bakhache, Lebanese University, Lebanon
Mohamad Khalil, Lebanese University, Lebanon
Rima ASSAF, Lebanese University, Lebanon
Relu Tataru, Military Technical Academy, Romania
Ghada Zaibi, ENIS, University of Sfax, Tunisia
Ons Jallouli, University of Nantes, France
Mohammad Abu Taha, University of Nantes, France
Daniel Caragata, University of Valparaíso, Chile
Dalia Battikh, Lebanese University, Lebanon
Nabil Abdoun, University of Nantes, France

CFP: International Workshop on Security in the IoT with Real-Time and Energy constraints (IoT-Secure 2016) Weiterlesen ...