<html><head></head><body><div class="yahoo-style-wrap" style="font-family:verdana, helvetica, sans-serif;font-size:13px;"><div><p class="ydpba78cb8MsoNormal" style="text-align:justify"><span style="font-size:10.0pt;line-height:107%;font-family:"Candara",sans-serif;mso-bidi-font-family:Arial;color:black">Dear Colleagues, </span></p>
<p class="ydpba78cb8MsoNormal" style="text-align:justify"><span style="font-size:10.0pt;line-height:107%;font-family:"Candara",sans-serif;mso-bidi-font-family:Arial;color:black">Prof. Jemal Abawajy (Deakin University) and I (Luleå University of
Technology and Plymouth University) are editing a new book entitled “Security
and Privacy in the Internet of Things: Architectures, Techniques, and
Applications” that will be published by Wiley-IEEE Press by 2020. </span></p>
<p class="ydpba78cb8MsoNormal" style="text-align:justify"><span style="font-size:10.0pt;line-height:107%;font-family:"Candara",sans-serif;mso-bidi-font-family:Arial;color:black">Since we plan to have chapters by invitations only, we are
collecting interests from both academia and industry. Therefore, if you are
interested to contribute a chapter to this book, please approach me by email (<span><a href="mailto:ali.awad@ltu.se" style="color: rgb(25, 106, 212); text-decoration-line: underline; font-family: Candara, sans-serif; font-size: 13.3333px; text-align: justify;" rel="nofollow" target="_blank">ali.awad@ltu.se</a>)</span> with a half-page shows the title and the abstract of your planned chapter by May
17<sup>th</sup>. Formal invitations will be sent later for potential contributors.
Full chapters should be submitted by the end of 2019.</span></p>
<p class="ydpba78cb8MsoNormal" style="text-align:justify"><span style="font-size:10.0pt;line-height:107%;font-family:"Candara",sans-serif;mso-bidi-font-family:Arial;color:black">The planned topics include, but not limited to:</span></p>
<p class="ydpba78cb8MsoNormal" style="margin-top:3.0pt;margin-right:0in;margin-bottom:3.0pt;margin-left:0in;text-align:justify"><b><span style="font-size:10.0pt;line-height:107%;font-family:"Candara",sans-serif">Part I: Architecture:</span></b></p>
<p class="ydpba78cb8MsoListParagraphCxSpFirst" style="text-align: justify; line-height: 115%;"><!--[if !supportLists]--><span style="font-size:10.0pt;line-height:115%;font-family:Symbol;mso-fareast-font-family:Symbol;mso-bidi-font-family:Symbol">·<span style="font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman";"> </span></span><!--[endif]--><span dir="LTR"></span><span style="font-size:10.0pt;line-height:115%;font-family:"Candara",sans-serif">Security
at 50: What exists and is applicable to IoT security</span></p>
<p class="ydpba78cb8MsoListParagraphCxSpMiddle" style="text-align: justify; line-height: 115%;"><!--[if !supportLists]--><span style="font-size:10.0pt;line-height:115%;font-family:Symbol;mso-fareast-font-family:Symbol;mso-bidi-font-family:Symbol">·<span style="font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman";"> </span></span><!--[endif]--><span dir="LTR"></span><span style="font-size:10.0pt;line-height:115%;font-family:"Candara",sans-serif">IoT
architecture from device to applications</span></p>
<p class="ydpba78cb8MsoListParagraphCxSpMiddle" style="text-align: justify; line-height: 115%;"><!--[if !supportLists]--><span style="font-size:10.0pt;line-height:115%;font-family:Symbol;mso-fareast-font-family:Symbol;mso-bidi-font-family:Symbol">·<span style="font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman";"> </span></span><!--[endif]--><span dir="LTR"></span><span style="font-size:10.0pt;line-height:115%;font-family:"Candara",sans-serif">IoT
security architectures </span></p>
