The 2nd MobiSec
Special Session on Secure and
Cognitive Continuum (SECON 2025)
Hotel
Emisia Sapporo, Sapporo, Japan, December 16-18, 2025 This Special Session is supported by EU
projects: EMPYREAN, CERTIFY, DOSS and TITAN |
OVERVIEW The
conventional way of dealing with (big) data, generated and exchanged by IoT devices,
is to continuously push them to centralised cloud computing infrastructures,
or utilize jointly on-device and on-premise/micro edge resources, deep and
far edge computing nodes, along with the traditional federated cloud
resources, thus forming an IoT-edge-cloud continuum. This approach can increase
manifold the applications¡¯ performance and the efficiency of the
infrastructures overcoming the critical data collection, transmission, and
processing bottlenecks present in of the centralized systems. It is clear
that more local decisions and a collective logic that leads to system-wide
welfare optimality is needed in order to accommodate the explosive growth of
IoT. Additionally,
this extensive exchange of data requires that more research need to be done
in the way to secure the data on storage, transit and processing. Hence it is
important to understand how the security in the IoT and the data sharing is
being considered in the context of the IoT-edge-cloud continuum. This
special session aims to facilitate the implementation of novel automated tools
and mechanisms for seamless interconnection, efficient data processing of
ML-workloads and secure distributed edge storage. Also the special session
will focuss on deployment technologies that contribute to the entire
application lifecycle and interoperability, for AI-driven value extraction of
high volume and dynamic IoT data generated at the edge of the network from
multiple sources, and the security and privacy of these new ecosystems. TOPICS (not limited to) Submissions
should focus on contributing in the following areas: -
Orchestration of resources -
Cognitive Resources Management -
Hyper-distributed computing -
AI-enabled management -
Data and services discovery -
Data Spaces and applications on distributed
environment -
Cybersecurity of IoT-edge-cloud continuum -
Secure data sharing -
Secure execution environment -
Application areas of the continuum computing
EMPYREAN, CERTIFY, DOSS and
TITAN IMPORTANT
DATES -
Paper
submission deadline: September 16, 2025 (KST/JST) -
Acceptance
Notification: October 18, 2025 (KST/JST) -
Final
version deadline: November 2, 2025 (KST/JST) PAPER
SUBMISSION Authors
are invited to submit papers: they must not substantially duplicate work that
any of the authors have published elsewhere or have submitted in parallel to
any other conferences that have proceedings. An
accepted paper must be registered before the registration deadline and
presented at the conference. Failure to register before the deadline will
result in automatic withdrawal of the paper from the conference proceedings
and the program. -
The
submission file is in PDF or PS file format produced via ü the Easychair Latex Class
file (US letter size) ü the Easychair Microsoft
Word file -
Each
paper should be at least 5 pages long based on the Easychair style. -
Submission
of a paper implies that should the paper be accepted, -
During
submission, please select ¡°MobiSec 2025 Special Session - Secure and
Cognitive Continuum¡± The submission of
contributions to MobiSec 2025 must occur through the conference submission
system: PROCEEDINGS
Proceedings of MobiSec 2025
will be available to the attendees. -
During
MobiSec 2025, all the papers will be available in the preliminary
online-proceedings (non-official publication). -
The
outstanding papers will be invited for publication of extended and revised
versions in SCIE or Scopus journals (Pending). Special
Session Chairs Prof. Antonio Skarmeta,
University of Murcia, Spain Dr. Panagiotis Kokkinos,
National Technical University of Athens, Greece Dr. Stefano Sebastio,
Collins, Ireland |