The 11th International Symposium on Security and Privacy on the Internet of Things

SPIoT 2022


Computer Networks & Wireless Communication Computing Systems



Call for Papers - SPIoT 2022
The 11th International Symposium on Security and Privacy on the Internet of Things
http://ubisecurity.org/SPIoT/2022/
Easychair submission page: https://easychair.org/conferences/?conf=spiot2022
November 15-18, 2022
Zhangjiajie, China
----------------------------------------------------------------------------
Important dates:
Paper submission deadline: June 15, 2022
Author notification: August 15, 2022
Camera Ready due: September 15, 2022
Registration: September 15, 2022
Symposium Date: November 15 - 18, 2022
----------------------------------------------------------------------------
*** The Symposium ***
This year the 11th SPIoT will be held in conjunction with the 2nd International Conference on Ubiquitous Security (UbiSec 2022), in Zhangjiajie, China, on November 15-18, 2022.
*** CfP ***
The Internet of Things (IoT) regarded by most as the Internet’s next evolutionary phase, can be perceived as a global network that brings together physical objects with sensing, actuating, and communicating capabilities. The goal is to connect devices that are able to self-configure and self-adapt to contextual changes through collaboration, instead of expecting direct human input. Nevertheless, this seamless integration of the cyber capabilities of the corresponding devices with the physical world is poised to take the threats against this technology to the next level. In this context, every threat against IoT may constitute a threat against the physical assets of systems and such threats may even be translated to the loss of human lives.
The focus of SPIoT is on high-quality research papers about the state of the art in a wide range of IoT-related technologies:
- Security and privacy in heterogeneous IoT.
- Secure and Privacy Preserving Data Mining and Aggregation in IoT applications.
- Cross-domain trust management in smart networks.
- Secure authentication of IoT devices.
- MAC layer security protocols for the IoT applications.
- IoT security mechanisms targeting application layer protocols.
- Resource-savvy Intrusion Detection for Networks of Things.
- IoT-based malware mitigation.
Proceedings: All accepted papers will be published by Springer CCIS (Communications in Computer and Information Science) conference proceedings (indexed by Ei Compendex).
Best papers after further revisions will be invited for possible publications in a number of special issues.