DESCRIPTION
Call for Papers: LCICS-26
All Abstracts, Reviews, short articles, Full articles, Posters are welcomed related with any of the following research fields:
1. Independent Core Topics
These represent the foundational pillars of each domain before they are integrated into a single solution.
A. Cybersecurity (The Shield)
Cryptography: Symmetric/asymmetric encryption, hashing, and digital signatures.
Network Security: Firewalls, VPNs, and Intrusion Detection/Prevention Systems (IDS/IPS).
Identity & Access Management (IAM): Multi-factor authentication (MFA) and Role-Based Access Control (RBAC).
Governance & Compliance: GDPR, HIPAA, and NIST frameworks.
Incident Response: Threat hunting, digital forensics, and disaster recovery.
B. Internet of Things (The Edge)
Hardware Architecture: Microcontrollers (MCUs), sensors, and actuators.
Connectivity Protocols: Zigbee, LoRaWAN, MQTT, and CoAP.
Embedded Systems: Real-time operating systems (RTOS) and firmware development.
Edge Computing: Local data processing to reduce latency before sending to the cloud.
C. Cloud Solutions (The Core)
Service Models: IaaS (Infrastructure), PaaS (Platform), and SaaS (Software).
Deployment Models: Public, Private, Hybrid, and Multi-Cloud.
Virtualization: Hypervisors, containers (Docker), and orchestration (Kubernetes).
Serverless Computing: Function-as-a-Service (FaaS) for scaling on-demand.
2. Interrelated & Convergent Subtopics
These are the specialized areas where the three fields overlap, creating unique challenges and solutions.
I. Secure Cloud-to-Thing Integration
Device Shadows & Digital Twins: Managing the virtual representation of an IoT device in the cloud securely.
Zero-Touch Provisioning: Automatically and securely onboarding thousands of devices to a cloud platform without manual intervention.
Certificate-Based Authentication: Using X.509 certificates to ensure that only authorized devices can talk to the cloud.
II. Advanced Threat Landscapes
IoT Botnets (e.g., Mirai): How compromised IoT devices are used to launch massive DDoS attacks against cloud infrastructures.
Side-Channel Attacks: Stealing encryption keys from IoT hardware by monitoring power consumption or electromagnetic leaks.
Cloud Misconfiguration: How a simple "open" S3 bucket can leak sensitive data collected by millions of IoT sensors.
III. Data Sovereignty & Privacy
End-to-End Encryption (E2EE): Ensuring data is encrypted at the sensor and only decrypted at the cloud application level, remaining unreadable even to the cloud provider.
Homomorphic Encryption: Performing computations on IoT data within the cloud without ever decrypting it.
Data Minimization at the Edge: Using edge computing to strip PII (Personally Identifiable Information) before data ever reaches the cloud.
IV. Modern Security Architectures
Zero Trust for IoT: Moving away from "trusted networks" to a model where every device and cloud request must be continuously verified.
Blockchain for Decentralized Identity: Using a distributed ledger to verify IoT device identities without a central cloud authority.
AI-Driven Anomaly Detection: Using cloud-based Machine Learning to analyze IoT traffic patterns and detect "strange" behavior (e.g., a smart lightbulb suddenly trying to access a database).