Security, Safety and Confidentiality in IoT for Collaborative Business Technologies


The Internet of Things involves an increasing number of physical objects provided with the ability to exchange data over a network. IoT involves several kinds of smart objects, including smart vehicles, smart industrial machines, smart energy grids, smart homes and buildings, and smart portable and wearable devices. To that we can add more sophisticated and business oriented sceneries such as smart factories and smart supply chains.

From a business point of view, IoT becomes an opportunity at a mass scale. In fact, with billions of sensors and actuators providing data and conducting actions, many new business “services” can be proposed. For instance, using data analytics, the data stemming from the embedded sensors can be used to improve energy consumption, to ensure physical safety or to enhance user experience. Moreover, "traditional business processes" can be completely reconsidered through IoT. Actually, coupled with other IT capabilities, IoT enables us to perform in numerous “business service” scenarios such as Remote Fabrication, remote configuration, remote diagnostics and maintenance and even customer service and technical support, to cite few. IoT will allow the products and appliances we interact with on a daily basis to become smart. The number of possible scenarios in enterprise to which this can be advantageous is huge.

As IoT connect innumerable devices that opened for remote access, hostile parties can exploit any vulnerabilities. For example, data collected and sent over the internet by many devices can be intercepted by a hacker. IoT for collaborative business technologies must have a viable, efficient and resilient security solution so that business believe in the IoT as solution of collaborative technologies. The aim of this track is to present mature research results or work-in-progress in all areas of security and safety in IoT for collaboration business technologies.

List of topics

The topics of interest for this workshop include, but are not limited to:

  1. Security of IoT Enabled Business Process
  2. Security in SOA-based IoT Middleware Systems
  3. Security for IoT based Business Analytics
  4. IoT Enabled Enterprise Information Systems Security
  5. Physical Safty in IoT based Information Systems.
  6. IoT End-to-End Security Solution and frameworks.
  7. IoT Security via Machine Learning.
  8. Security of Data fusion in IoT.

Important dates

  • June 27-29, 2018: The 27th WETICE edition in Paris, France
  • March   25, 2018: Submission deadline (extended)
  • April   18, 2018: Notification of acceptance (extended)
  • April   23, 2018: Camera ready and registration deadline (extended)

Paper submission

The paper submission procedure is carried out using the EasyChair conference management system;

Track Co-chair

  1. Layth Sliman
  2. Hachemi Dellys