Special Session On

Trustworthy and Intelligent Edge of Things (TIEoT) for Secure and Reliable Applications

in conjunction with WF-IoT 2024

Description

The Trustworthy Intelligent Edge of Things (TIEoT) is a paradigm of the Internet of Things (IoT) that offsets the workload of machine learning (ML) models and security mechanisms to the edge instead of end devices. TIEoT targets providing efficient AI-driven security-extension implementation of Internet services and applications close to end users. The edges at TIEoT would employ data-driven ML models to learn Internet applications/services-related patterns and acquire knowledge about their normal and abnormal patterns, which leads to a security benefit. TIEoT edges would be able to learn classes of applications/services, even if there is no previous precious knowledge, based on comparing newly learned patterns with the previously learned and stored ones. This can help enable TIEoT to be implemented in applications or services with detection/identification tasks based on collected different data profiles with multiple attributes.  TIEoT enables AI-enabled (intelligent) networking operations and AI-driven Internet applications and services provisioning with security extensions. The security aspect in TIEoT plays a great role in maintaining secure and privacy-protected operations with applications or services data. The detection of potential threats and attacks that might affect the operations and the performance of offered applications and services should be achieved efficiently. The employing of security architectures to monitor the operations of internal algorithms and models in TIEoT edges is also required to enable sustainable, efficient operations and reliable and correct outputs

Topics of Interest

This special session invites prospective authors from academia and industry to submit original papers on topics that help in the wide employment of TIEoT. Such topics include, but are not limited to:

  • Network and protocol architectures for TIEoT.
  • 5G-6G-based communication architectures for TIEoT.
  • Computing architectures for TIEoT.
  • Hardware design and specifications for TIEoT devices.
  • Data management architectures.
  • Trust management techniques.
  • Security architectures for secure data transfer and processing.
  • Trustworthy communication models of TIEoT devices.
  • AI-based anomalies and threats detection.
  • Resource allocation and management.
  • Privacy-preserved management architecture in TIEoT.
  • Performance analysis of Internet applications and services provisioning.

Important Dates

  • Paper submission deadline: July 20, 2024
  • Paper acceptance notification: August 21, 2024
  • Camera-ready submission: September 7, 2024
  • Presentation submission: October 27, 2024

Paper Submission Guidelines

The page length limit for all initial submissions for review is SIX (6) printed pages (10-point font) and must be written in English. Initial submissions longer than SIX (6) pages will be rejected without review. All final submissions of accepted papers must be written in English with a maximum paper length of six (6) printed pages (10-point font) including figures. No more than one (1) additional printed page (10-point font) may be included in final submissions and the extra page (the 7th page) will incur an over length page charge of US$100. All final papers must be submitted to the IEEE Conference eXpress website. Please refer to the acceptance letter for the instructions on how to upload final papers.

Papers must be submitted through EDAS.  Please submit your paper for this Special Session using the following link to EDAS:

https://edas.info/newPaper.php?c=31878&track=125350

Each accepted paper/poster needs at least one full registration before the camera-ready manuscript can be included in the proceedings.