2nd Workshop on Recent advances in secure management of data and resources in the IoT (RED-IOT)
In-conjunction with EWSN 2018
Proceedings appear in ACM Digital Library
Proceedings appear in ACM Digital Library
Keynote Speech: Dr. Shahid Raza, director of the security lab at SICS, Sweden.
Recent advances in the area of Internet-Connected Objects have revolutionized the everyday lives of people and the industrial world. The Internet of Things (IoT) has infused immense doses of "intelligence" in the physical world making the transition towards digitising everything. Nowadays, most devices around us are either connected to the IoT or are about to be. Physical objects are becoming intelligent through connected devices that are either attached to them or monitoring/controlling them. At a larger scale, cities are becoming smarter, embracing a plethora of technologies to enhance and improve the quality of everyday living.
The evolution of traditional wireless sensor networks towards the IoT has introduced numerous opportunities for advanced and promising applications for citizens and industries. Many companies have recently launched "smart products" into the market, in every domain: home, automotive, agriculture, water, air, environment, etc. Most of these products are quite innovative and can be useful for improving and simplifying the lives of citizens, assisting them to their daily activities or contributing also to improving the municipal services and improving the quality of the environment we live.
However, most of these products fail to address even simple challenges for security and privacy: they do not protect the data they gather and transmit, they do not use encrypted connections, they use simplistic credentials, etc. The IoT, though, raises significant challenges regarding security, and privacy. Having large numbers of connected devices deployed everywhere around us, e.g. in homes, offices, buses, on the street, monitoring the everyday activities of citizens raises issues regarding user privacy. Privacy issues exist not only when users are actively involved in IoT applications e.g. when sending data from their mobile phones, but also when they are subjects of monitoring by other devices, e.g. when they are being monitored by cameras on the streets. Devices that offer actuation capabilities, e.g. traffic lights, doors, windows, alarms and vehicles allow cyber-attacks to extend effects to the real world. Current centralized IoT solutions raise also security and privacy issues due to the single central point of gathering all data and mechanisms. To address this, lately, there is a shift of interest towards distributed or decentralized security solutions.
This workshop builds on the success of the first RED-IoT workshop collocated with the IEEE CAMAD 2014 conference in Athens, Greece, December 2014. It aims to bring together experts from academia and industry that are working in cross-layer issues in the areas of security, and privacy in the IoT. The goal is to present recent results of the research community, the industry and standardisation bodies and exchange ideas for joint research activities in the future.
Recent advances in the area of Internet-Connected Objects have revolutionized the everyday lives of people and the industrial world. The Internet of Things (IoT) has infused immense doses of "intelligence" in the physical world making the transition towards digitising everything. Nowadays, most devices around us are either connected to the IoT or are about to be. Physical objects are becoming intelligent through connected devices that are either attached to them or monitoring/controlling them. At a larger scale, cities are becoming smarter, embracing a plethora of technologies to enhance and improve the quality of everyday living.
The evolution of traditional wireless sensor networks towards the IoT has introduced numerous opportunities for advanced and promising applications for citizens and industries. Many companies have recently launched "smart products" into the market, in every domain: home, automotive, agriculture, water, air, environment, etc. Most of these products are quite innovative and can be useful for improving and simplifying the lives of citizens, assisting them to their daily activities or contributing also to improving the municipal services and improving the quality of the environment we live.
However, most of these products fail to address even simple challenges for security and privacy: they do not protect the data they gather and transmit, they do not use encrypted connections, they use simplistic credentials, etc. The IoT, though, raises significant challenges regarding security, and privacy. Having large numbers of connected devices deployed everywhere around us, e.g. in homes, offices, buses, on the street, monitoring the everyday activities of citizens raises issues regarding user privacy. Privacy issues exist not only when users are actively involved in IoT applications e.g. when sending data from their mobile phones, but also when they are subjects of monitoring by other devices, e.g. when they are being monitored by cameras on the streets. Devices that offer actuation capabilities, e.g. traffic lights, doors, windows, alarms and vehicles allow cyber-attacks to extend effects to the real world. Current centralized IoT solutions raise also security and privacy issues due to the single central point of gathering all data and mechanisms. To address this, lately, there is a shift of interest towards distributed or decentralized security solutions.
