Scroll Top

Workshop on Industrial Internet of Things Security (WIIoTS)

Workshop on Industrial Internet of Things Security (WIIoTS) (in conjunction with Global IoT Summit 2018)

Bilbao, Spain, June 4-7, 2018

Submission due:  Feb 16, 2018 (GMT)

Conference Outline:

The Industrial Internet of Things (IIoT) is an emerging paradigm in today’s (control) industry, comprising Internet-enabled cyber-physical devices with the ability to couple to the new interconnection technologies such as cloud/fog computing. Under this perspective, the new industrial cyber-physical “things” can be accessible and available from remote locations, the information of which can be processed and stored in distributed locations, favoring the cooperation, the performance in field, and the achievement of operational tasks working at optimal times. However, the incorporation of the IIoT in the new scenarios of the fourth industrial revolution, also known as Industry 4.0, entails having to consider the new security and privacy issues that can threaten the wellbeing of the new IIoT ecosystem and its coexistence with the existing industrial technologies, with a high risk of impact on the end-users.

Therefore, this workshop will create a collaboration platform for experts from academia, governments and industry to address the new IIoT security and privacy challenges. Papers related to security and privacy of embedded systems working in industrial and control environments, such as SCADA, smart grid, smart cities, manufacturing systems, water systems, and in critical infrastructures in general, are all welcome at WIIoTS 2018. The technical topics of interest for this workshop include, but are not limited to:

• Interoperable IIoT ecosystem-level security and privacy challenges
• IIoT governance, regulation and standards
• Cross-layer threat modelling in IIoT and risk assessment 
• Lightweight cryptography and key management
• Lightweight IIoT security protocols and AAA services for IIoT 
• Collaborative and trustworthy IIoT frameworks and architectures
• Privacy-preserving models and anonymization techniques for IIoT 
• Secure IIoT data storage and Big Data
• Location privacy and trust management 
• Intrusion detection, anomaly diagnosis and situational awareness for IIoT
• Response and resilience to IIoT cyber-attacks
• Incident management and IIoT forensics
• Case studies and practical validations: SCADA, energy, water, smart factory, etc.

Important Dates:
• Submission due:  Feb 16, 2018 (GMT)
• Notification:  Mar 31, 2018
• Camera-ready due:  Apr 30, 2018

Program Chair:
• Cristina Alcaraz (University of Malaga, Spain)

General Co-Chairs:
• Javier Lopez (University of Malaga, Spain)
• Yan Zhang (University of Oslo, Norway) 

Publicity Chair:  
• Juan E. Rubio (University of Malaga, Spain) 

Technical Program Committee:
• Alvaro Cardenas (University of Dallas, USA) 
• Christos Xenakis (University of Piraeus)
• Dimitris Gritzalis (Athens University of Economics and Business)
• Federica Pascucci (University of Roma Tre, Italy) 
• Kim-Kwang Raymond Choo (University of Texas, USA) 
• Luca Faramondi (University Campus Bio-Medico)
• Mihalis Psarakis (University of Piraeus, Greece) 
• Nils Ole Tippenhauer (Information Systems Technology and Design (ISTD), Singapore) 
• Panayiotis kotzanikolaou (University of Piraeus, Greece) 
• Rodrigo Roman (University of Malaga, Spain) 
• Sherali Zeadally (University of Kentucky, USA) 
• Urko Zurutuza Ortega (University of Mondragon, Spain)
• Xinyi Huang (Fujian Normal University, China) 

Submission Instructions:
Final submissions must not substantially overlap papers already or simultaneously submitted to a journal or a conference with proceedings. Their contents should be written in English with a maximum paper length of six (6) printed pages see web conference for instructions. Papers must be submitted through EDAS.

“IEEE reserves the right to exclude a paper from distribution after the conference, including IEEE Xplore® Digital Library, if the paper is not presented by the author at the conference.”
WIIoTS Home: