[AISWorld] CFP: IEEE CEM; SI on Secure and Resource Efficient Computing in Internet of Things

Deepak Puthal Deepak.Puthal at student.uts.edu.au
Tue Jul 18 02:46:42 EDT 2017


[Apologies if you receive multiple copies of this message]

IEEE Consumer Electronics Magazine [Impact Factor: 1.153]

Special issue on: Secure and Resource Efficient Computing in Internet of Things
(http://cesoc.ieee.org/call-for-papers.html)

Submission Deadline: September 30, 2017

The current activities in Internet of Things (IoT) are focused on architectures & protocols for efficient interconnection of heterogeneous Things, Infrastructure deployment and creation of Value-Added Services. IoT is the latest Internet evolution that incorporates billions of Internet-connected devices that range from cameras, sensors, RFIDs, smart phones, and wearables, to smart meters, vehicles, medication pills, signs and industrial machines. IoT devices can deliver timely and accurate information that is needed to solve Internet-scale problems that have been too difficult to tackle before. Current IoT infrastructure deployed with smart sensing devices with limited computational capabilities (named as edge devices). Real time computing in such resource constraint edge devices is a challenging task whereas edge computing plays a vital role in IoT systems while implementing real-time computing. Edge computing is a novel paradigm that extends distributed computing and related services to the edge of the IoT networks with limited resources and computational power. As a result, edge computing became Quality of Service (QoS) parameter for IoT infrastructure.

The heterogeneous nature of the IoT networks as well as the computational constraints of many of the building blocks of IoT systems make security a challenging problem to solve on the one hand, while security play a critical role for most if not all applications of IoT in domains such as surveillance, healthcare, security, transport, food safety, manufacturing, logistics and supply chain management. Without effective solutions for security, privacy and trust-reliable data fusion and mining, qualified services with context-aware intelligence and enhanced user acceptance and experience cannot be achieved. This special issue focuses on cutting-edge research from both academia and industry, with an emphasis on novel techniques and tools in secure and resource-efficient computing in Internet-of-Things to these problems, with a multidisciplinary approach.
Topic of interest include, but not limited to following
• Theoretical analysis for IoT computing systems
• Edge computing architectures and solution design patterns
• Edge computing for Internet of Things
• Storage, data, and analytics for edge computing design and networking
• Cryptography algorithms for IoT
• Secure and efficient implementation of cryptographic algorithms for IoT
• Security, Privacy and Trust (PST) management of IoT
• Big-data trust, security and privacy in IoT
• Sensor Key Management Protocols
• Key management and distribution
• Validations and Testbed

Author Guidelines

The authors are required to submit full papers describing original research. All submissions should be written in English with a maximum paper length of eight pages (10-point font) in a standard IEEE two-column format - http://goo.gl/1yszpb.

Submission instructions

Submissions should follow IEEE standard template and should consist of the following: (i) A manuscript of maximum 8-page length: A pdf of the complete manuscript layout with figures, tables placed within the text, (ii) A source file in Word or Latex format, and (iii) High resolution original photos and graphics as JPEG files are required for the final submission. Images embedded in Word or Excel documents are not suitable; however, figures and graphics may be provided in a PowerPoint slide deck, with one figure/graphic per slide. Articles which have been previously published at a conference needs to have at least 40% new material as clarified in the cover letter of the submission The manuscripts need to be submitted online using the following URL: http://mc.manuscriptcentral.com/cemag. The authors need to select "Special Section: Secure and Resource Efficient Computing in IoT" in Step-1 of submission process to ensure that the article is reviewed for this Special Call. For any questions, please contact guest editor Dr. Deepak Puthal.

Timeline (Tentative):

Submission deadline: September 30, 2017
 Reviews due (accept/reject notification): November 30, 2017
Notification of final acceptance: February 28, 2017
Publication: End of 2018

Editor-in-Chief:
Saraju P. Mohanty University of North Texas, Denton, TX, USA

Guest editors:
Deepak Puthal (Corresponding guest editor)
School of Computing and Communications
University of Technology Sydney, Australia
Email: Deepak.Puthal at uts.edu.au<mailto:Deepak.Puthal at uts.edu.au>

Xuyun Zhang
Department of Electrical and Computer Engineering
The University of Auckland, New Zealand
Email: xuyun.zhang at auckland.ac.nz<mailto:xuyun.zhang at auckland.ac.nz>



More information about the AISWorld mailing list