Skip to main content
Log in

International Journal of Information Security - Call For Papers: Cyber Physical Systems and Industry 4.0: Security and Privacy Challenges and Solutions

Aims & Scope 

Cyber physical systems (CPS) have been increasingly applied in various domains, such as aerospace, automobile, industrial process control, health-care and transportation. CPS leads to a new generation of engineering systems, through integrating computation, communication, and control units. With the combination of the sensing, networking and computation capabilities, these systems are able to connect the cyber space and the physical space in an unprecedented manner. For example, CPS is able to link the physical world (e.g. using sensors or actuators) with the virtual world of information processing. Examples of CPS may include smart grid, autonomous automobile systems, medical monitoring, process control systems, robotics systems, etc. Industry 4.0 is the current trend of automation and data exchange in manufacturing technologies, including CPS, IoT and cloud computing.
 
However, these systems are more vulnerable now than before to new security threats due to various reasons such as open design, networked feature, implementation flaws and so on. As more critical infrastructures are evolving into cyber-physical systems by adopting information and communication technologies (ICT), the added cyber components may make them vulnerable to many devastating cyber attacks launched by insiders or knowledgeable attackers. The disruption may lead to sizable losses economically and in human lives.
 
This special issue will focus on cyber physical systems and Industry 4.0, and aims to solicit original research papers that discuss the security and privacy challenges and solutions.
 
Topics of interest include, but are not limited to:

The goal of this special issue is to collect high-quality contributions to address the security and privacy issues for CPS and Industry 4.0. Topics of interest include, but are not limited to the ones listed below.
 

  • Modeling of CPS under cyber and physical attacks
  • Analysis of CPS attack strategies
  • Architectural framework for secure CPS and Industry 4.0
  • Resource Management for secure CPS and Industry 4.0
  • Design methodologies for CPS security and privacy
  • Intrusion detection and prevention schemes for CPS and Industry 4.0
  • New applications for secure CPS and Industry 4.0
  • Lightweight privacy-preserving CPS and Industry 4.0
  • Cross-layer modelling and optimization for smart energy CPS
  • Efficient state estimation techniques in CPS
  • Emerging models of distributed energy systems in CPS and Industry 4.0
  • Failure tolerance, identification and recovery
  • Game theory in CPS and Industry 4.0
  • Cyber architecture: defense optimization
  • Verification and Validation of CPS security

Submission Guidelines


Authors should prepare their manuscript according to the Submission Guidelines available from the online submission page of the IJIS at https://www.springer.com/journal/10207 (this opens in a new tab).
 
All submitted papers must contain only original work, which has not been published by or is currently under review by any other journal or conference. Previously published or accepted conference papers must contain at least 50% new material to be considered for the special issue.
 
Authors should select “'S.I. : CPS-Industry4.0” when they reach the “Article Type” step in the submission process. All papers will be peer-reviewed by at least three independent reviewers. Requests for additional information should be addressed to the Corresponding Guest Editor.
 

Important Dates
Submission deadline: May 30, 2022
Initial notification: July 29, 2022
Revised due: September 30, 2022
Final notification: November 30, 2022
 


Guest Editors

Weizhi Meng

Technical University of Denmark, Denmark

E-mail: weme@dtu.dk
 
Alvaro A. Cardenas

University of California, Santa Cruz, USA

E-mail: alacarde@ucsc.edu
 
Jianying Zhou

Singapore University of Technology and Design, Singapore

E-mail: jianying_zhou@sutd.edu.sg


Editor Biography
 
Weizhi Meng is currently an Associate Professor in the Department of Applied Mathematics and Computer Science, Technical University of Denmark (DTU), Denmark. He obtained his Ph.D. degree in Computer Science from the City University of Hong Kong (CityU), Hong Kong. Prior to joining DTU, he worked as a research scientist in Infocomm Security (ICS) Department, Institute for Infocomm Research, A*Star, Singapore, and as a senior research associate in CS Department, CityU. He won the Outstanding Academic Performance Award during his doctoral study, and is a recipient of the Hong Kong Institution of Engineers (HKIE) Outstanding Paper Award for Young Engineers/Researchers in both 2014 and 2017. His primary research interests are cyber security and intelligent technology in security, including intrusion detection, smartphone security, biometric authentication, IoT / CPS security, and blockchain. He also served as guest editor for FGCS, JISA, Sensors, CAEE, IJDSN, SCN, WCMC, etc.
 
Alvaro A. Cardenas is an Associate Professor of Computer Science and Engineering at the University of California, Santa Cruz. Before joining UCSC, he was the Eugene McDermott Associate Professor of Computer Science at the University of Texas at Dallas. Earlier in his career, he was a postdoctoral scholar at the University of California, Berkeley, and a research staff member at Fujitsu Laboratories. He holds M.S. and Ph.D. degrees from the University of Maryland, College Park, and a B.S. from Universidad de Los Andes in Colombia. His research interests focus on cyberphysical systems and IoT security and privacy. He is the recipient of the NSF CAREER award, the 2018 faculty excellence in research award from the Erik Johnson School of Engineering and Computer Science, and the Eugene McDermott Fellow Endowed Chair at the University of Texas at Dallas. He has also received best paper awards from the IEEE Smart Grid Communications Conference and the U.S. Army Research Conference. One of his papers was also a finalist to the CSAW competition in Israel.
 
Jianying Zhou is a professor and co-center director for iTrust at Singapore University of Technology and Design (SUTD). He received PhD in Information Security from Royal Holloway, University of London. His research interests are in applied cryptography and network security, cyber-physical system security, mobile and wireless security. Before joining SUTD, he was a principal scientist and the head of Infocomm Security Department at Institute for Infocomm Research, A*STAR. He is a co-founder & steering committee co-chair of ACNS. He is also steering committee chair of ACM AsiaCCS and steering committee member of Asiacrypt. He received ESORICS best paper award in 2015 and ESORICS Outstanding Contribution Award in 2020.

Submitted papers should present original, unpublished work, relevant to one of the topics of the Special Issue.  All submitted papers will be evaluated on the basis of relevance, significance of contribution, technical quality, scholarship, and quality of presentation, by at least two independent reviewers. It is the policy of the journal that no submission, or substantially overlapping submission, be published or be under review at another journal or conference at any time during the review process.

Before submitting, it is also recommended that you visit the following webpages to familiarize yourself with various aspects of the editor role: Springer Nature Code of Conduct (this opens in a new tab) and  Springer Nature publishing and editorial policies (this opens in a new tab).

Peer review policy

The International Journal of Information Security adheres to the standard Peer Review Policy, Process and Guidance (this opens in a new tab) as outlined by Springer under Editorial Policies (this opens in a new tab) in the Information for Journal Authors (this opens in a new tab) web page.

  • All special issue papers must be prepared in accordance with the Journal guidelines: https://www.springer.com/journal/10207/submission-guidelines.
  • Submitted papers should present original, unpublished work, relevant to one of the topics of the special issue. All manuscripts will be subject to the Journal’s rigorous peer review policy, by at least two independent reviewers. This evaluation will cover the following aspects, but will not be limited to: relevance, significance of contribution to the field, technical quality, scholarship, and quality of presentation. 
  • Conference-based special issue papers are reviewed by the Program Chairs and Program Committee members of the respective conference, with help from external reviewers selected by them. Conference-based special issue papers are expected to have 30-40% new material to be publishable in the journal.

Navigation