Friday, 12 June 2015 (09:00 - 18:00)
9:00 - 09:05 - Welcome Message
Welcome message by the General Workshop Co-Chair Prof. Anastasios Economides09:05 - 10:00 - Keynote Speech
Keynote Speaker: Jesús Alonso-ZárateTitle: "Enabling Autonomous Communications between Machines, Humans, and Things"
We are approaching the end of the world, as we know it. Autonomous communication between machines, the so-called Machine-to-Machine (M2M) paradigm is deemed to create a third global revolution in our daily days, the same way the steam machine triggered the Industrial Revolution, or the World Wide Web fostered the World 2.0 as we know it today. A world of interconnected machines, humans, and things, will enable new business models, improve competitiveness, and boost our concept of well-being. Many challenges need to be faced before though. In this talk, I will introduce the topic, the motivation for it, the enabling key technologies and the challenges that still need to be solved to integrate M2M communications into the next generation of communication networks; 5G and beyond.
10:00 - 10:30 - Technical Session #1: Cloud and Middleware for Security
Session Chair: Melike Erol-Kantarci, Clarkson University, USA
Anomaly detection and privacy preservation in cloud-centric Internet of Things
Ismail Butun (Bursa Technical University, Turkey); Burak Kantarci and Melike Erol-Kantarci (Clarkson University, USA)
A Security Architecture for the Publish/Subscribe C-DAX Middleware
Florian Heimgaertner and Michael J Hoefling (University of Tuebingen, Germany); Barbara Vieira (Software Improvement Group, The Netherlands); Erik Poll (Radboud University Nijmegen, The Netherlands); Michael Menth (University of Tuebingen, Germany)
10:30 - 11:00 - Coffee Break
11:00 - 12:00 - Keynote Speech
Keynote Speaker: Prof. Wei YuTitle: "Secure Energy-Based Cyber-Physical Systems"
The smart grid, as a typical energy-based cyber-physical system, uses modern computing, communication and control technologies to make the power grid more efficient, reliable, and secure. Nonetheless, the smart grid may operate in hostile environments and lacking tamper-resistance hardware for sensor, meters, etc., increases the chance to be compromised by cyber adversaries. In this talk, I will introduce a modeling framework to systematically explore the space of threats in the smart grid and understand their impacts on both system operations and end users, as well as the development of effective mitigation schemes to defend against these attacks.
12:00 - 13:00 - Technical Session #2: Secure Communication 1
Session Chair: Qinghe Du (Xi'an Jiaotong University, P.R. China)High-Rate Cooperative Beamforming for Physical-Layer Security in Wireless Cyber-Physical Systems
Yizhen Zhang, Guobing Li, Qinghe Du and Gangming Lyu (Xi'an Jiaotong University, P.R. China); Guomei Zhang (Xi'an Jiaotong University, P.R. China)
Impact of Security Threats in Vehicular Alert Messaging Systems
Wafa Ben Jaballah (University of Bordeaux, France); Mauro Conti (University of Padua, Italy); Mosbah Mohamed (University of Bordeaux & LaBRI, France); Claudio E. Palazzi (University of Padua, Italy)
VisIoT: A Threat Visualisation Tool for IoT Systems Security
Panagiotis Sarigiannidis (University of Western Macedonia, Greece); Eirini Karapistoli and Anastasios A. Economides (University of Macedonia, Greece)
13:00 - 14:30 - Lunch Break
14:30 - 16:00 - Technical Session #3: Intrusion Detection and Risk Management
Session Chair: George Mamalakis (Aristotle University of Thessaloniki, Greece)New Trust-Based Detection Model for Concealed Malicious Nodes in a Wireless Sensor Network
Aljawharah Alnasser (King Saud University, Saudi Arabia); Nasser-Eddine Rikli (King Saud University & College of Computer and Information Sciences, Saudi Arabia)
A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things
George Rontidis (Hellenic Open University, Greece); Emmanouil Panaousis (University of Brighton, United Kingdom); Aron Laszka (Vanderbilt University, USA); Tasos Dagiuklas (Hellenic Open University & University of Patras, Greece); Pasquale Malacaria (Queen Mary University of London, United Kingdom); Tansu Alpcan (The University of Melbourne, Australia)
Analysing Behaviours for Intrusion Detection
George Mamalakis, Christos Diou and Andreas Symeonidis (Aristotle University of Thessaloniki, Greece)
Intrusion Detection System for RPL from Routing Choice Intrusion
Lan Zhang, Gang Feng and Shuang Qin (University of Electronic Science and Technology of China, P.R. China)
16:00 - 16:30 - Coffee Break
16:30 - 18:00 - Technical Session #4: Secure Communication 2
Session Chair: Maode Ma (Nanyang Technological University, Singapore)Secure and Fast Missing RFID Tags Identification with Lightweight MAC and Rateless Coding
Kentaroh Toyoda and Iwao Sasase (Keio University, Japan)
A View on Privacy & Trust in IoT
Jörg Daubert (Technische Universitaet Darmstadt, Germany); Alexander Wiesmaier and Panayotis Kikiras (AGT International, Germany)
An Authentication and Key Establishment Scheme to Enhance Security for M2M in 6LoWPANs
Yue Qiu and Maode Ma (Nanyang Technological University, Singapore)
Proxy-based End-to-End Key Establishment Protocol for the Internet of Things
Pawani Porambage (University of Oulu, Finland); An Braeken (Erasmushogeschool Brussel, IWT, Belgium); Pardeep Kumar (University of Oulu, Finland); Andrei Gurtov (Aalto University & ITMO University, Finland); Mika Ylianttila (University of Oulu, Finland)