Cyber-Physical Systems (CPS) consist of large-scale interconnected systems of heterogeneous components interacting with their physical environments. In the CPS realm, humans and/or smart networked devices interact with and control the physical world around them through actuators, sensors, etc. "CPS is envisioned to transform the way people interact with engineered systems, just as the Internet transformed the way people interact with information." (US National Science Foundation). Today, the boundary between cyber and physical systems is blurring. Indeed, cyber devices that can interact with the physical world are on the rise. For instance, smart phones and tablets are all equipped with various sensors (e.g., accelerometers, GPS), which enable the vision of CPS by allowing human beings to interact with the physical world. Similarly, a multitude of CPS devices and applications exist in industrial, transportation, medical, home‑security, building automation, emergency management, power, and many other systems, which serve critical functions in our lives. Given the popularity of the CPS applications, securing them against malicious activities is of utmost importance. Otherwise, malfunctioning and insecure CPS devices and applications can cause enormous damage to individuals, businesses, and nations.
Therefore, the IEEE International Workshop on Cyber‑Physical Systems Security (CPS‑Sec) seeks novel submissions describing practical and theoretical solutions to the cyber security challenges facing CPS. Submissions may represent any application area for CPS. Hence, papers that are pertinent to the security of embedded systems, Internet of Things, SCADA Systems, Smart‑Grid Systems, Critical Infrastructure Networks, Transportation Systems, Medical Devices are all welcome.
Example topics of interest are given below, but are not limited to:
- Secure CPS architectures
- Authentication mechanisms for CPS
- Access control for CPS
- Key management in CPS
- Data security and privacy for CPS
- Forensics for CPS
- Intrusion detection for CPS
- Trusted-computing in CPS
- Energy-efficient and secure CPS
- Availability, recovery and auditing for CPS
- Distributed secure solutions for CPS
- Threat models for CPS
- Physical layer security for CPS
- Security on heterogeneous CPS
- Secure protocol design in CPS
- Vulnerability analysis of CPS
- Anonymization in CPS
- Security of CPS in automotive systems
- Security of CPS in aerospace systems
- Security of embedded systems
- Security of CPS in medical devices/systems
- Security of CPS in civil engineering systems/devices
- Security of industrial control systems
- Security of Internet-of-Things
Submitted papers must represent original material that is not currently under review in any other conference or journal, and has not been previously published. All submissions must be written in English with a maximum paper length of 5 (five) pages (including text, figures, and references) and formatted according to the two-column IEEE conference format. Accepted papers will be published in the IEEE Digital Library after the conference and included in the IEEE CNS proceedings.
Papers should be submitted using EDAS submission system. The submission link is here.
March 5, 2018; March 12, 2018
Acceptance Notification: March 26, 2018
Camera Ready: April 2, 2018
Click here for pdf