Call for Papers

Important dates

  • Submission deadline: July 1st, 2021
  • Acceptance notification: August 8th, 2021
  • Camera-ready: August 24th, 2021
  • Workshop date: November 2nd - 5th, 2021

Following the success of the previous editions, the 6th IEEE International Workshop on Cyber-Physical Systems Security Protocols 2021 (CPS-Sec 2021) aims to represent a forum for researchers and practitioners from industry and academia interested in the areas of CPS security. Therefore, CPS-Sec seeks novel submissions describing practical and theoretical solutions to the cyber security challenges of the emerging networks for safer and more secure deployment of CPS. Submissions may represent any application area for CPS. Hence, papers that are pertinent to the security of next generation networks (5G and 6G), Internet of Things (IoT), Critical Infrastructure Networks, Transportation Systems, Medical Devices are all welcome.

Submitted papers must represent original material that is not currently under review in any other conference or journal and has not been previously published. All submissions must be written in English with a maximum paper length of 6 pages and formatted according to the two-column IEEE conference format. Accepted papers will be published in the IEEE Digital Library after the conference and included in the IEEE ICNP proceedings.
Papers should be submitted using the EasyChair system .

Example topics of interest are given below, but are not limited to:

  • Secure 5G and 6G technologies
  • Secure SDN-IoT architecture
  • Secure SDN-enabled smart transportation
  • Secure SDN-enabled smart healthcare
  • Security and trust in autonomous systems
  • Security of Cloud environment
  • Security of industrial control systems
  • Security of Internet-of-Things
  • Trusted computing in CPS
  • Security of CPS in transportation systems
  • Security of CPS in medical devices/systems
  • Availability, recovery, and auditing for CPS
  • Secure network protocol design in CPS
  • Security on heterogeneous CPS
  • Vulnerability analysis of CPS
  • Anonymization in CPS
  • Authentication mechanisms for CPS
  • Access control for CPS
  • Data security and privacy for CPS
  • Intrusion detection for CPS
  • Energy-efficient and secure CPS
  • Distributed secure solutions for CPS