The 1st International Workshop on Security and Privacy for Sustainable Development Goals (SP4SDGs 2022)
(in
conjunction with ICCCN 2022)
Honolulu,
USA
July 25 - July 28, 2022
Submit
paper at https://easychair.org/account/signin?l=ROzs5Lj9xRUBxOXY9BeLiN#?conf==icccn2022
Call
for Paper
[General
Info] [Scope
and Topics] [Important
Dates] [Submissions
and Publications] [Organizing
Committees] [Traval Information][Contact]
General
Information
The 1st International Workshop on Security and Privacy for Sustainable Development Goals (SP4SDGs 2022) will be held in conjunction with
the The 31th International
Conference on Computer Communications and Networks (ICCCN 2022),
in Honolulu,USA. All papers presented in SP4SDGs
2022 will be published in the workshop proceedings.
Outstanding papers will be invited to extend to full version for a SCI(E)-indexed journal, which is currently under contact.
Scope
and Topics
In recent years, cybersecurity in sustainable development has become one of the most important issues. The Environmental Goods and Services Sector (EGSS) is one of the fastest developing sectors of economy fueled by the growing relationships between network entities based on the ICT usage. It is a new paradigm of the development of the Internet, has been developed and applied into cyber-physical social systems such as industrial control systems and healthcare information systems. The growth and application of these ICT devices such as smart phones, sensors, healthcare wearables, connected vehicles, smart home gadgets and appliances are expected to improve the intelligence of cyber physical systems, enhance the reliability, resilience, operational efficiency, and energy efficiency of current information systems while reducing system costs and resource consumption. However, when IoT devices are pervasively used in cyber physical systems, their security, privacy and trustworthiness have become critical issues. In October 2016, 150,000 compromised IoT devices composed of CCTV cameras and digital video recorders were used as botnets by hackers to launch massive and sustained Distributed Denial of Service (DDoS) attacks that have caused outages and network congestion for a large number of websites. By the year 2020, it says that 50 billion devices will be exposed to cyber attacks.
Moreover, specific features such as portability, mobility, and sensitivity of IoT devices, further impose the challenge of security and privacy in those systems. Despite recent advances, many research issues still remain in the design of secure, privacy-preserving, or trust architectures, protocols, algorithms, services, and applications on mobile and wireless systems. For example, when IoT devices have more storage space, high bandwidth, and super sensing capability, more sensitive information will be stored in those devices. On the other hand, operating systems running on those devices are not as powerful and reliable as those on traditional computers. Both OS layer and higher-level layer protocols are expected to enhance the security and preserve the privacy of those devices. With more IoT devices being used in cyber physical social systems, novel trust models are essential for new applications. New cryptographic algorithms, key distribution schemes and access control policies are also encouraged to addressing security issues of IoT special characteristics. Other issues such as malware, cyber threat, intrusion detection, attack modeling, security analysis, identity management and anonymity techniques also need to be revisited under SDGs setting.
This workshop aims to bring together the technologists and researchers who share interest in the area of IoT security, privacy and trust, as well as explore new venues of collaboration. The main purpose is to promote discussions of research and relevant activities in the models and designs of secure, privacy-preserving, or trust architectures, protocols, algorithms, services, and applications, as well as analysis on cyber threat in IoT systems. It also aims at increasing the synergy between academic and industry professionals working in this area. We plan to seek papers that address theoretical, experimental research, and work in-progress for IoT security, privacy and trust related issues that include, but are not limited to the following:
- Internet of Things Security
- Healthcare Information
Systems
- Self-protecting computing
systems
- Cryptography for Mobile and
Wireless Systems
- Cryptography for Cloud
Computing, Fog/Edge Computing
- Wireless Local Area Networks
- Wireless Sensor Networks
- Wireless Mesh Networks
- Wireless Ad-hoc Networks
- Vehicular Networks
- Body-area Networks
- Cellular Networks (4G, 5G, \85)
- WiMAX
Networks
- Machine to Machine (M2M) Netwroks
- Software Defined Networks
(SDN)
- Social Networks
- Smart Grid
- RFID-based Systems
- Mobile Cloud
- Cyber-Physical Systems (CPS)
- Internet of Things
- Location-based Service
Systems
- Mobile Healthcare Systems
- Smart Building Systems
- Big Data
- IoT
Cyber Security Education
Important
Dates
Paper submission due: March 13, 2022
Acceptance notification: April 24, 2022 (Hard Deadline)
Camera-ready due: May 4, 2022 (Hard Deadline)
Workshop: July 28, 2022
Submissions
and Publications
Authors are invited to submit manuscripts reporting original unpublished
research and recent developments in the topics related to the workshop.
Submissions should include a title, abstract, keywords, author(s) and
affiliation(s) with postal and e-mail address(es) of the corresponding author. Submitted manuscripts must
be formatted in standard IEEE camera-ready format (double-column, 10-pt font)
and must be submitted via EasyChair
(https://easychair.org/conferences/?conf=icccn-2018-hangzhou) under "8th
International Workshop on Internet on Things: Privacy, Security and Trust"
as PDF files (formatted for 8.5x11-inch paper). The manuscripts should be up to 7 pages and no extra pages are allowed.
Submitted papers cannot have been previously published in or be under
consideration for publication in another journal or conference. The workshop
Program Committee reserves the right to not review papers that either exceed
the length specification or have been submitted or published elsewhere.
Submissions must include a title, abstract, keywords, author(s) and
affiliation(s) with postal and e-mail address(es). All authors of a paper must be registered in the RIGHT
order via EasyChair at the SUBMISSION TIME and cannot
be changed after the submission due time at EasyChair.
The paper title and author name list/order cannot be changed during the final
camera-ready submission.
Outstanding papers will be invited to extend to full version for a
prestigious journal, Journal of Security and Network targeting publication in
early 2022.
When uploading a camera-ready at IEEE, note that the paper title, author
names/affiliation and order must be IDENTICAL to the original submission for
peer reviewing. No title change, author addition or removal is allowed.
A paper must be registered by a co-author in the full rate. It must be
presented by one of registered authors in the venue.
Camera-ready and registration due date May 10, 2022 is FIRM. Check ICCCN homepage to find detailed
instructions. Please try to complete the process as early as possible in order
to avoid the rush hour, giving you time to deal with unexpected but possible
issues/delay.
Organizing
Committees
Workshop Program
Co-Chairs
Chunhua Su,
University of Aizu, Japan
Guenevere (Qian) Chen, The University of Texas at
San Antonio, USA
Workshop TPC List
- Dr. Zhen Li, Huazhong University of Science and Technology, China.
- Dr. Weizheng Wang, City University of Hongkong, Hongkong
- Dr. Yaoqi Yang, Army Engineering University, China
- Dr. Zhiri Tang, Wuhan University, China
- Dr. Zhuotao Lian, University of Aizu, Japan
Travel Information
The reservation info of the registration and conference hotel on the ICCCN
2022 website; http://icccn.org/icccn22/travel/.
Please make the reservations ASAP to take advantage of the reduced rate for
ICCCN 2022
Contact Information
Guenevere
(Qian) Chen, The University of Texas at San Antonio, USA