<p class="ydpba78cb8MsoListParagraphCxSpMiddle" style="text-align: justify; line-height: 115%;"><!--[if !supportLists]--><span style="font-size:10.0pt;line-height:115%;font-family:Symbol;mso-fareast-font-family:Symbol;mso-bidi-font-family:Symbol">·<span style="font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman";"> </span></span><!--[endif]--><span dir="LTR"></span><span style="font-size:10.0pt;line-height:115%;font-family:"Candara",sans-serif">IoT
security standards </span></p>
<p class="ydpba78cb8MsoListParagraphCxSpMiddle" style="text-align: justify; line-height: 115%;"><!--[if !supportLists]--><span style="font-size:10.0pt;line-height:115%;font-family:Symbol;mso-fareast-font-family:Symbol;mso-bidi-font-family:Symbol">·<span style="font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman";"> </span></span><!--[endif]--><span dir="LTR"></span><span style="font-size:10.0pt;line-height:115%;font-family:"Candara",sans-serif">Secure
network architecture and communication protocols security </span></p>
<p class="ydpba78cb8MsoListParagraphCxSpMiddle" style="text-align: justify; line-height: 115%;"><!--[if !supportLists]--><span style="font-size:10.0pt;line-height:115%;font-family:Symbol;mso-fareast-font-family:Symbol;mso-bidi-font-family:Symbol">·<span style="font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman";"> </span></span><!--[endif]--><span dir="LTR"></span><span style="font-size:10.0pt;line-height:115%;font-family:"Candara",sans-serif">IoT
device security: Logical and physical security </span></p>
<p class="ydpba78cb8MsoListParagraphCxSpMiddle" style="text-align: justify; line-height: 115%;"><!--[if !supportLists]--><span style="font-size:10.0pt;line-height:115%;font-family:Symbol;mso-fareast-font-family:Symbol;mso-bidi-font-family:Symbol">·<span style="font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman";"> </span></span><!--[endif]--><span dir="LTR"></span><span style="font-size:10.0pt;line-height:115%;font-family:"Candara",sans-serif">Secure
data management in IoT</span></p>
<p class="ydpba78cb8MsoListParagraphCxSpMiddle" style="text-align: justify; line-height: 115%;"><!--[if !supportLists]--><span style="font-size:10.0pt;line-height:115%;font-family:Symbol;mso-fareast-font-family:Symbol;mso-bidi-font-family:Symbol">·<span style="font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman";"> </span></span><!--[endif]--><span dir="LTR"></span><span style="font-size:10.0pt;line-height:115%;font-family:"Candara",sans-serif">Secure
IoT transactions (blockchains)</span></p>
<p class="ydpba78cb8MsoListParagraphCxSpMiddle" style="text-align: justify; line-height: 115%;"><!--[if !supportLists]--><span style="font-size:10.0pt;line-height:115%;font-family:Symbol;mso-fareast-font-family:Symbol;mso-bidi-font-family:Symbol">·<span style="font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman";"> </span></span><!--[endif]--><span dir="LTR"></span><span style="font-size:10.0pt;line-height:115%;font-family:"Candara",sans-serif">Secure
integration of IoT and Cloud computing</span></p>
<p class="ydpba78cb8MsoListParagraphCxSpMiddle" style="text-align: justify; line-height: 115%;"><!--[if !supportLists]--><span style="font-size:10.0pt;line-height:115%;font-family:Symbol;mso-fareast-font-family:Symbol;mso-bidi-font-family:Symbol">·<span style="font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman";"> </span></span><!--[endif]--><span dir="LTR"></span><span style="font-size:10.0pt;line-height:115%;font-family:"Candara",sans-serif">Secure
integration of IoT and social networks</span></p>
<p class="ydpba78cb8MsoListParagraphCxSpLast" style="text-align: justify; line-height: 115%;"><!--[if !supportLists]--><span style="font-size:10.0pt;line-height:115%;font-family:Symbol;mso-fareast-font-family:Symbol;mso-bidi-font-family:Symbol">·<span style="font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman";"> </span></span><!--[endif]--><span dir="LTR"></span><span style="font-size:10.0pt;line-height:115%;font-family:"Candara",sans-serif">IoT
privacy and trust model</span></p>
