Automation Protocols Security in Cyber-Physical Systems (APS-CPS)
November 8, 2016 - Singapore
In conjunction with the ICNP 2016 conference

Cyber-Physical Systems (CPS) consist of large- scale interconnected
systems of heterogeneous components interacting with their physical
environments. In the CPS realm, humans and/or smart networked devices
interact with and control the physical world around them through
actuators, sensors, etc. CPS is envisioned to transform the way
people interact with engineered systems, just as the Internet
transformed the way people interact with information." (US National
Science Foundation). Today, the boundary between cyber and physical
systems is blurring. In particular, when it comes to automation
systems that provide automatic control of the operating devices (e.g.,
industrial devices, building installations, vehicles), the
advancements in networking protocols provide the capability of
automation systems to be inter-connected, as well as connected to the
Internet. This led to a vision of CPS where human beings interact with
a multitude of CPS devices and applications in industrial,
transportation, medical, home-security, building automation,
emergency management, power, and many other systems, which serve
critical functions in our lives. Naive implementations of CPS
applications may, however, expose them to malicious interference with
potential serious impact on individuals, businesses, and nations. The
security of automation protocols is thus an important aspect of CPSA

Therefore, the International Workshop on Automation Protocols Security
in Cyber­Physical Systems (APS-CPS) seeks novel submissions describing
practical and theoretical solutions to securing automation protocols.
Submissions may represent any application area for APS-CPS. Hence,
papers that are pertinent to the security of embedded systems,
Internet of Things, SCADA Systems, Smart-Grid Systems, Critical
Infrastructure Networks, Transportation Systems, Medical Devices are
all welcome.

Example topics of interest are given below, but are not limited to:
 . Secure APS-CPS architectures
 . Authentication mechanisms for APS-CPS
 . Access control for APS-CPS
 . Key management in APS- CPS
 . Data security and privacy for APS-CPS
 . Forensics for APS-CPS
 . Intrusion detection for APS-CPS
 . Trusted- computing in APS-CPS
 . Energy- efficient and secure APS-CPS
 . Availability, recovery and auditing for APS-CPS
 . Distributed secure solutions for APS-CPS
 . Threat models for APS-CPS
 . Physical layer security for APS-CPS
 . Security on heterogeneous APS- CPS
 . Secure protocol design in APS-CPS
 . Vulnerability analysis of APS-CPS
 . Anonymization in APS-CPS
 . Security of APS-CPS in automotive systems
 . Security of APS-CPS in aerospace systems
 . Security of embedded systems
 . Security of APS-CPS in medical devices/systems
 . Security of APS-CPS in civil engineering systems/devices
 . Security of industrial control systems
 . Security of Internet-of-Things

Submission Instructions:

Submitted papers must represent original material that is not currently
under review in any other conference or journal, and has not been
previously published. All submissions must be written in English with a
maximum paper length of 6 (six) pages (including text, figures, and
references) and formatted according to the two column IEEE conference
format. Accepted papers will be published in the IEEE Digital Library after
the conference and included in the IEEE ICNP proceedings. For more
information about paper formatting please refer to the submission page of
the ICNP Conference. Papers should be submitted using the EasyChair
submission system, using the link that will be announced soon.

Important Dates:
Submission Deadline: July 20, 2016
Acceptance Notification: August 20, 2016
Camera Ready: August 26, 2016
Workshop Date: November 8, 2016