EAI SPNCE 2021 will be held as a fully-fledged online conference.
In 2020, EAI successfully launched an online conference format to ensure the safety, comfort and quality of experience for attendees and a successful course of the events, all while retaining fully live interaction, publication and indexing. Due to the unrelenting global pandemic, this will also be the case in 2021.
Although we will miss having everyone meet and connect in person, we feel strongly that knowledge exchange must continue, if not more so. That is why we have equipped our online conferences with live viewing with chat, virtual Q&A, and a multitude of other measures to provide you with a great experience. Learn more about EAI’s online conferences.
In the emerging Internet of Everything era, various smart and embedded devices (e.g., smart cameras, smart electronic devices and smartwatches) have been integrated into our lives and form the Internet of Things (IoT). However, the large-scale deployment of smart mobile devices is confronted with many new challenges, especially in terms of security and privacy. For example, smart mobile devices are generally of limited computation capability and restricted storage and energy, and thus adopting security and privacy solutions that employ expensive cryptographic primitives will not be practical. Meanwhile, smart mobile devices are typically small devices with a restricted screen, keyboard and interfaces. Consequently, existing security and privacy solutions may not be sufficiently user-friendly or completely unviable. In addition, smart mobile devices are often capable of transparently monitoring many sensitive activities and data of users’ lives (e.g., location, health, preference and correspondence), and hence more stringent security and privacy demands are required than that of traditional computing devices.
For another example, cloud computing cannot support ultra-fast computing. It cannot provide the required real-time and reliable services, which are essential for mission-critical systems. Fortunately, edge computing can provide flexible and on-demand processing power. The large-scale nature of IoT can be effectively and efficiently supported and assisted by edge systems. This is referred to as edge-assisted IoT. Even if the coupling of edge computing and IoT bring a new level of convenience to our lives, they are much more vulnerable to many new and unknown attacks from traditional computing domains. For example, IoT often collects sensitive and private information about the physical environment. Therefore, edge-assisted IoT has become an ideal target for various security and privacy threats in the IoT ecosystems.
Thus, we call for efforts to investigate the security and privacy issues of the above-mentioned within the IoT, and propose new ideas for addressing them.
Welcome to the EAI Community
Let the EAI Community help you build your career with collaborative research, objective evaluation, and fair recognition:
- Get more visibility for your paper and receive a fair review with Community Review,
- Earn credits regardless of your paper’s acceptance and increase your EAI Index for new membership ranks and global recognition,
- Find out if your research resonates – get real-time evaluation of your presentation on-site via EAI Compass.
The works that will be presented at the conference will focus on the following topics:
- Access control and authentication for smart mobile devices
- Measurement of privacy leakage for smart mobile devices
- Data privacy for smart mobile devices Information leakage detection and prediction for smart mobile devices
- Privacy-enhancing technologies for smart mobile devices
- New security and privacy paradigms for smart mobile devices
- Attacks on security and privacy mechanisms for smart mobile devices
- Human aspects in security and privacy for smart mobile devices
- Foundational principles for lightweight security and privacy
- Evaluation metrics for security and privacy on smart mobile devices
- Key management for security and privacy on smart mobile devices
- Identity and access management in the Internet of Things
- Measurement of privacy leakage in the Internet of Things
- Multi-factor authentication for smart mobile devices
- Continuous/implicit authentication for smart mobile devices
- New attacks on edge-assisted IoT
- Threat models and defensive mechanisms for edge-assisted IoT
- Authentication techniques for edge-assisted IoT
- Physical security for edge-assisted IoT
- Data privacy for edge-assisted IoT
- Data outsourcing for edge-assisted IoT
- Secure access to outsourced data
- Computation outsourcing for edge-assisted IoT
- Privacy-aware location-based services
- System and software security for edge-assisted IoT
- Cryptographic techniques for securing edge-assisted IoT
All registered papers will be submitted for publishing by Springer and made available through SpringerLink Digital Library.
Proceedings will be submitted for inclusion in leading indexing services, such as Web of Science, EI Engineering Index (Compendex and Inspec databases), DBLP, EU Digital Library, Google Scholar, IO-Port, MathSciNet, Scopus, Zentralblatt MATH.
Authors of selected papers will be invited to submit an extended version to:
- Mobile Networks and Applications (MONET) Journal (IF: 2.602)
- Wireless Communications and Mobile Computing (WIREL COMMUN MOB COM) Journal (IF: 1.819): Special issue on Attacks, Challenges, and New Designs in Security and Privacy for Smart Mobile Devices.
- Security and Communication Networks (SECUR COMMUN NETW) Journal (IF: 1.288): Special issue on Security and Privacy for Edge-Assisted Internet of Things
All accepted authors are eligible to submit an extended version in a fast track of:
- EAI Endorsed Transactions on Internet of Things (Open Access)
- EAI Endorsed Transactions on Security and Safety (Open Access)
- EAI Endorsed Transactions on Scalable Information Systems (Open Access) – indexed in ESCI & Ei Compendex
Additional publication opportunities:
Papers should be submitted through EAI ‘Confy+‘ system, and have to comply with the Springer format (see Author’s kit section).
All conference papers undergo a thorough peer review process prior to the final decision and publication. This process is facilitated by experts in the Technical Program Committee during a dedicated conference period. Standard peer review is enhanced by EAI Community Review which allows EAI members to bid to review specific papers. All review assignments are ultimately decided by the responsible Technical Program Committee Members while the Technical Program Committee Chair is responsible for the final acceptance selection. You can learn more about Community Review here.
Full Paper Submission deadline
5 August 2021
19 September 2021
19 October 2021
Start of Conference
10 December 2021
End of Conference
11 December 2021
Late Track – New!
Full Paper Submission deadline
1 October 2021
18 October 2021
18 November 2021