2012 Workshop on the Security of the Internet of Things (SecIoT'12)

Venue: Munich

Location: Munich, Germany

Event Date/Time: Jul 30, 2012 End Date/Time: Jul 30, 2012
Paper Submission Date: Mar 09, 2012
Report as Spam


The 2012 Workshop on the Security of the Internet of Things (SecIoT'12)
Munich (Germany), July 30, 2012
in conjunction with
IEEE ICCCN 2012, July 30 – August 2, 2012

Important Dates:

Paper Submission due: March 9, 2012
Acceptance notification: April 25, 2012
Final papers due: May 10, 2012


While there are many definitions of the Internet of Things (IoT), all of
them revolve around the same central concept: a world-wide network of
interconnected objects. These objects will make use of multiple technological
building blocks (e.g. wireless communication, sensors, actuators, RFID)
and connectivity paradigms (e.g. cloud-based infrastructures, P2P systems)
in order to allow people and things to be connected anytime anyplace,
with anything and anyone. However, mainly due to the inherent heterogeneity
of this vision and its broad scope, there will not be a single silver bullet
security solution that will fulfill all the security requirements of the IoT.
Therefore: How can we include security as a core element of the IoT? How will
the IoT interact with other security mechanisms of the Future Internet?
What security requirements will be truly challenged by the ultimate vision of
the IoT?

It is precisely the goal of this workshop to bring together researchers and
industry experts in areas relevant to the security of the Internet of Things
to discuss these and other significant issues. Moreover, this workshop also
has the objective to serve as a forum not only for presenting cutting-edge
research, but also for debating the role of security and its practical
implications in the development of the IoT.

Topics of interest for the workshop include the following:

* New security problems in the context of the IoT.
* Privacy risks and data management problems.
* Identifying, authenticating, and authorizing entities.
* Development of trust frameworks for secure collaboration.
* New cryptographic primitives for constrained "things".
* Connecting heterogeneous ecosystems and technologies.
* Legal challenges and governance Issues.
* Resilience to external and internal attacks.
* Context-Aware security.
* Providing protection to an IP-connected IoT.
* Web services security and other application-layer issues.
* Security of cloud-based M2M/IoT platforms.
* Distributed policy enforcement and rights management.
* Usability of security and privacy technologies in the context of the IoT.

Submission Guidelines:

Submitted manuscripts must be formatted in standard IEEE camera-ready format
(double-column, 10-pt font) and must be submitted via EDAS (http://edas.info/)
as PDF files (formatted for 8.5x11-inch paper). The manuscripts should be no
longer than 5 pages. One additional page is permitted if the authors are
willing to pay an over-length charge at the time of publication (manuscripts
should not exceed 6 pages). Submitted papers cannot have been previously
published in or be under consideration for publication in another journal or
conference. The workshop Program Committee reserves the right to not review
papers that either exceed the length specification or have been submitted or
published elsewhere. Submissions must include a title, abstract, keywords,
author(s) and affiliation(s) with postal and e-mail address(es). A paper
abstract must be registered on EDAS by the deadline.

Submitted papers will be reviewed by the workshop Program Committee and
judged on originality, technical correctness, relevance, and quality of
presentation. An accepted paper must be presented at the ICCCN 2012 venue
by one of the authors registered at the full registration rate. Each workshop
registration covers up to two workshop papers by an author. Accepted and
registered papers will be published in proceedings that will be available
through Xplore. Papers that are not presented at the ICCCN 2012 venue by one
of the registered co-authors will not appear in Xplore.

General Chair:
- Jim Clarke (Waterford Institute of Technology, Ireland)

Program Co-Chairs:
- Rodrigo Roman (Institute for Infocomm Research, Singapore)
- Stefanos Gritzalis (University of the Aegean, Greece)

Program Committee:
- Gergely Acs (INRIA, France)
- Hani Alzaid (King Abdulaziz City for Science and Technology, Saudi Arabia)
- Katrin Borcea-Pfitzmann (TU Dresden, Germany)
- Seyit Ahmet Camtepe (TU Berlin, Germany)
- Alvaro Cardenas (Fujitsu Labs, USA)
- Chao Chen (University of Florida, USA)
- Benjamin Fabian (Humboldt-Universität zu Berlin, Germany)
- Tobias Heer (Aachen University, Germany)
- Qiong Huang (South China Agricultural University, China)
- Antonio Jara (University of Murcia, Spain)
- Marc Joye (Technicolor, France)
- Manik Lal Das (Dhirubhai Ambani Inst. for Information and Communication Tech., India)
- Costas Lambrinoudakis (University of Piraeus, Greece)
- Albert Levi (Sabanci University, Turkey)
- Pablo Najera (University of Malaga, Spain)
- Neeli Prasad (Aalborg University, Denmark)
- Sasa Radomirovic (University of Luxembourg, Luxembourg)
- Shahid Raza (Swedish Institute of Computer Science (SICS), Sweden)
- Panagiotis Rizomiliotis (University of the Aegean, Greece)
- Matt Robshaw (Orange Labs, France)
- Gokay Saldamli (Bogazici University, Turkey)
- Neeraj Suri (Technische Universitaet Darmstadt, Germany)
- Yanjiang Yang (Institute for Infocomm Research, Singapore)
- Wen Tao Zhu (CAS, China)

Steering Committee
- Jim Clarke (Waterford Institute of Technology, Ireland)
- Stefanos Gritzalis (University of the Aegean, Greece)
- Javier Lopez (University of Malaga, Spain)
- Rodrigo Roman (Institute for Infocomm Research, Singapore)
- Jianying Zhou (Institute for Infocomm Research, Singapore)