[dtn-interest] PMC journal: Special Issue on Security and Privacy in Edge Computing-Assisted Internet of Things (IoT)

Elisabetta Biondi<e.biondi@iit.cnr.it> Thu, 02 August 2018 16:20 UTC

Return-Path: <e.biondi@iit.cnr.it>
X-Original-To: dtn-interest@ietfa.amsl.com
Delivered-To: dtn-interest@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 38E88130E2B for <dtn-interest@ietfa.amsl.com>; Thu, 2 Aug 2018 09:20:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level:
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FROM_MISSP_EH_MATCH=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZQC41NNgBUj0 for <dtn-interest@ietfa.amsl.com>; Thu, 2 Aug 2018 09:20:09 -0700 (PDT)
Received: from smtp.iit.cnr.it (mx4.iit.cnr.it [146.48.98.151]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0D886130E16 for <dtn-interest@irtf.org>; Thu, 2 Aug 2018 09:20:08 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by smtp.iit.cnr.it (Postfix) with ESMTP id E9EE7B80810 for <dtn-interest@irtf.org>; Thu, 2 Aug 2018 18:20:06 +0200 (CEST)
X-Virus-Scanned: Debian amavisd-new at mx4.iit.cnr.it
Received: from smtp.iit.cnr.it ([127.0.0.1]) by localhost (mx4.iit.cnr.it [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TrwBnnLK0n9K for <dtn-interest@irtf.org>; Thu, 2 Aug 2018 18:20:01 +0200 (CEST)
Received: from turig.iit.cnr.it (turig.iit.cnr.it [146.48.98.70]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.iit.cnr.it (Postfix) with ESMTPSA id 3333FB8080E for <dtn-interest@irtf.org>; Thu, 2 Aug 2018 18:20:01 +0200 (CEST)
DMARC-Filter: OpenDMARC Filter v1.3.1 smtp.iit.cnr.it 3333FB8080E
Authentication-Results: smtp.iit.cnr.it; dmarc=none header.from=iit.cnr.it
Date: Thu, 02 Aug 2018 18:20:01 +0200
From: Elisabetta Biondi<e.biondi@iit.cnr.it>
To: dtn-interest@irtf.org
Message-ID: <5b632f31.9NyHOV85cNsViLK9%e.biondi@iit.cnr.it>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/dtn-interest/TbvJVC7Vfbc4S8Fx8pa5u25g2YM>
Subject: [dtn-interest] PMC journal: Special Issue on Security and Privacy in Edge Computing-Assisted Internet of Things (IoT)
X-BeenThere: dtn-interest@irtf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: "The Delay-Tolerant Networking Research Group \(DTNRG\) - Announce." <dtn-interest.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/dtn-interest>, <mailto:dtn-interest-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dtn-interest/>
List-Post: <mailto:dtn-interest@irtf.org>
List-Help: <mailto:dtn-interest-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/dtn-interest>, <mailto:dtn-interest-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Aug 2018 16:20:12 -0000

Call for papers

Pervasive and Mobile Computing (Impact Factor: 2.974)
https://www.journals.elsevier.com/pervasive-and-mobile-computing

Special Issue on Security and Privacy in Edge Computing-Assisted Internet of Things (IoT)



Cloud has been popularly used for handling computation-intensive tasks and providing intelligence to distributed IoT devices. However, as the number of Internet-connected devices is dramatically growing, cloud shows its limit on handling the daunting amount of computation loads on the one hand and the network bandwidth for moving huge volume of data from end devices to cloud becomes the bottleneck on the other hand. Edge computing is an emerging paradigm to optimize cloud-IoT ecosystems for tackling both network bottleneck and reducing data volume. The basic idea behind the edge computing lies in that the data processing such as analytics and knowledge generation are performed in the proximity of data origins. One can see edge devices as small-scale clouds providing comparatively limited functionality and capability, as compared to the centralized cloud. The use of edge devices in the proximity of data origins thus improves network latency. Moreover, the amount of data that need to be processed by each edge device will be substantially less than the amount of data that need to be processed by single cloud.


Despite numerous benefits from edge computing, this paradigm also brings new security and privacy challenges. While edge devices might be smartphones, smart gates, or even PC/laptop, together with the numerous kinds of end IoT devices such as smart watch (e.g., Apple iWatch), implantable medical devices (e.g., fitbit), voice assistants (e.g., Google Home), one can imagine various scenarios with sensitive data usage. For example, the smart watch collects sensitive physiological information. Meanwhile, distributed edge devices need to cooperate with each other without the involvement of the data center. These scenarios obviously result in a high concern of security and privacy, especially on, for example, access control of edge devices, data abuse/misuse, DoS resistance on edge devices.


The aim of this special issue is to collect recent research on security and privacy of edge computing, with particular emphasis on security and privacy issues on edge/end devices. More specifically, we invite recent advanced research on privacy enhancing technologies and secure cryptographic techniques to address security and privacy challenges in the field of edge computing.

The following themes are of particular interest:

Authentication, auditing and accountability in Edge Computing-Assisted IoT Edge computing architectures and solution design patterns Edge computing for IoT Communication and networking protocols for Edge Computing-Assisted IoT Fine-grained access control mechanism in Edge Computing-Assisted IoT Privacy-preserving computation in Edge Computing-Assisted IoT Trust and reputation issues in Edge Computing-Assisted IoT Security architecture for Edge Computing-Assisted IoT Key management in Edge Computing-Assisted IoT IoT communication in Edge Computing-Assisted IoT Incentive models or techniques for data processing in Edge Computing-Assisted IoT Privacy-Enhancing Cryptographic Techniques in Edge Computing-Assisted IoT Security for Crowdsourcing in Edge Computing-Assisted IoT

Guest Editors:

Claudio A. Ardagna
University of Milan, Italy
claudio.ardagna@unimi.it

Mauro Conti
University of Padova, Italy
conti@math.unipd.it

Chia-Mu Yu
National Chung Hsing University, Taiwan
chiamuyu@nchu.edu.tw


Timeline

Submission Deadline: 30 Sep 2018
Acceptance Notification: 30 Jan 2019
Expected Publication: 30 Mar 2019