Blockchain is a decentralized
transaction and data management technology that was voiced by its implementation in Bitcoin.
In recent years, Blockchain has been achieving an ever-growing popularity. The reason for
the interest in Blockchain is its central attributes that provide security, anonymity and data integrity without any third-party organization in
control of the transactions, and therefore it is applied in numerous fields, including securing critical infrastructure.
As technology advanced, critical infrastructures increasingly come to rely on digital control systems and networking.
Attacks on critical infrastructure sites are currently a fact of life rather than a potential threat.
For example, power stations, chemical plants, telecommunication stations and nuclear facilities are tempting targets to cyber-attacks.
In this scene, the question remains on why and how we can utilize blockchain techniques to secure critical infrastructure.
Prior methods of protecting critical infrastructure have been plagued by centralized weaknesses and single points of failure problems.
Contemporarily, Blockchain can offer cryptography for transactions and data in trustless distributed networks to enhance the
reliability and resilience of the critical infrastructure. In other words, increasingly open and security needs is forcing us
to shore up defenses with developing blockchain technology to help secure distributed critical infrastructure.
The aim of this academic get-together, ACM International Symposium on Blockchain and Secure Critical Infrastructure,
is to collect latest research results concerning Blockchain and secure critical infrastructure on relevant scenarios,
such as the ones subsequently listed. Researchers, experts, and scholars from both industry and academia are encouraged
to share their recent studies, investigations, and findings in this forum.
Topics of particular interest include, but are not limited to:
- Current state of Blockchain and Secure Critical Infrastructure
- Technical issues of Blockchain and Secure Critical Infrastructure (architecture, functionality, workflows, availability, scalability, challenges of implementation, etc.)
- Security and Privacy in Blockchain and Critical Infrastructure
- Attacks on Blockchain and Critical Infrastructure
- Blockchain and Secure Critical Infrastructure with 5G
- Blockchain and Secure Critical Infrastructure with Smart Grid
- Blockchain and Secure Critical Infrastructure with Industrie 4.0
- Impact on business models (change of existing business models, emergence of new business models, disruptive business models, etc.)
- Blockchain Advance in Secure Smart Grid
- The future applications of Blockchain and Secure Critical Infrastructure in different areas (finance, insurance, healthcare and pharmaceuticals, energy sector, education, transportation, media production, government sector etc.)
to the technical research achievements, all qualified submissions in
relevant subtopics (including novel industrial topics) not mentioned here are welcomed, too.
Nevertheless, articles focusing on describing standards or commercial purposes are not considered
as acceptable contents for this symposium. High quality submissions will be recommended to a few
journal special issues that are currently being applied for.
Keke Gai, Beijing Institute of Technology, China
Kim-Kwang Raymond Choo, University of Texas at San Antonio, USA
Debiao He, Wuhan University, China
Sheng Wen, Swinburne University of Technology, Australia
Technical Program Committee
Yonghao Wang, Birmingham City University, UK
Ding Wang, Peking University, China
Tianwei Zhang, Amazon, USA
John Grant, Nine Tiles Cambridge, UK
Ralph Deters, University of Saskatchewan, Canada
Cheng Zhang, Waseda University, Japan
Paul Kearney, Birmingham City University, UK
Mak Sharma, Birmingham City University, UK
Zengpeng Li, Lancaster University, UK
Zijian Zhang, Beijing Institute of Technology, China
Xiaoyang Liu, Columbia University, USA
Shaojing Fu, National University of Defense Technology, China
Jian Shen, Nanjing University of Information Science and Technology, China
Hao Wang, Shandong Normal University, China
Junwei Zhang, Xidian University, China
Xinghua Li, Xidian University, China
Vitor Jesus, Birmingham City University, UK
Shuo Wang, Birmingham City University, UK
Hao Tang, City University of New York, USA
Xiong Li, Hunan University of Science and Technology, China
Shishank Shishank, Birmingham City University, UK
Yunxia Liu, Zhengzhou Normal University,China
Qi Jiang, Xidian University, China
Wenbo Shi, Northeastern University, China
Ning Lu, Northeastern University, China
Han Qiu, Telecom-ParisTech, France
Hua Yin, Duke University, USA
Ke Miao, Mitacs Inc., Canada
Md Liakat Ali, Rider University, USA
Ruoyu Chen, Beijing Information Science and Technology University, China
Wei Cai, The Chinese University of Hong Kong, Shenzhen, China