Special Issue on Internet of Things Security and Forensics
摘要截稿:
全文截稿: 2019-06-13
影响因子: 3.643
期刊难度:
CCF分类: C类
中科院JCR分区:
• 大类 : 计算机科学 - 2区
• 小类 : 计算机:信息系统 - 3区
• 小类 : 电信学 - 3区
Overview
Internet of Things (IoT) adoption rates and market share are growing significantly. With their limitless applications, we are witnessing increased level of connectivity and integration. Average homes already using numerous wirelessly interconnected smart gadgets facilitating data transfer and access. Companies are racing to get their share of the "IoT pie" and those small or integrated devices are not designed with security in mind. Just recently, Mirai botnet attack used IoT to perform DDOS attack that took down many popular websites. As IoT devices find their way into manufacturing facilities and critical infrastructure, the threat is immanent.
As the security community moves towards securing IoT devices, the concern remains over the security of billions of already deployed old IoT devices and whether they can be patched or updated. Hard-coding configurations and passwords, and that devices are free from known vulnerabilities when sold could result in dire consequences. The lack of security standards for IoT devices has resulted in significant waves of attacks. We're beyond attacks on smart TVs and home surveillance cameras. We are witnessing increased industrial control systems and infrastructure attacks including: gas pumps, robots, cars, hospitals systems, implantable medical devices, heating controllers, payment machines, warships...etc.
Topics of interest include (but not limited to):
IoT security standards,
Certified and trusted devices,
IoT vulnerabilities,
Attacks on IoT,
Attacks on industrial control systems,
IoT Malware analysis,
IoT Botnets,
IoT and small devices forensics,
IoT Cybercrime and digital investigation,
Forensic behavioral footprints and biometric analysis of IoT crime scenes
Security and energy efficient scheduling and resource management for IoT,
IoT intrusion monitoring, tracking and detection systems,
Security aware programming, algorithms and applications for IoT systems,
Application of artificial intelligence to IoT cybercrimes and protection,
IoT efficient information sharing and data protection,
Lightweight cryptographic protocols for IoT security and privacy,
Lightweight security and forensics tools for IoT devices,
Security and forensic tools for unmanned autonomous systems.