Security Requirements and Challenges in WSN, IoT and IIoT systems


Dr. Brahim EL BHIRI* and Pr. Pierre-Martin Tardif+

*SMARTiLab/EMSI Director EMSI-Honoris, Morocco

+ SIMQG Department, Management School, University de Sherbrooke, QC, Canada

Technological advancement such as ubiquity of digital data, smart mobile devices, high-speed wireless networks, and web-based open data accessibility have made the whole world around us much more understandable and controllable. This digitalization is also pushing a revolution, coined as Industry 4.0, toward critical infrastructure. Wireless Sensor Networks (WSN) and Internet of Things (IoT) can facilitate interaction with a wide with wide variety of cyberphysical systems (CPS), bringing applications to smart cities, advanced medical centers, flexible production, smart grids, edge services and others. Indeed, these technologies can leverage humongous amounts of data in different formats, using variant various protocols and hybrid processing infrastructure, including local, edge, fog and cloud services. But this improvement in usability and customer acceptance often results in a severe lack of data- device- and service- protection. This leads to very insecure systems as security may be incoherent or incongruent to usability. This lack of security is a key issue either for an individual, a corporation, or a government. This session is seeking original, high impact research papers on all topics related to the Security Requirements and Challenges in WSN, IoT and Industrial IoT (IIoT) systems, including but not limited to:


  • Encryption (All Aspects)
  • Anomaly detection
  • Protection mecanisms for devices, edge networks and computing facilities
  • Intrusion and Detection Techniques
  • Case Studies
  • Security Architecture
  • Location-Based Privacy
  • Critical Infrastructure Resilience
  • Industrial Data Security
  • Adoption Challenges and Recommendation
  • Security, Privacy and Trust
  • Security Testing (SAST, DAST, Penetration)
  • Experiments on Using Security Solutions and Proof-of-Concepts
  • Secuirty Context-Awareness
  • Performance Evaluation and Modeling
  • WSN Security in an industrial context
  • IIoT Energy Efficiency vs Security
  • Machine Learning and Deep Learning applied to IIoT


  1. Authors are invited to submit papers in the above or related technical areas. Accepted papers
    will be included in formal Proceedings to be published by the:
  2. All submissions should be original,professional and have not been published elsewhere. Paper length should exceed 3 pages followed (Max 5 pages) and it needs to be formatted strictly according to the Template.
  3. Submissions must be original, unpublished work, and not have been submitted to another
    conference or journal for publication. All submission will be peer-reviewed roughly by at
    least 2-3 experts.
  4. Authors are invited to submit English papers. Please confirm your papers with clear
    argumentation, close core, sufficient theoretical analysis, proper language and standard
    grammar in English.
  5. Submission of a paper implies that should the paper be accepted for formal publication, at
    least one of the authors will register and present the paper in the conference. Plagiarism in
    any form is not allowed.
  6. For Plagiarism verification, we use the i-Thenticate software to detect instances of overlapping
    and similar text in submitted manuscripts.

Important Dates:
Paper submission deadline (special session): 30 Mai 2021
Notification of Acceptance: 15 Juin 2021
Registration (Authors): 20 juin 2021

General Information:

  • Brahim EL BHIRI
    Morocco Phone : +212 6 78 55 29 22,
  • Pierre-Martin Tardif
    SIMQG Department, Management School,
    University de Sherbrooke, QC, Canada