SecRIot 2025
6th International Workshop on Security and Reliability of IoT Systems
Tuscany (Lucaa), Italy
June 9 – 11, 2025
co-located with DCOSS-IoT 2025
Important Dates
Important Info
Paper Submission Deadline: April 8, 2025
Acceptance Notification: April 25, 2025
Camera Ready Deadline: May 9, 2025
Early Registration Deadline: ......
Conference: June 9-11, 2025
Submission Link:
Call for Papers
Scope
The next years more than 20 billion devices will be interconnected. The Internet of Things provides unparalleled opportunities for the development of new novel services. Currently, most of the new electronic devices are offering from basic to advanced networking capabilities in the context of smart environments. Newer vehicles are partially or completely autonomous, powered by modern microprocessors, hundreds of sensors and Internet enabled services. The same applies to robotic and medical devices and almost every other advanced equipment. Despite the longstanding efforts of the scientific community to secure Internet and Network communications, Operating Systems and Software Applications, only a limited amount of this knowledge has been applied to the IoT ecosystems. Most of the IoT devices, including modern vehicles suffer from numerous and multilayered vulnerabilities. Default, weak or no password authentication for remote connections, unencrypted traffic or obsolete and insecure cryptographic algorithms, outdated, unmanaged and vulnerable software are among the most serious problems of the IoT landscape. Even more alarming is the unregulated manufacturing process of many IoT constructors. Aiming to reduce the cost and minimize the time to market of their products, minimal or none effort is put to secure and support them sufficiently. Worse, there are recorded cases of IoT devices delivered with preinstalled malware that demonstrate total lack of operations security in the supply chain. In contrary to software applications in PCs and mobile devices, the owners are not likely to replace their devices because of security problems. As consequence, these systems remain vulnerable for extended periods. Recent very large-scale DDoS attacks based and executed entirely by IoT Botnets, signify the magnitude of the problem.
The aim of this workshop is to bring together researchers and professionals that are responsible for the secure design, deployment and operation of current and future IoT systems. Topics of interest include, but are not limited to:
IoT Security and Privacy
IoT Intrusion Detection and Prevention Systems
Cyber Physical Security and IoT
Secure Design Methodologies for IoT Systems
Secure Hardware and Software Codesign
Development of Secure Embedded Systems
Secure Embedded Operation Systems
IoT Malware
Autonomous Vehicles Cybersecurity
Secure Network Protocols for IoT Systems
IoT and Blockchain
Secure Manufacturing Process of IoT Devices
Privacy Protection in IoT Environments
Security and Privacy of Medical Devices
IoT Trust and Reliability
Reliable Robotic Devices
Committees
Workshop Chairs
Bruno Crispo, University of Trento (Italy)
Athanasios Kakarountas (University of Thessaly, Greece)
Leandros Maglaras (Napier University, Scotland)
Vasileios Vlachos (University of Thessaly, Greece)
Technical Program Committee
Nestoras Chouliaras (University of West of Attica, Greece)
Christos Chrysoulas (Edinburgh Napier University, Scotland)
Tiago Cruz (University of Coimbra, Portugal)
Luca Davoli (University of Parma, Italy)
Paris Kitsos (University of Peloponnese, Greece)
Dimitrios Kosmanos (University of Thessaly, Greece)
Harris Michail (Cyprus University of Technology, Cyprus)
Naghmeh Moradpoor (Edinburgh Napier University, Scotland)
Iryna Yevseyeva (De Montfort University, UK)
Yagmur Yigit (Edinburgh Napier University, Scotland)
Apostolos Xenakis (University of Thessaly, Greece)