[ogsa-wg] CFP: IEEE CEM; SI on Secure and Resource Efficient Computing in Internet of Things

DEEPAK PUTHAL dputhal88 at gmail.com
Fri Sep 22 04:54:02 EDT 2017


[Apologies if you receive multiple copies of this message]

*IEEE Consumer Electronics Magazine [Impact Factor: 1.153**] *

*Special issue on: Secure and Resource Efficient Computing in Internet of
Things *
(http://cesoc.ieee.org/call-for-papers.html)

*Submission Deadline: September 30, 2017 *

The current activities in Internet of Things (IoT) are focused on
architectures & protocols for efficient interconnection of heterogeneous
Things, Infrastructure deployment and creation of Value-Added Services. IoT
is the latest Internet evolution that incorporates billions of
Internet-connected devices that range from cameras, sensors, RFIDs, smart
phones, and wearables, to smart meters, vehicles, medication pills, signs
and industrial machines. IoT devices can deliver timely and accurate
information that is needed to solve Internet-scale problems that have been
too difficult to tackle before. Current IoT infrastructure deployed with
smart sensing devices with limited computational capabilities (named as
edge devices). Real time computing in such resource constraint edge devices
is a challenging task whereas edge computing plays a vital role in IoT
systems while implementing real-time computing. Edge computing is a novel
paradigm that extends distributed computing and related services to the
edge of the IoT networks with limited resources and computational power. As
a result, edge computing became Quality of Service (QoS) parameter for IoT
infrastructure.

The heterogeneous nature of the IoT networks as well as the computational
constraints of many of the building blocks of IoT systems make security a
challenging problem to solve on the one hand, while security play a
critical role for most if not all applications of IoT in domains such as
surveillance, healthcare, security, transport, food safety, manufacturing,
logistics and supply chain management. Without effective solutions for
security, privacy and trust-reliable data fusion and mining, qualified
services with context-aware intelligence and enhanced user acceptance and
experience cannot be achieved. This special issue focuses on cutting-edge
research from both academia and industry, with an emphasis on novel
techniques and tools in secure and resource-efficient computing in
Internet-of-Things to these problems, with a multidisciplinary approach.
Topic of interest include, but not limited to following
• Theoretical analysis for IoT computing systems
• Edge computing architectures and solution design patterns
• Edge computing for Internet of Things
• Storage, data, and analytics for edge computing design and networking
• Cryptography algorithms for IoT
• Secure and efficient implementation of cryptographic algorithms for IoT
• Security, Privacy and Trust (PST) management of IoT
• Big-data trust, security and privacy in IoT
• Sensor Key Management Protocols
• Key management and distribution
• Validations and Testbed

*Author Guidelines *

The authors are required to submit full papers describing original
research. All submissions should be written in English with a maximum paper
length of eight pages (10-point font) in a standard IEEE two-column format
- http://goo.gl/1yszpb.

*Submission instructions*

Submissions should follow IEEE standard template and should consist of the
following: (i) A manuscript of maximum 8-page length: A pdf of the complete
manuscript layout with figures, tables placed within the text, (ii) A
source file in Word or Latex format, and (iii) High resolution original
photos and graphics as JPEG files are required for the final submission.
Images embedded in Word or Excel documents are not suitable; however,
figures and graphics may be provided in a PowerPoint slide deck, with one
figure/graphic per slide. Articles which have been previously published at
a conference needs to have at least 40% new material as clarified in the
cover letter of the submission The manuscripts need to be submitted online
using the following URL: http://mc.manuscriptcentral.com/cemag. The authors
need to select "Special Section: Secure and Resource Efficient Computing
in IoT" in Step-1 of submission process to ensure that the article is
reviewed for this Special Call. For any questions, please contact guest
editor Dr. Deepak Puthal.

*Timeline (Tentative): *

Submission deadline: September 30, 2017
 Reviews due (accept/reject notification): November 30, 2017
Notification of final acceptance: February 28, 2017
Publication: End of 2018

*Editor-in-Chief:*
Saraju P. Mohanty University of North Texas, Denton, TX, USA

*Guest editors: *
Deepak Puthal (Corresponding guest editor)
School of Computing and Communications
University of Technology Sydney, Australia
Email: Deepak.Puthal at uts.edu.au

Xuyun Zhang
Department of Electrical and Computer Engineering
The University of Auckland, New Zealand
Email: xuyun.zhang at auckland.ac.nz
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.ogf.org/pipermail/ogsa-wg/attachments/20170922/f3620f12/attachment.html>


More information about the ogsa-wg mailing list