Guest Editors
Akshi Kumar (Lead Guest Editor), Delhi Technological University, New Delhi, India, [email protected] Kumar, Sharma Institute of Information Technology and Management, New Delhi, India, [email protected] A. Karras, National Kapodistrian University of Athens (NKUA), Greece, [email protected] Unhelkar, University of South Florida, USA, [email protected]
There has been an upsurge in the use of mobile services, sensors, and application data to better help understand user behaviour, and to gain tangible benefits from, the Internet of Things (IoT).
There is a great deal of research on the applications of pervasive and ubiquitous computing including mobile health, transportation, energy, and urban planning, amongst others.
The Web of Things (or WoT) aims to provide a single universal application layer protocol which enables things to communicate with each other in a seamless way and to facilitate interoperability across platforms and application domains.
While communication between objects and across the web is a focal point of WoT, the approach inherits the same security and privacy issues already present in the Internet. These issues are around the heterogeneous and the constrained nature of devices, identity management, privacy, physical as well as digital access to devices, and trust. Also, new threat vectors have emerged that amplify conventional hacking methods, enabling large?scale and intelligence?driven attacks against a variety of platforms, including mobile, cloud, IoT, as well as conventional networks.
Machine Learning (ML) has emerged as one of the most effective computational paradigms to provide embedded intelligence in IoT devices. The goal is to monitor users, devices and networks to form patterns and at the same time generate reliable actionable information about threats, vulnerabilities and intrusion with minimal human intervention, providing holistic security and privacy solutions.
This issue aims to stimulate discussions about security and privacy in WoT, ubiquitous and mobile computing environments. Papers that describe innovative ML techniques and novel security and privacy solutions are strongly encouraged, especially around identity management, data confidentiality, authorization and access control and in general the dynamics of context aware systems.
Topics
Topics of interest for this issue include, but are not limited to:
Important Dates
Paper submission due: March 25, 2021First notification: May 30, 2021Revisions due: July 25, 2021Final decision: September 30, 2021
Submissions
Submissions should be original papers and should not be under consideration for publication elsewhere.
Extended versions of papers from relevant conferences and workshops are invited as long as the additional contribution is substantial (at least 30% of new content).
Authors should follow the formatting and submission instructions for Personal and Ubiquitous Computing at https://www.springer.com/journal/779.
For more information visit the Springer Nature Information for journal Article Authors pages at https://www.springer.com/gp/authors-editors/journal-author
During the first submission step in Editorial Manager select Original article as the article type. In further steps, you should confirm that your submission belongs to this special issue by choosing the special issue title from the drop-down menu.
All papers will be peer-reviewed.