<p class="ydpba78cb8MsoNormal" style="margin-top:3.0pt;margin-right:0in;margin-bottom:3.0pt;margin-left:0in;text-align:justify"><b><span style="font-size:10.0pt;line-height:107%;font-family:"Candara",sans-serif">Part II: Technologies and
Mechanisms:</span></b></p>
<p class="ydpba78cb8MsoListParagraphCxSpFirst" style="text-align: justify; line-height: 115%;"><!--[if !supportLists]--><span style="font-size:10.0pt;line-height:115%;font-family:Symbol;mso-fareast-font-family:Symbol;mso-bidi-font-family:Symbol">·<span style="font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman";"> </span></span><!--[endif]--><span dir="LTR"></span><span style="font-size:10.0pt;line-height:115%;font-family:"Candara",sans-serif">Security
Mechanisms applicable to IoT</span></p>
<p class="ydpba78cb8MsoListParagraphCxSpMiddle" style="text-align: justify; line-height: 115%;"><!--[if !supportLists]--><span style="font-size:10.0pt;line-height:115%;font-family:Symbol;mso-fareast-font-family:Symbol;mso-bidi-font-family:Symbol">·<span style="font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman";"> </span></span><!--[endif]--><span dir="LTR"></span><span style="font-size:10.0pt;line-height:115%;font-family:"Candara",sans-serif">Intrusion
detection systems for IoT</span></p>
<p class="ydpba78cb8MsoListParagraphCxSpMiddle" style="text-align: justify; line-height: 115%;"><!--[if !supportLists]--><span style="font-size:10.0pt;line-height:115%;font-family:Symbol;mso-fareast-font-family:Symbol;mso-bidi-font-family:Symbol">·<span style="font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman";"> </span></span><!--[endif]--><span dir="LTR"></span><span style="font-size:10.0pt;line-height:115%;font-family:"Candara",sans-serif">Threat
and vulnerability analysis in IoT</span></p>
<p class="ydpba78cb8MsoListParagraphCxSpMiddle" style="text-align: justify; line-height: 115%;"><!--[if !supportLists]--><span style="font-size:10.0pt;line-height:115%;font-family:Symbol;mso-fareast-font-family:Symbol;mso-bidi-font-family:Symbol">·<span style="font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman";"> </span></span><!--[endif]--><span dir="LTR"></span><span style="font-size:10.0pt;line-height:115%;font-family:"Candara",sans-serif">Authentication
and access control in IoT </span></p>
<p class="ydpba78cb8MsoListParagraphCxSpMiddle" style="text-align: justify; line-height: 115%;"><!--[if !supportLists]--><span style="font-size:10.0pt;line-height:115%;font-family:Symbol;mso-fareast-font-family:Symbol;mso-bidi-font-family:Symbol">·<span style="font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman";"> </span></span><!--[endif]--><span dir="LTR"></span><span style="font-size:10.0pt;line-height:115%;font-family:"Candara",sans-serif">Attack
detection and prevention in IoT</span></p>
<p class="ydpba78cb8MsoListParagraphCxSpLast" style="text-align: justify; line-height: 115%;"><!--[if !supportLists]--><span style="font-size:10.0pt;line-height:115%;font-family:Symbol;mso-fareast-font-family:Symbol;mso-bidi-font-family:Symbol">·<span style="font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman";"> </span></span><!--[endif]--><span dir="LTR"></span><span style="font-size:10.0pt;line-height:115%;font-family:"Candara",sans-serif">Privacy
preserving techniques in IoT</span></p>
<p class="ydpba78cb8MsoNormal" style="margin-top:3.0pt;margin-right:0in;margin-bottom:3.0pt;margin-left:0in;text-align:justify"><b><span style="font-size:10.0pt;line-height:107%;font-family:"Candara",sans-serif">Part III: Applications:</span></b></p>
<p class="ydpba78cb8MsoListParagraphCxSpFirst" style="text-align: justify; line-height: 115%;"><!--[if !supportLists]--><span style="font-size:10.0pt;line-height:115%;font-family:Symbol;mso-fareast-font-family:Symbol;mso-bidi-font-family:Symbol">·<span style="font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman";"> </span></span><!--[endif]--><span dir="LTR"></span><span style="font-size:10.0pt;line-height:115%;font-family:"Candara",sans-serif">Smart
