The 3rd International Workshop on Secure Internet of Things
It’s a noisy, nosy world. For example, our cellphones are nonstop tracking devices that occasionally make calls – and yet we would be lost without their maps.(McDonald, 2013)
The same video sensor and recognition technologies that can help find a heart attack victim in a crowded stadium could be used by a repressive government to detect where its political enemies are gathering. (Chui, 2013)
Workshop Description and Scope
The International Workshop on Secure Internet of Things 2014 (SIoT 2014) will be held in conjunction with the European Symposium on Research in Computer Security (ESORICS 2014).
The Internet of Things (IoT) holds great promise for industrial processes, home users, public authorities, businesspeople and artists, among others – but there is also great reservation. As billions of devices of all sizes, shapes and locations become interconnected, should we assume failure in the mission of securing the emerging systems (Reinhardt, 2013)?
The 3rd International Workshop on Secure Internet of Things 2014 invites professionals from academia and industry to engage the public debate on security risks and solutions in this novel environment. What are the current risks for end-users and how are they changing as IoT becomes an ever present reality? What are the challenges of securing settings permeated by machine-to-machine and mesh communications? What innovations assist us in taming the ambient intelligence infused in our living surroundings by tracking and monitoring devices that communicate continuously with high-powered processing entities?
Call for Papers
You are welcome to send the CfP (available in PDF format) to your friends and colleagues working in the field.
We also invite contributions that tackle general or domain-specific issues, such as: What are the most relevant current risks and solutions for governmental action in the context of IoT – such as “algorithmic regulation” based on Big Data (O’Reilly, 2013)? How can we secure communication to protect consumers (Calo, 2013) and entrepreneurs? What are the specific threats and emerging solutions for the Internet of health sensors and medical devices?
A tentative list of topics includes – without being limited to – the following:
- Threat models and attack strategies in the Internet of Things: how can we make sense of the new dangers? What intrusion and malware detection methods are effective?
- Privacy in the Brave New World:
- Ensuring privacy by design;
- Communicating simplified privacy disclosures and negotiating reasonable data security;
- How can consumers get efficient access to their data and aggregated data from other users?
- Managing identity in the heterogeneous IoT: identity standards and management; uses and abuses of rich consumer profiles derived from combined threads of information (Brill, 2013)
- Secure mobile applications and secure mobility management;
- Adaptive security;
- Security architectures ;
- Security in wireless sensor networks;
- Secure operating systems;
- Trustworthiness ;
- Reliable interactions with network services.
Brill, J. (2013). From Regulators, Guidance and Enforcement. New York Times.
Calo, R. (2013). Sales Pitches From Your Refrigerator. New York Times.
Chui, M. (2013). Doing More, and Doing It Better. New York Times.
Fried, L. (2013). Minimizing Risk Is Easy: Adopt a Bill of Rights. New York Times.
McDonald, A. M. . (2013). Better Engineering, and Better Laws. New York Times.
O’Reilly, T. (2013). Open Data and Algorithmic Regulation. In B. Goldstein & L. Dyson (Eds.), Beyond Transparency. Open Data and the Future of Civic Innovation (pp. 289–300). Code for America Press.
Reinhardt, H. (2013). To secure the Internet of things, assume failure. InfoWorld.com.
Rose, A. (2013). The internet of things is set to change security priorities. ComputerWeekly.com.
Woods, T. (2013). Informed Consumers Will Use Less Energy. New York Times.
Răzvan Rughiniș, Department of Computer Science, University Politehnica of Bucharest, Romania
razvan.rughinis at cs.pub.ro
Gabriel Ghiniță, Department of Computer Science, University of Massachusetts Boston, USA
gabriel.ghinita at umb.edu
Mihai Bucicoiu, Department of Computer Science, University Politehnica of Bucharest
mihai.bucicoiu at cs.pub.ro
Laura Gheorghe, Department of Computer Science, University Politehnica of Bucharest
laura.gheorghe at cs.pub.ro
Program Committee Members
To be announced
Submission Deadline: April 2nd, 2014
Author Notification: June 10th, 2014
Author Registration: June 21th, 2014
Camera-Ready Due: June 21th, 2014
Conference: September 7th – 11th, 2014
Please follow the submission guidelines presented here.