• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Digital Library
  • /Magazines
  • /Sp
  • Home
  • / ...
  • /Magazines
  • /Sp

CLOSED Call for Papers: IoT Security and Privacy

Call for Papers for IEEE Security & Privacy

Submissions due: CLOSED

Publication date: Sept/Oct 2019 (or Nov/Dec 2019)

This special issue will explore security and privacy issues related to the Internet of Things (IoT): embedding processor-based systems in physical infrastructure at massive scale, including in things that neither look like computers nor communicate using the Internet Protocol. We aim to give particular focus to smart homes, consumer devices, embedded systems, and supporting infrastructures. Important IoT issues also arise in connection with critical infrastructure, cyber-physical systems, customized industrial IoT, smart medicine, and smart automobiles; however, these topics have been dealt with in other issues, and are not of special focus on this occasion.

We seek submissions on all topics related to IoT security and privacy. Topics of particular interest include:

  • System and software security of home IoT devices
  • Lightweight cryptography, protocols, and standards for home (consumer) IoT
  • Trust management for home IoT
  • Security and privacy management of home IoT devices
  • Life cycle issues, including aging and updates of devices, and aging of vendors
  • Security issues arising due to multiple IoT deployment silos within a home
  • Security issues arising due to the overall architecture for home IoT applications—includingcloud, and aggregate data
  • Novel privacy, liability, and legal issues raised by home IoT
  • Malware in home IoT

Questions should be addressed to the GUEST EDITORS:

Paul C. van Oorschot (paulv@scs.carleton.ca), Carleton University, Canada

Sean Smith (sws@cs.dartmouth.edu), Dartmouth College, USA

Submission guidelines

Before submitting, please be aware that IEEE Security & Privacy is not a research journal. For an overview of what we publish click here.

Submissions will be subject to the IEEE Computer Society’s peer-review process. Articles should be at most 6,000 words, have at most 15 references, and be understandable to a broad audience interested in security, privacy and dependability. The writing style should be down-to-earth, practical, and original. Authors should not assume that the audience has specialized experience in a particular subfield. Accepted articles will be edited by a staff editor according to the IEEE Computer Society style guide. Submit papers to ScholarOne at https://mc.manuscriptcentral.com/cs-ieee.

If any portions of the technical content have been published elsewhere by the authors, the submission must include significant new writing to address a wider audience and expand on the context and implications, with any prior publication clearly acknowledged. Case studies or descriptions of practical deployments need not be original research, but must provide a comprehensive account.

When uploading your paper, select the appropriate special issue title under the category “Manuscript Type” and include complete contact information for all authors.

LATEST NEWS
From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities
From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Autonomous Observability: AI Agents That Debug AI
Autonomous Observability: AI Agents That Debug AI
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Read Next

From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities

IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT

Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)

Autonomous Observability: AI Agents That Debug AI

Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference

Copilot Ergonomics: UI Patterns that Reduce Cognitive Load

The Myth of AI Neutrality in Search Algorithms

Gen AI and LLMs: Rebuilding Trust in a Synthetic Information Age

FacebookTwitterLinkedInInstagramYoutube
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter