Difference between revisions of "ASSET Book"

From Asset
Jump to: navigation, search
Line 42: Line 42:
 
== Submission guidelines ==
 
== Submission guidelines ==
  
Submitted chapters should conform to the standard guidelines of the Elsevier's book chapter format.
+
Submitted chapters should conform to the standard guidelines of the Elsevier's book chapter format ([http://www.us.elsevierhealth.com/media/us/files/us/manuscript_guidelines_for_authors.pdf]). Inquiries can be forwarded to&nbsp;<span style="text-align: center;">Dr. Mohamed Hamdi at&nbsp;</span><span style="text-align: center;">mmh@supcom.tn or D</span>r. Habtamu Abie at habtamu.abie@nr.no.
 
 
Inquiries can be forwarded to&nbsp;<span style="text-align: center;">Dr. Mohamed Hamdi at&nbsp;</span><span style="text-align: center;">mmh@supcom.tn or D</span>r. Habtamu Abie at habtamu.abie@nr.no.
 
  
 
== Important dates ==
 
== Important dates ==

Revision as of 16:21, 6 August 2014

Call for Chapters: Adaptive Security for the Internet of Things

To be published by Elsevier

Co-editors

Mohamed Hamdi, School of Communication Engineering, Tunisia

Habtamu Abie, Norwegian Computing Center, Norway

Book's description

Nowadays, the Internet of Things (IoT) presents a strong focus of research with various initiatives working on the (re)design, application, and use of standard Internet technology in the IoT. In the IoT, physical objects become virtual, meaning that they have locatable, addressable, and readable counterpart on the Internet. The evolution of multimodal sensing, wireless communication, and convergent services enable these objects, called things, to produce and consume network services. Inspite of the huge potential brought by this paradigm, several significant obstacles remain to fulfil the IoT vision, among them security. The mobility, resource scarcity, and heterogeneity of the newly introduced devices consistently affect the efficiency of the traditional protection countermeasures deployed in the Internet. The challenge is to prevent the growth of the malicious actions and to mitigate their impact. To this end, new security mechanisms that adapt to the intrinsic features of the IoT should be developed. Moreover, a key design issue in the IoT is to extend the network lifetime so as to guarantee uninterrupted information exchange and alleviate the burden of replenishing nodes.

The scope of adaptive security in the IoT is broad and requires cross-disciplinary skills since it encompasses many topics. This book assembles these topics into a coherent body of knowledge consisting of theories, case studies, examples, and open problems. The book will present a novel view of the field totally centred on the dynamic context. In fact, one extremely important fact that we underline is that the efficiency of a security solution cannot be rigorously assessed without examining its adequacy to the whole environment it belongs to. Throughout this book, we build a set of formal and practical links to highlight the impact of the context on all the processes of the adaptive security engineering lifecycle. One of the basic ideas which the authors want to imbue into the book is that adaptive security should rely on a accurate representation of the dynamic context encompassing threats, energy-level, and security requirements. Studying and analyzing the tradeoff between security-effectiveness and energy-efficiency will be the focal interest of the book. 

Topics of interest

The areas covered in this book range from basic concepts to research-grade material including future directions. Recommended topics include, but are not limited to, the following:

  • IoT security challenges and requirements
  • Vulnerabilities and threats for the IoT
  • Standards and practices for IoT security
  • Lightweight cryptosystems for the IoT
  • Adaptive risk management, risk analysis, and risk assessment for the IoT
  • Identity management, authentication, and anonymity in the IoT
  • Resiliency and security-effectiveness in the IoT
  • Security of Wearable and Implantable Body Area Networks
  • Practical implementation of security mechanisms for the IoT
  • Distributed monitoring for adaptive security in the IoT
  • Context-aware threat analysis for the IoT
  • Formal specification and validation of adaptive security policies for the IoT
  • Game theory and applications to adaptive security for the IoT
  • Learning techniques for real-time reaction to security attacks in the IoT
  • Metrics for adaptive security in the IoT
  • Verification and testing of adaptive security controls in the IoT
  • Cross-layer design for energy-effective security mechanisms in the IoT
  • Adaptive authorization and access control policies for the IoT
  • Adaptive security engineering for the IoT
  • Trust modelling and governance for adaptive security in the IoT

Submission guidelines

Submitted chapters should conform to the standard guidelines of the Elsevier's book chapter format ([1]). Inquiries can be forwarded to Dr. Mohamed Hamdi at mmh@supcom.tn or Dr. Habtamu Abie at habtamu.abie@nr.no.

Important dates

  • Chapter submission deadline: December 1, 2014
  • Notifications and recommendations: January 12, 2014
  • Camera ready submission: March 2, 2015