Workshop to be held in conjunction with the 10th IEEE International Conference on Internet of Things (iThings 2017)
Welcome to SITN-2017 workshop!
Due to several recent requests, the submission due date for SITN-2017 is now extended to 08th April 2017 (11.59 Edinburgh time). This is the final due date for submitting your paper to this workshop and no further extension will be allowed.
The Internet of Things (IoT) presents unprecedented opportunities for building smart society. Big data collected from numerous “Things”, connected across different interfaces and locations, facilitate smarter decision making and personalised services. Although all the hope of anticipated benefits from IoT, security remains a big challenge to overcome. Manufacturers are yet shipping IoT devices with security flaws, which put users or even the other parts of our connected cyber world at risk. Those vulnerable IoT devices would be easily exploited to launch massive cyberattacks to other online services or IT infrastructures. All the privacy, robustness and security issues are challenging the movement towards smart society.
The SITN-2017 workshop is an international event, which aims to bring together expertise from academia and industry to build secure IoT infrastructures for smart society. It also provides a venue for international researchers and leading industrial experts in IoT and cyber-security to establish future partnerships and research collaborations.
The SITN-2017 workshop will be held in University of Exeter and in collaboration with The Edinburgh Napier University, Technical University of Denmark, The Cyber Academy and SICSA on the 21st – 23rd of June 2017 and in parallel with The 10th IEEE International Conference on Internet of Things. All interested stakeholders from academia and industry are invited to submit their original work on building secure IoT infrastructures for Smart Society to the SITN-2017 workshop.
Call for papers:
SITN 2017 will be held on 21-23 June 2017 in Exeter, Devon, UK. Topics of interest include, but are not limited to:
- Threat Models in Internet of Things
- Attack Strategies for Internet of Things
- Security Architectures
- Security in Wireless Sensor Networks
- Reliable Interactions with Network Services
- System and Data Integrity
- Scalability and Robustness for Internet of Things
- Identity Management in Internet of Things
- Trustworthiness in Internet of Things
- Secure Operating Systems
- Secure routing for Internet of Things
- Privacy in Internet of Things
- Adaptive Security in Internet of Things
- Secure IoT interactions
- Secure IoT architecture design
- Digital forensics for IoT
- Malware Detection
- Intrusion Detection and Prevention Systems (IDPS) for IoT
- Dr. Naghmeh Moradpoor; Edinburgh Napier University (ENU), UK
- Dr. Zhiyuan Tan; Edinburgh Napier University (ENU), UK
- Dr. Weizhi MENG; Technical University of Denmark (DTU), Denmark
- Prof. Jiankun Hu, University of New South Wales at the Australian Defence Force Academy, Australia
- Prof. Xiangjian He, University of Technology, Sydney (UTS), Australia
- Prof. Ren Ping Liu, University of Technology, Sydney (UTS), Australia
- Prof. Xinheng Wang, University of the West of Scotland, UK
- Associate Prof. Kim-Kwang Raymond Choo, The University of Texas at San Antonio, USA
- Dr. Shancang Li, University of the West of England, UK
- Dr. Wei Jiang, German Research Centre for Artificial Intelligence, German
- Yan Li, Advanced Digital Sciences Center, Singapore
- Shaoying Cai, Hunan University, China
- Dr. Rameez Asif, Edinburgh Napier University, UK
- Dr. Chunbo Luo, University of Exeter, UK
- Dr. Xavier Bellekens, University of Abertay, UK
|Paper Submission Deadline:|
|Authors Notification:||22 April 2017|
|Camera-Ready Paper Due:||15 May 2017|
|Early Registration Due:||15 May 2017|
|Conference Date:||21-23 June 2017|
Paper submission guideline:
All papers need to be submitted electronically through the workshop submission website with PDF format. The materials presented in the papers should not be published or under submission elsewhere. Extended versions of selected papers will be invited for possible publication in the Journal of Cyber Security Technology. Each paper is limited to 8 pages (or 10 pages with over length charge) including figures and references using IEEE Computer Society Proceedings Manuscripts style (two columns, single-spaced, 10 fonts). You can confirm the IEEE Computer Society Proceedings Author Guidelines here. Manuscript Templates for Conference Proceedings can be found here. Once accepted, the paper will be included into the IEEE conference proceedings published by IEEE Computer Society Press (indexed by EI). At least one of the authors of any accepted paper is requested to register the paper at the workshop.
Submit camera-ready (final) PDF file electronically:
To submit your camera-ready (final) PDF file electronically please follow the steps below:
- Go to the on-line submission system Easy chair and log-in using your Easy chair account (this should be the same account you have used to submit the paper proposal). Your username will be your email.
- Make sure that all author information are stored correctly on EASY Chair and matches the information on the PDF file. Author information (e.g. names, affiliations, etc.) that will appear in conference publications and materials (e.g. Proceedings, CD-ROM, badges, etc.) will be taken from the Easy chair system and not from the submitted PDF file. In particular:
- Make sure that ALL paper authors are included on the author list on Easy chair.
- Make sure that the order of authors on Easy chair is correct.
- Make sure that all authors update their profile (affiliation, email, country, etc.) on the Easy chair system.
- Make sure that all paper information are stored correctly on Easy chair and matches the information on the PDF file. Paper information (title, abstract, etc) that will appear in conference publications (e.g. book of abstracts, proceedings, etc.) will be taken from the Easy chair system and not from the submitted PDF file.
- Click on the “Update File” link, choose Browse and then your pdf express file then upload. Depending on the size of your file and your internet connection speed, the file upload may take a few minutes. If the file is uploaded successfully then a confirmation message will be displayed. You will also receive an e-mail confirmation with the details of your submission. If you do not see the confirmation page after uploading your file, you may not have successfully completed your file upload. If you encounter trouble, please contact the Conference Chair.
Journal Special Issue:
Distinguished papers selected from SITN-2017, after further extensions, will be recommended for submission and publication in Journals of Cyber Security Technology.