![]() * Negative externalities and other economic costs of pervasive security. * Securing safety-critical systems-such as national infrastructure (energy, transportation, payment, and so on), smart cars, and medical devices. * Managing the security of large numbers of pervasive devices across heterogeneous deployments. * Illicit surveillance of people and places through smart appliances and other Internet-enabled things. * IoT-related ransomware, malware, and malvertisement services and architectures. * Using blockchain technology to secure the IoT. ![]() * Analysis, detection, and prevention of IoT botnets. Relevant topics for this special issue include, but are not limited to, the following: We welcome a wide range of research papers including descriptions of completed systems, experience reports, new insights into specific technologies, novel algorithms and vision papers that articulate new challenges for the field. Contributions might come from diverse fields such as human-computer interaction, distributed systems, dependable computing, psychology and sociology, IoT, cyber-physical systems, ubiquitous computing, ambient intelligence, legal scholarship and ethics, and economics. The aim of this special issue is to explore new technologies, methodologies, and applications that relate to all aspects of securing future pervasive computing systems and infrastructures. The future of pervasive computing certainly looks bleak, unless we are able to secure smart environments more effectively in the future. The lack of IoT security has since led to a number of significant real-world attacks, such as the IoT-based "Mirai" botnet in late 2016, or the February 2017 Denial-of-Service attack on a university from its own IoT-enabled vending machines and light switches. Researchers have already demonstrated how to take control of an Internet-enabled car or hack a range of wireless medical devices. ![]() Unfortunately security has lagged behind in the race to build new applications and services. The Internet of Things is taking off: Internet-enabled computers are now embedded in everything from cars to pacemakers, and from electronic door locks to home heating controllers. Publication date: July-September 2018 Issue Marc Langheinrich, Università della Svizzera italiana (USI), Switzerland *The Specter of Malicious Computing: Securing the Internet of Things*Īlastair Beresford, University of Cambridge, UK Messages sorted by: Ĭall for Papers, IEEE Pervasive Computing Magazine, Special Issue.Next message (by thread): Funded PhD studentship in the UCL Interaction Centre.Previous message (by thread): Last Call for Posters and Demos: 6th D-A-CH+ Conference on Energy Informatics (EnInf 2017), Lugano, Switzerland, October 5-6, 2017. ![]() CFP: Securing the IoT (IEEE Pervasive Magazine, Submission Deadline: Oct 1, 2017) marc.langheinrich at usi.ch marc.langheinrich at usi.ch CFP: Securing the IoT (IEEE Pervasive Magazine, Submission Deadline: Oct 1, 2017) ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |