Apr 222016
 
securityiot

This upcoming issue of Cutter IT Journal seeks articles on new approaches, strategies, and solutions to help IT professionals address and prevent the possibility of cyber attacks stemming from IoT related devices.

Cyber threats have been on the rise, and more so with the advent of the Internet of Everything (IoE). Common appliances are now featuring intelligent processing and real-time connections to the Internet. Health measurements are now collected in real-time by smart wearables, including general purpose smart watches. The latest models from automobile manufacturers feature cloud connectivity for enabling remote software updates, tracking fuel consumption, and streaming dashcam activity. On a larger scale, the smart grid ensures seamless and dynamic allocation of energy where and when it is needed, and in the process making renewable sources of energy more practical.

There is no doubt that these innovations have immense practical benefits, but they also introduce new threats in cyberspace. For instance, ensuring the confidentiality and privacy of health data collected via a wearable device is challenging in light of its small size, low processing power, and need for energy efficiency. For systems involving sensing and actuation, consideration is needed for the physical impact of a possible cyber attack. Such scenarios might include an adversary spoofing a GPS signal, then hijacking control of a small drone in flight and in turn directing it towards a crowd; or a malware-infected music file launching a denial of service attack on the control area network of an automobile, to name a few.

This issue of Cutter IT Journal seeks articles that will provide strategies and approaches to address cyber threats and to ensure the privacy and security of data collection processes and devices.

Topics may include, but are not limited to, the following:

  • How can the challenges of security by design for the IoT be addressed?
  • How can social engineering and phishing threats and/or attacks be combatted?
  • What are the risks of security issues in machine/artificial intelligence?
  • How can cloud integration security be accomplished?
  • What human factors affect security in the IoE?
  • What types of privacy enhancing technologies are available?
  • What are the security challenges/solutions for wearables and smart homes?
  • How can automotive security threats be addressed?
  • What types of security measures should be implemented for autonomous and driverless vehicles?
  • What are the challenges of cyber-physical system security and how can they be addressed?
  • How can sensory channel attacks be prevented?
  • How can emission security and side-channel attacks be addressed?

DEADLINE TO SUBMIT AN ARTICLE IDEA: MAY 23, 2016
Please respond to Charalampos Z. Patrikakis at bpatr[at]teipir[dot]gr, and George Loukas at G[dot]Loukas[at]greenwich[dot]ac[dot]uk with a copy to cgenerali[at]cutter[dot]com and include an extended abstract and a short article outline showing major discussion points.

ARTICLES DUE JULY 2, 2016

EDITORIAL GUIDELINES

avatar

Christine Generali

Christine Generali is a Group Publisher for Cutter Consortium - responsible for the editorial direction and content management of Cutter's flagship publication, Cutter IT Journal.

Discussion

 Leave a Reply

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

(required)

(required)