dcsimg

Security and Trusted Computing for Industrial Internet of Things

Submission Deadline: 31 May 2018

Submission Deadline: 31 May 2018

IEEE Access invites manuscript submissions in the area of Security and Trusted Computing for Industrial Internet of Things.

Industrial IoT (IIoT) interconnects critical devices and sensors in essential infrastructure industries and scenarios with existing IoT applications. Generally, IIoT deployment allows organizations and users to gain invaluable insights into industrial processes and achieve high productivity gains while reducing cost. In the meantime, IIoT also exposes industrial systems and operational technology to cyber attacks, malware, hacktivism, and other security risks.

The objective of this Special Section in IEEE Access is to compile recent research efforts dedicated to strengthen the security foundations of IIoT systems. For example, topics include areas of industrial control systems, real-time access, trustworthiness of IIoT devices, secure service interoperability, resource constraints, data security, and information privacy, as well as the perspectives of system security policies and complete protection mechanisms, covering hardware, firmware, software, middleware and information assurance.

This Special Section solicits high quality and original work on recent advances in applied cryptography, security, and trust computing for IIoT systems.

The topics of interest include, but are not limited to:

  • Physical layer security
  • Cellular security
  • Data certification in IoT
  • Design and implementation of lightweight cryptographic primitives
  • Secure architectures and protocol design in IoT
  • Secure M2M communications
  • Reliable interactions with network services
  • Trusted IoT platform design
  • Data assurances in IoT
  • Vulnerability detections in IoT
  • Anonymous authentication
  • Secure data search and information retrial in IoT
  • Industrial applications with privacy and security protection
  • Threats and attached detection theories
  • Intrusion detection over critical infrastructure
  • Data reliability and trust
  • Cloud-based security for IoT
  • Terminal and edge computing security
  • Security management and orchestration of NFV and SDN elements
  • Trusted computing with NFV and SDN
  • Blockchain technologies for IoT
  • Software vulnerability testing, or reverse engineering
  • Risk assessment in Io industrial IoT and applications

We also highly recommend the submission of multimedia with each article as it significantly increases the visibility, downloads, and citations of articles.

Associate Editor: Kim-Kwang Raymond Choo, University of Texas at San Antonio, USA

Guest Editors:

  1. Shancang Li, University of the West of England, UK
  2. Zhiyuan Tan, Edinburgh Napier University, UK
  3. Xiangjian He, University of Technology Sydney, Australia
  4. Jiankun Hu, University of New South Wales, Australia

 

Relevant IEEE Access Special Sections:

  1. Research Challenges and Opportunities in Security and Privacy of Blockchain Technologies
  2. The Internet of Energy: Architectures, Cyber Security, and Applications
  3. Convergence of Sensor Networks, Cloud Computing, and Big Data in Industrial Internet of Things

 

IEEE Access Editor-in-Chief: Michael Pecht, Professor and Director, CALCE, University of Maryland

Paper submission: Contact Associate Editor and submit manuscript to:
http://mc.manuscriptcentral.com/ieee-access

For inquiries regarding this Special Section, please contact:  Shancang.li@uwe.ac.uk and Raymond.Choo@utsa.edu