This workshop builds on the success of the first RED-IoT workshop collocated with the IEEE CAMAD 2014 conference in Athens, Greece, December 2014. It aims to bring together experts from academia and industry that are working in cross-layer issues in the areas of security, and privacy in the IoT. The goal is to present recent results of the research community, the industry and standardisation bodies and exchange ideas for joint research activities in the future.
Topics of Interest
The workshop welcomes original submissions in the following topic areas:
- Security and privacy by design architectures for IoT
- Decentralized and distributed security architectures
- Blockchain in the IoT
- GDPR in IoT
- Intelligent, secure data processing, mining, fusion, storage, and management, context awareness, ambient intelligence
- Secure wireless channel and traffic models
- Physical layer security in the IoT
- Secure spectrum management solutions for wireless IoT communications
- Security of sensors and actuators
- Security and privacy in IoT applications
- Embedded security and privacy in IoT devices
- Forensics for IoT
- Privacy and anonymization techniques in IoT
- Trust management IoT architectures
- Lightweight security solutions
- On-device authentication, authorization and access control in IoT
- Big data security for IoT
- Detection and prevention of IoT-based security attacks
- Ethics and legal considerations in IoT.
Submission Instructions and Formatting Requirements
The papers will be published as part of the conference proceedings and will appear in the
ACM Digital Library. We encourage submissions from academia and industry alike. Full
papers can have a maximum length of 6 pages (two column format). The workshop also
accepts short position papers of a maximum length of two pages in the same format.
Pages must have 8.5" x 11" (letter) two-column format, using 10-point type on 11-point leading, with a maximum text block of 7" wide x 9" deep with an intercolumn spacing of .25". The page limits include figures, tables, and references. Authors may use the LaTex template ewsn-workshops.tex provided here.
All submitted papers will be judged through single-blind reviewing. Please include author names and affiliations along with the title.
Submissions will be handled through EasyChair here.
Pages must have 8.5" x 11" (letter) two-column format, using 10-point type on 11-point leading, with a maximum text block of 7" wide x 9" deep with an intercolumn spacing of .25". The page limits include figures, tables, and references. Authors may use the LaTex template ewsn-workshops.tex provided here.
All submitted papers will be judged through single-blind reviewing. Please include author names and affiliations along with the title.
Submissions will be handled through EasyChair here.
Important Dates
Paper registration: October 22, 2017 (hard deadline)
Paper submissions: October 29, 2017 (hard deadline)
Notification: December 1, 2017
Camera ready: December 20, 2017
Paper submissions: October 29, 2017 (hard deadline)
Notification: December 1, 2017
Camera ready: December 20, 2017
Organization
Elias Tragos, Insight Centre for Data Analytics, NUI Galway, Ireland
George Oikonomou, Electrical and Electronic Engineering, University of Bristol, UK
Technical Program Committee:
Vangelis Angelakis, Linköping University, Sweden
Budi Arief, University of Kent, UK
Simon Duquennoy, RISE SICS, Sweden
Xenofon Fafoutis, University of Bristol, UK
Alexandros Fragkiadakis, FORTH-ICS, Greece
Julio Hernandez-Castro, University of Kent, UK
Aqeel Kazmi, NUI Galway, Ireland
Rémy Leone, INRIA, France
George Moldovan, Siemens, Romania
Henrich Pöhls, University of Passau, Germany
James Pope, University of Bristol, UK
Martin Serrano, NUI Galway, Ireland
Shahid Raza, RISE SICS, Sweden
Nicolas Tsiftes, RISE SICS, Sweden
Pete Woznowski, University of Bristol, UK
George Oikonomou, Electrical and Electronic Engineering, University of Bristol, UK
Technical Program Committee:
Vangelis Angelakis, Linköping University, Sweden
Budi Arief, University of Kent, UK
Simon Duquennoy, RISE SICS, Sweden
Xenofon Fafoutis, University of Bristol, UK
Alexandros Fragkiadakis, FORTH-ICS, Greece
Julio Hernandez-Castro, University of Kent, UK
Aqeel Kazmi, NUI Galway, Ireland
Rémy Leone, INRIA, France
George Moldovan, Siemens, Romania
Henrich Pöhls, University of Passau, Germany
James Pope, University of Bristol, UK
Martin Serrano, NUI Galway, Ireland
Shahid Raza, RISE SICS, Sweden
Nicolas Tsiftes, RISE SICS, Sweden
Pete Woznowski, University of Bristol, UK