[AISWorld] HICSS-54: Internet of Things Security: CyberAssurance for Edge, Software Defined, and Fog Computing Systems Minitrack
Tyson Brooks
dr.tyson.brooks at ieee.org
Mon Mar 16 19:33:43 EDT 2020
*Call for Papers for the Hawaii International Conference on System
Sciences–54 (HICSS-54), January 5-8, 2021: Grand Hyatt, Kauai
(http://hicss.hawaii.edu/) <http://hicss.hawaii.edu/> *
*Mini-Track | Internet of ThingsSecurity: CyberAssurance for Edge, Software
Defined, and Fog Computing Systems *
*Minitrack Chairs:*
Dr. Tyson Brooks, Syracuse University
Dr. Shiu-Kai Chin, Syracuse University
The Hawaii International Conference on System Sciences (HICSS) – has been
known worldwide as one of the longest standing scientific communities in
the information systems and technology fields. Since 1968, it has become a
respected destination that attracts high-caliber scholars and professionals
in academia, industry and government agencies around the world to discuss
their cutting-edge research.
The objective of this mini-track is to increase the visibility of current
research and emergent trends in Cyber-Assurance theory, application,
embedded security and machine-learning for the Internet of Things (IoT),
Edge computing, software-defined networks (SDN)/network function
virtualization (NFV), Serverless, and Fog computing architectures based on
theoretical aspects and studies of practical applications. Cyber-assurance
is the justified confidence that networked systems are adequately secure to
meet operational needs, even in the presence of attacks, failures,
accidents and unexpected events. Cyber-assurance means that IoT systems,
smart internet connected devices (ICD) and networks provide the opportunity
of automatically securing themselves against cyber-attacks. The difference
is that the concept of cyber-assurance must provide embedded, secure
microchips/processors in smart devices and virtual networks that can
continue to operate correctly even when subjected to a cyber-attack.
Leveraging new 5G technologies, IoT devices using Edge computing, SDN/NFV,
Serverless, and Fog computing systems and networks should be able to resist
the various security cyber-attacks such as hacking of networks, devices,
theft of information, disruption, etc. and be able to continue performing
under severe environmental conditions. Through embedded processors and
machine learning algorithms over the transmitted information, the miscoding
and leaking of information during transmission channels has to monitor any
loss, miscoding and leaking of data. Timely adjustments of information with
falling quality and automatic switching to the best routing IoT systems by
making uses of multi-directional routing is also warranted. Cyber-assurance
will need to provide the principles and technologies to unify these systems
to deliver the end-state goal of secure IoT systems for greatly enhanced
interoperability, scalability, performance, and agility.
The target audience of this mini-track will be composed of researchers,
professionals and students working in the field of 5G, cyber-security,
wireless technologies, information system theory, systems engineering,
information security architecture and security system design along with
university professors and researchers involved in information assurance,
cyber-security, IoT, SDN/NFV, Serverless, and Fog computing related
networking. Through the research identified for this track, graduate
students, researchers and academics who want to improve contribute their
understanding of the latest security developments for the IoT, SDN/NFV,
Serverless, and Fog computing. This minitrack will focus on the security
needs of these environments, highlighting key issues and identifying the
associated security implications so that the general participates can
readily grasp the core ideas in this area of research. Recommended topics
for this track include, but are not limited to, the following:
- 5G technology and security
- Hacking IoT/Fog computing networks/devices
- Edge computing security and architectures
- Edge and SDN/NFV security architectures and designs
- IoT/Serverless computing security designs
- Vulnerabilities and exploits in IoT, SDN/NFV architectures
- Automated IoT/Fog computing vulnerability identification,
- Research on automated IoT/Fog computing vulnerability assessment and
intrusion detection tools and techniques
- Genetic algorithms used to spawn and control intelligent agents for
information assurance for IoT/Fog computing devices
- Edge computing network management and visualization tools that support
real time planning and control of tactical nets as well as tools for
intrusion detection and forensic analysis in hybrid computing networks
- Development of secure design methods, architectures, and
implementations to minimize Edge computing power dissipation
- 5G networks for Edge, and IoT/Fog Computing for distributed detection
and estimation
- High frequency 5G IoT Computing devices and modules to enhance
situational analysis and increase the communication functionality
*IMPORTANT DATES FOR PAPER SUBMISSIONS*
**April 20, 2020 | 6:00pm HST:* Paper Submission System Opens
**June 15, 2020** | 11:59pm HST*: Paper Submission Deadline
**August 17, 2020 **| 11:59pm HST*: Notification of Acceptance/Rejection
**September 4, 2020 | 11:59pm HST: *Deadline for Authors to Submit Revised
Accepted Papers
**September 11, 2020: *Notification of Acceptance/Rejection Papers
**September 22, 2020*: Deadline for Authors to Submit Final Manuscript for
Publication
**October 1, 2020*: Deadline for at least one author of each paper to
register for HICSS-54
*PAPER SUBMISSION*
Authors are invited to submit papers electronically in PDF format.
Submitted manuscripts should be structured as technical papers and may not
exceed 10 letter-size (8.5 x 11) pages including all figures, tables and
references. Submissions not conforming to these guidelines may be returned
without review. The official language of the conference is English. All
manuscripts will be reviewed and judged on technical strength, originality,
significance, quality of presentation, and interest and relevance to the
conference attendees. The proceedings will be published through HICSS
conference proceedings. Submitted papers must represent original
unpublished research that is not currently under review for any other
conference or journal. Papers not following these guidelines will be
rejected without review and further action may be taken, including (but not
limited to) notifications sent to the heads of the institutions of the
authors and sponsors of the conference. Submissions received after the due
date, exceeding the page limit, or not appropriately structured may not be
considered.
*PUBLICATION*
Proceedings will be published through the HICSS-54 conference proceedings.
Papers submitted could be accepted as REGULAR papers (10 pages) or SHORT
papers (6 pages), depending on the review scores.
*FAST TRACK JOURNAL OPPORTUNITY*
Authors of papers accepted for presentation in the mini-track will be
offered the opportunity to submit an extended version of their papers for
consideration for fast-track publication in the International Journal of
Internet of Things and Cyber-Assurance [IJITCA] (
http://www.inderscience.com/jhome.php?jcode=ijitca).
*For more details: http://hicss.hawaii.edu/ <http://hicss.hawaii.edu/> Or,
contact the Minitrack Co-Chairs: *Tyson Brooks (Primary Contact)
Syracuse University
ttbrooks at syr.edu
Shiu-Kai Chin
Syracuse University
skchin at syr.edu
More information about the AISWorld
mailing list