cities security</span></p>
<p class="ydpba78cb8MsoListParagraphCxSpMiddle" style="text-align: justify; line-height: 115%;"><!--[if !supportLists]--><span style="font-size:10.0pt;line-height:115%;font-family:Symbol;mso-fareast-font-family:Symbol;mso-bidi-font-family:Symbol">·<span style="font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman";"> </span></span><!--[endif]--><span dir="LTR"></span><span style="font-size:10.0pt;line-height:115%;font-family:"Candara",sans-serif">Smart
homes security</span></p>
<p class="ydpba78cb8MsoListParagraphCxSpMiddle" style="text-align: justify; line-height: 115%;"><!--[if !supportLists]--><span style="font-size:10.0pt;line-height:115%;font-family:Symbol;mso-fareast-font-family:Symbol;mso-bidi-font-family:Symbol">·<span style="font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman";"> </span></span><!--[endif]--><span dir="LTR"></span><span style="font-size:10.0pt;line-height:115%;font-family:"Candara",sans-serif">Physical
security of IoT devices</span></p>
<p class="ydpba78cb8MsoListParagraphCxSpLast" style="text-align: justify; line-height: 115%;"><!--[if !supportLists]--><span style="font-size:10.0pt;line-height:115%;font-family:Symbol;mso-fareast-font-family:Symbol;mso-bidi-font-family:Symbol">·<span style="font-stretch: normal; font-size: 7pt; line-height: normal; font-family: "Times New Roman";"> </span></span><!--[endif]--><span dir="LTR"></span><span style="font-size:10.0pt;line-height:115%;font-family:"Candara",sans-serif">Secure
and energy efficient management of IoT objects</span></p>
<div style="text-align:justify"><span style="font-size:10.0pt;line-height:107%;font-family:"Candara",sans-serif;mso-bidi-font-family:Arial;color:black">I look forward to reading your abstracts. </span></div><div style="text-align:justify"><span style="font-size:10.0pt;line-height:107%;font-family:"Candara",sans-serif;mso-bidi-font-family:Arial;color:black"><br></span></div>
<p class="ydpba78cb8MsoNormal" style="text-align:justify"><span style="font-size:10.0pt;line-height:107%;font-family:"Candara",sans-serif;mso-bidi-font-family:Arial;color:black">Sincerely Yours,</span></p>
<p class="ydpba78cb8MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;text-align:justify"><span style="font-size:10.0pt;line-height:107%;font-family:"Candara",sans-serif;mso-bidi-font-family:Arial;color:black">Ali Ismail Awad, SMIEEE, Ph.D., Ph.D.,
M.Sc., B.Sc.</span></p>
<p class="ydpba78cb8MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;text-align:justify"><span style="font-size:10.0pt;line-height:107%;font-family:"Candara",sans-serif;mso-bidi-font-family:Arial;color:black">Associate Professor of Information
Security </span></p>
<p class="ydpba78cb8MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;text-align:justify"><span style="font-size:10.0pt;line-height:107%;font-family:"Candara",sans-serif;mso-bidi-font-family:Arial;color:black">Coordinator of the Master Program in
Information Security </span></p>
<p class="ydpba78cb8MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;text-align:justify"><span style="font-size:10.0pt;line-height:107%;font-family:"Candara",sans-serif;mso-bidi-font-family:Arial;color:black">Visiting Researcher at the University
of Plymouth, United Kingdom</span></p>
<p class="ydpba78cb8MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;text-align:justify"><span style="font-size:10.0pt;line-height:107%;font-family:"Candara",sans-serif;mso-bidi-font-family:Arial;color:black">Department of Computer Science,
Electrical and Space Engineering</span></p>
<p class="ydpba78cb8MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;text-align:justify"><span style="font-size:10.0pt;line-height:107%;font-family:"Candara",sans-serif;mso-bidi-font-family:Arial;color:black">Luleå University of Technology</span></p></div><br></div></body></html>