{"id":1601,"date":"2021-04-12T16:48:33","date_gmt":"2021-04-12T16:48:33","guid":{"rendered":"https:\/\/seeda2021.uowm.gr\/?page_id=1601"},"modified":"2021-06-14T06:08:13","modified_gmt":"2021-06-14T06:08:13","slug":"security-privacy-dynamicity-adaptation-and-continuity-of-access-in-internet-of-things","status":"publish","type":"page","link":"https:\/\/seeda2021.uowm.gr\/security-privacy-dynamicity-adaptation-and-continuity-of-access-in-internet-of-things\/","title":{"rendered":"Security, Privacy, Dynamicity, Adaptation and Continuity of Access in Internet of Things"},"content":{"rendered":"
During the last decades we have witnessed the evolution of smart devices. Nowadays, the number of connected devices at the end of the last decade (2020) exceeded 30 billion. This interconnection of smart devices creates the Internet of Things (IoT) world where IoT devices become pervasive to our lives. As with all new technologies there are risks. Most IoT devices lack of even the basics of protection, thus becoming weak points in the network. Consumer IoT devices has entered our lives and changed the way we live, replacing old devices. Nowadays, we rely more and more on such devices even for our everyday needs.<\/p>\n
Furthermore, in corporate domains we no longer rely on the fact that all devices that are connected to a corporate network are trusted and secure. Moreover, with the outburst of the Corona virus pandemic, we see that the corporate network perimeter concept is no longer valid and employees doing home office need to use IoT devices during their work. This must be done in such a secure way that the corporate network facilities remain trusted, and the access control violation is reduced to minimum. This leads to the fact we should focus on enabling the national and international institutions, corporations, and individuals to exercise sovereignty on their data, resources, and digital assets.<\/p>\n
Mediating access requests via mechanisms implementing regulations established by security policies has become of paramount importance in both consumer IoT as well as when smart devices are used in corporate networks. Additional drawbacks of IoT devices are the lack of standardization and privacy mechanisms. IoT devices vary on various aspects, most importantly on the way they communicate, exchange information and control access requests and handle privacy of user data. So, ensuring privacy in personal data use including consent, transparency, unlinkability and intervenability (empowering the data subject to control Who, Where, When and How may use its personal data) has become of paramount importance. There are several examples in the recent literature indicating all the aforementioned problems.<\/p>\n
This session targets on novel ideas towards security, privacy, dynamicity, adaptation, and Continuity of Access in the area of IoT.<\/p>\n
<\/p>\n
Authors are invited to submit their original work that has not previously been submitted or published in any other venue. Each paper length should not exceed\u00a08<\/strong>\u00a0pages. All papers need to be in\u00a0IEEE CS format<\/u><\/a><\/strong>\u00a0and submitted via the dedicated\u00a0Easychair submission site<\/strong><\/a> according to the instructions on the Initial Submissions<\/a> page.<\/p>\n Extended versions of selected papers will be included in three Special Issues in\u00a0Telecom<\/span><\/i><\/b><\/a><\/span>\u00a0<\/i><\/b>(100% APC-waived),\u00a0Signals<\/span><\/i><\/b><\/a><\/span>\u00a0<\/i>(discount or 100% APC-waived) and\u00a0Information\u00a0<\/i><\/b><\/a>(50% APC-waived)\u00a0MDPI journals.<\/p>\n <\/p>\nSpecial Session Organizers<\/strong><\/h4>\n