DsIoT2022: Data Security on the Internet of Things: Challenges and Countermeasures |
Submission link | https://easychair.org/conferences/?conf=dsiot20220 |
Abstract registration deadline | June 10, 2022 |
Submission deadline | August 10, 2022 |
Data Security on the Internet of Things: Challenges and Countermeasures: DsIoT 2022
Internet of Things (IoT) is facing many challenges such as poor interoperability, security vulnerabilities privacy, and lack of industry standards. Most IoT devices need constant connection to the internet which brings many challenges in their protection and security of the data. Security challenges come in form of design practices, lack of standards and regulations. Privacy concerns are most visible in data collecting and use and bad privacy implementation by designs. The main goal of this book is to provide a solution with an overview of what can be done to implement security mechanisms in existing IoT infrastructure and furthermore improve the security and privacy of the system.
This book will to a greater extent address the topic of Blockchain implementation for IoT devices. Many IoT device manufactures are collecting user activity under the agreement to improve service. This is however big privacy concern due to the inability to opt-out of doing so. One way to resolve privacy and security challenges is a synthesis of blockchain technology with IoT. Blockchain technology removes servers that are the center of IoT infrastructure. This means that IoT data flows through blockchain nodes and each transaction has appropriate authentication. Due to data flow inside IoT architecture, Blockchain is a great solution. Blockchain allows IoT devices to maintain current data flow and improve security and privacy by sequentially checking for each transaction, network request. Also, another important fact is that to get access to a private blockchain network a device would need an invitation. All the devices in this network would be hidden from the public network and for someone or something to access the smart device it would need to send the request to the control point of the blockchain network. Blockchain eliminates single points of failure and moves decision-making to a shared network of devices in case of public blockchain infrastructure or a single entity in case of private blockchain infrastructure.
In addition, this book will address the topic of concrete using Blockchain technology in the current IoT infrastructure (Data security in IoT transport and traffic, IoT healthcare, Internet of Vehicles (IoV) concept, cryptographic keys exchange model for IoT applications, and optimization techniques for industrial IoT applications).
Also, this book will present concrete applications of new methods in authentication and authorization in IoT applications, multimodal biometric authentication, secure remote user authentication schemes, IoT application for smart cities data storage and processing, ...
In addition, this book will address the topic of measures to ensure the integrity of IoT devices so they cannot be altered by external interventions. The fundamental problem with current IoT architecture is their security, with the centralized model, with a central authority, which makes it susceptible to a single point of failure. New digital technologies including IoT and blockchain will transform the world we live in. When it comes to data protection and control, blockchain technology in conjunction with IoT will bring many opportunities. IoT and blockchain together have significant applications in automating business processes, crypto-currencies, smart contracts, financial services, supply chains, and many others. There is no doubt that technologies such as IoT will provide insight into user behaviors in all areas, enabling a greater level of personalized communication.
Submission Guidelines
All papers must be original and not simultaneously submitted to another journal or conference.
List of Topics
- Data security in the industrial IoT Applications: Confidentiality, Integrity, Availability, Data Auditing, Data Real-Time Alerts, Data Risk Assessment, Novel methods for Data security in IoT Applications.
- Cryptographic Keys Exchange Model for IoT Applications: IoT Model for Secret-keys Agreement, Novel scenario for cryptologic key exchange, Maurer’s Protocol, Satelite scenario, Security analysis of the protocol.
- Optimization techniques for industrial IoT applications: Machine Learning Frameworks and Algorithms, Intelligent IoT applications, Auditing and Continuous Monitoring.
- Data security in IoT transport and traffic: Respect Data Privacy, Data Security Regulations, IoT scenarios in transportation, Secure IoT network infrastructure.
- Authentication and authorization in IoT applications: Permissions, Access Activity, Perimeter Telemetry, Content Classification.
- Data security on the Internet of Vehicles (IoV) concept: General Data Protection Regulation, Data Classification, Data Governance.
- Data security in IoT healthcare: Implementation of Encryption and Data Hiding in IoT Application, Continually Monitor File and Perimeter Activity, Intelligent Healthcare Solutions.
- IoT application for smart cities data storage and processing: Solutions and Enablers for IoT, Future Internet of Things and smart city, Deep Learning and IoT.
- Secure Remote User Authentication Scheme on IoT Applications: Users and Groups, multimodal biometric authentication.
- IoT Identity Management and Authorization: Industrial Control Systems, Connected medical devices, Vehicle ECUs, Security cameras
- Choosing the Right IoT Authentication Model: Hardware Security Module (HSM), Trusted Platform (TPM) Module
- Blockchain for Cybersecurity: Scalability and Adaptability challenges, Secure data storage and processing, Data transparency and traceability
- Blockchain-enabled multimedia in the industrial IoT: Security and privacy issues, Emerging technologies and skills of staff, Blockchain Platforms for IIoT, Integrating Blockchain into Existing IIoT, Main Features in Blockchain-enabled IIoT, Standardization Blockchain IIoT.
- Novel Cryptographic methods for Private Blockchains: Comparison of blockchain privacy systems
Editors
-
Prof. (Dr.) Muzafer Saracevic
-
Prof. (Dr.) Sudhir Kumar Sharma
-
Prof. (Dr.) Samed Jukic
-
Prof. (Dr.) Suad Becirovic
Publication
DsIoT2022 proceedings will be published in Computational Methods for Industrial Applications by CRC Press, Taylor and Francis Group
Contact
All questions about submissions should be emailed to: