Submission Deadline: 15 November 2020 (closed) View: 112
The security threats in industrial IoT (IIoT) are rising with smart attacks taking place every day. The increased number of IoT networks now makes malicious attacks easier to abrupt. Malware attacks tend to compromise to jeopardize privacy over the Internet, IoT devices, personal computers and mobile phones as well. The identification of new and unique security threats is applied to the context in which the system operates whenever a new IoT device is introduced. Therefore, protecting the IIoT networks requires ongoing research and development of computationally efficient security protocols to improve communication among various networked IoT devices. This supports the fact that the introduction of any IoT architectures involves a number of changes in conventional networks since many IoT devices are commonly used without taking security implications into account. The issue of threat has become more complicated in the industrial environment because of the need to secure a large number of devices from attack while guaranteeing the functionality of the systems and the real-time response to threats. In such a scenario detection of threat in Industrial Internet of things (IIoT) devices becomes an important factor to avoid injection by malicious IIoT devices. The issue of threat has become more complicated in the industrial environment because of the need to secure a large number of devices from attack while guaranteeing the functionality of the systems and the real-time response to threats. In such a scenario detection of threat in Industrial Internet of things (IIoT) devices becomes an important factor to avoid injection by malicious IIoT devices. The issue of threat has become more complicated in the industrial environment because of the need to secure a large number of devices from attack while guaranteeing the functionality of the systems and the real-time response to threats. In such a scenario detection of threat in Industrial Internet of things (IIoT) devices becomes an important factor to avoid injection by malicious IIoT devices. The special issue invites researchers and academicians to publish selected original articles, and reviews presenting security solutions trends to the industrial Internet of things showing recent major advances and discoveries, significant gaps in the current research.
MAIN TOPICS OF INTEREST
The topics of this workshop include, but are not limited to:
· Security and privacy in IIoT
· Security architectures and protection mechanisms for IIoT
· Threat models and attack strategies for IIoT
· Secure sensors and Industrial IoT
· Threat detection/prevention methods in IIoT
· Trust computation and analysis in IIoT
· Security in Wireless Sensor Networks
· Risk identification and mitigation methods in IIoT
· Emerging lightweight security algorithms and protocols
· Authentication methods in IIoT
· AI and machine learning for intrusion detection in IIoT
· Blockchain technologies in industrial IoT
· Industrial service discovery protocols in IIoT
· Role of fog and edge computing for IIoT
· Hardware support for security in IIoT
· Architectural aspect of secure IIoT
· Industry standard for security in IIoT