|
|
(3 intermediate revisions by the same user not shown) |
Line 1: |
Line 1: |
− | = Call for Chapters: Adaptive Security for the Internet of Things =
| |
| | | |
− | '''<span style="font-size:larger;">To be published by Elsevier</span>'''
| |
− |
| |
− | == Co-editors ==
| |
− |
| |
− | Mohamed Hamdi, School of Communication Engineering, Tunisia
| |
− |
| |
− | Habtamu Abie, Norwegian Computing Center, Norway
| |
− |
| |
− | == Book's description ==
| |
− |
| |
− | Nowadays, the Internet of Things (IoT) presents a strong focus of research with various initiatives working on the (re)design, application, and use of standard Internet technology in the IoT. In the IoT, physical objects become virtual, meaning that they have locatable, addressable, and readable counterpart on the Internet. The evolution of multimodal sensing, wireless communication, and convergent services enable these objects, called things, to produce and consume network services. In spite of the huge potential brought by this paradigm, several significant obstacles remain to fulfil the IoT vision, among them security, usability, and trust. The mobility, resource scarcity, and heterogeneity of the newly introduced devices consistently affect the efficiency of the traditional protection countermeasures deployed in the Internet. The challenge is to prevent the growth of the malicious actions and to mitigate their impact. To this end, new security mechanisms that adapt to the intrinsic features of the IoT should be developed. Moreover, a key design issue in the IoT is to extend the network lifetime so as to guarantee uninterrupted information exchange and alleviate the burden of replenishing nodes. Another challenge is the building users’ trust in the devices. Data is transferred between many different things, often automatically, and users need to know that their data is correct and protected by the things.
| |
− |
| |
− | The scope of adaptive security in the IoT is broad and requires cross-disciplinary skills since it encompasses many topics. This book assembles these topics into a coherent body of knowledge consisting of theories, case studies, scenarios, examples, prototypes, legal analysis, and open problems. The book will present a novel view of the field totally centred on the dynamic context. In fact, one extremely important fact that we underline is that the efficiency of a security solution cannot be rigorously assessed without examining its adequacy to the whole environment it belongs to. Throughout this book, we build a set of formal and practical links to highlight the impact of the context on all the processes of the adaptive security engineering lifecycle. One of the basic ideas which the authors want to imbue into the book is that adaptive security should rely on a accurate representation of the dynamic context encompassing threats, energy-level, and security requirements. Studying and analyzing the tradeoff between security-effectiveness and energy-efficiency will be the focal interest of the book.
| |
− |
| |
− | == Topics of interest ==
| |
− |
| |
− | The areas covered in this book range from basic concepts to research-grade material including future directions. Recommended topics include, but are not limited to, the following:
| |
− |
| |
− | *IoT security challenges and requirements
| |
− | *Vulnerabilities and threats for the IoT
| |
− | *Standards and practices for IoT security
| |
− | *Lightweight cryptosystems for the IoT
| |
− | *Adaptive risk management, risk analysis, and risk assessment for the IoT
| |
− | *Identity management, authentication, and anonymity in the IoT
| |
− | *Resiliency and security-effectiveness in the IoT
| |
− | *Security of Wearable and Implantable Body Area Networks
| |
− | *Practical implementation of security mechanisms for the IoT
| |
− | *Distributed monitoring for adaptive security in the IoT
| |
− | *Context-aware threat analysis for the IoT
| |
− | *Formal specification and validation of adaptive security policies for the IoT
| |
− | *Game theory and applications to adaptive security for the IoT
| |
− | *Learning techniques for real-time reaction to security attacks in the IoT
| |
− | *Metrics for adaptive security in the IoT
| |
− | *Verification and testing of adaptive security controls in the IoT
| |
− | *Cross-layer design for energy-effective security mechanisms in the IoT
| |
− | *Adaptive authorization and access control policies for the IoT
| |
− | *Adaptive security engineering for the IoT
| |
− | *Trust modelling and governance for adaptive security in the IoT
| |
− | *User-centered trust in the Internet of Things
| |
− | *Measuring trust in the Internet of Things
| |
− | *Definitions of trust in the Internet of Things
| |
− | *Legal analysis of the Internet of Things
| |
− | *<span style="font-family: arial, sans-serif; font-size: 13px;">Risk-based adaptive security for IoT</span>
| |
− | *<span style="font-family: arial, sans-serif; font-size: 13px;"></span><span style="font-family: arial, sans-serif; font-size: 13px;">Social cognitive algorithms and protocols for IoT</span>
| |
− |
| |
− | == Submission guidelines ==
| |
− |
| |
− | Submitted chapters should conform to the standard guidelines of the Elsevier's book chapter format ([http://www.us.elsevierhealth.com/media/us/files/us/manuscript_guidelines_for_authors.pdf]). Inquiries can be forwarded to <span style="text-align: center;">Dr. Mohamed Hamdi at </span><span style="text-align: center;">mmh@supcom.tn or D</span>r. Habtamu Abie at habtamu.abie@nr.no.
| |
− |
| |
− | == Important dates ==
| |
− |
| |
− | *Chapter submission deadline: December 1, 2014
| |
− | *Notifications and recommendations: January 12, 2014
| |
− | *Camera ready submission: March 2, 2015
| |