1st Workshop on the Security of the Internet of Things (SecIoT2010)
|Event Date/Time: Nov 29, 2010||End Date/Time: Nov 29, 2010|
|Paper Submission Date: Sep 10, 2010|
The 1st Workshop on the Security of the Internet of Things
Tokyo (Japan), November 29, 2010
in conjunction with
Internet Of Things 2010, November 29 - December 1, 2010
Paper Submission due: 10 September 2010
Acceptance notification: 5 October 2010
Final papers due: 12 October 2010
While there are many definitions of the Internet of Things (IoT), all of them revolve around the same central
concept: a world-wide network of interconnected objects. These objets will make use of multiple technological
building blocks, such as wireless communication, sensors, actuators, and RFID, in order to allow people and
things to be connected anytime anyplace, with anything and anyone. However, before this new vision takes its
first steps, it is essential to consider the security implications of billions of intelligent things
cooperating with other real and virtual entities over the Internet. In fact, we need to plan well in advance
what kind of technological mechanisms, protocols and standard infrastructures we will need in order to protect
the IoT. Failure to do so will result in a weak infrastructure, which will be surely exploited by malicious
entities performing attacks such as accessing personal information or manipulating the elements of the real
world. The setback caused by the lack of trust on the IoT can be disastrous for the realization of this vision.
Securing the IoT is a very complex task, because there are plenty of factors that must be taken into account.
Not only it is necessary to protect its different building blocks, but it is also vital to consider how these
blocks will work together and what kind of interoperable security mechanisms must be created. Besides, there
will be multiple actors, such as human beings, machines, and the very own objects, that will use the services
provided by the IoT, and it is necessary to assure a certain level of security during their cooperation.
Moreover, the management of all the information produced by these interactions raises many security concerns,
such as privacy issues, that must be addressed and solved. Therefore, the goal of this workshop is to bring
together researchers and industry experts in areas relevant to the security of the Internet of Things. As this
workshop is the first in this area, it is also its objective to serve as a forum for not only presenting state
-of-the-art research, but also for debating the role of security and its practical implications in the
development of the IoT.
Topics of interest for the workshop include the following:
* New security problems in the context of the IoT.
* Privacy risks and data management problems.
* Identifying, authenticating, and authorizing entities.
* Development of trust frameworks for secure collaboration.
* New cryptographic primitives for constrained "things".
* Connecting heterogeneous ecosystems and technologies.
* Legal Challenges and Governance Issues.
* Resilience to external and internal attacks.
* Context-Aware Security.
* Providing protection to an IP-connected IoT.
* Web services security and other application-layer issues.
Submitted papers must not substantially overlap papers that have been published or that are simultaneously
submitted to a journal or a conference with proceedings. Submission of a paper should be regarded as an
undertaking that, should the paper be accepted, at least one of the authors will register for the conference
and present the work. All accepted workshop papers will be published in a single workshop proceedings volume.
Papers must be submitted using the workshop web site and following the requirements stated there. All Paper
submissions should be anonymized to facilitate blind review. Submission should be in IEEE 8.5x11 conference
format and should not exceed 8 pages. Submission should be formatted in strict accordance with the IEEE
Computer Society author guidelines:
- Jim Clarke (Waterford Institute of Technology, Ireland)
- Rodrigo Roman (University of Malaga, Spain)
- Stefanos Gritzalis (University of the Aegean, Greece)
- Jianying Zhou (Institute for Infocomm Research, Singapore)
Program Committee (Tentative - PC are being invited):
- Alessandro Acquisti (Carnegie Mellon University, USA)
- Levente Buttyan (BME, Hungary)
- Barbara Daskala (ENISA, Greece)
- John Dominque (Knowledge Media Institute, The Open University, UK)
- Alex Gluhak (University of Surrey, UK)
- Antonio Jara (University of Murcia, Spain)
- Marc Joye (Technicolor, France)
- Jin Kwak (Soonchunhyang University, Korea)
- Andre Koenig (Technische UniversitÃ¤t Darmstadt, Germany)
- Manik Lal Das (Dhirubhai Ambani Inst. for Information and Communication Tech., India)
- Albert Levi (Sabanci University, Turkey)
- Javier Lopez (University of Malaga, Spain)
- Christoph P. Mayer (University of Karlsruhe, Germany)
- Yi Mu (University of Wollongong, Australia)
- Barry Mulcahy (Waterford Institute of Technology, Ireland)
- Aljosa Pasic (Atos Origin, Spain)
- Panagiotis Rizomiliotis (University of the Aegean, Greece)
- Gokay Saldamli (Bogazici University, Turkey)
- Neeraj Suri (Technische Universitaet Darmstadt, Germany)
- Rolf H. Weber (University of Zurich, Switzerland)
- Duncan Wong (City University of Hong Kong, China)
- Yanjiang Yang (Institute for Infocomm Research, Singapore)
- Yunlei Zhao (Fudan University, China)
- Wen Tao Zhu (CAS, China)