Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems

Friday, 12 June 2015 • 09:00 – 18:00

WS-22: Security and Privacy for Internet of Things and Cyber-Physical Systems

Organizer: Anastasios A. Economides (University of Macedonia, Greece)

The Internet of Things (IoT) and Cyber-Physical Systems (CPS) will fuel the realization of a new, globally interconnected cyber-world. Yet, the success, prosperity, and advancement of IoT and CPS systems strongly depend on the security, privacy and trust of the interconnected devices, networks and data being exchanged. Successful attacks targeted to IoT/CPS systems not only affect a single device, but also all interconnected systems with severe financial, environmental and health losses. This fact highlights the need to develop novel tools that will constitute the heart of a much-needed science of security for IoT and CPS. The 2015 IoT/CPS-Security workshop will bring together internationally leading academic and industrial researchers in an effort to identify and discuss the major technical challenges and recent results aimed at addressing all aspects of security and privacy for IoT and CPS.

Welcome Session

Keynote-1: Enabling Autonomous Communications between Machines, Humans, and Things

We are approaching the end of the world, as we know it. Autonomous communication between machines, the so-called Machine-to-Machine (M2M) paradigm is deemed to create a third global revolution in our daily days, the same way the steam machine triggered the Industrial Revolution, or the World Wide Web fostered the World 2.0 as we know it today. A world of interconnected machines, humans, and things, will enable new business models, improve competitiveness, and boost our concept of well-being. Many challenges need to be faced before though. In this talk, I will introduce the topic, the motivation for it, the enabling key technologies and the challenges that still need to be solved to integrate M2M communications into the next generation of communication networks; 5G and beyond.

Cloud and Middleware for Security

Anomaly detection and privacy preservation in cloud-centric Internet of Things
Ismail Butun (Bursa Technical University, Turkey); Burak Kantarci and Melike Erol-Kantarci (Clarkson University, USA)
pp. 10680-10685
A Security Architecture for the Publish/Subscribe C-DAX Middleware
Florian Heimgaertner and Michael J Hoefling (University of Tuebingen, Germany); Barbara Vieira (Software Improvement Group, The Netherlands); Erik Poll (Radboud University Nijmegen, The Netherlands); Michael Menth (University of Tuebingen, Germany)
pp. 10686-10691

Keynote-2: Secure Energy-Based Critical Infrastructure

The smart grid, as a typical energy-based cyber-physical system, uses modern computing, communication and control technologies to make the power grid more efficient, reliable, and secure. Nonetheless, the smart grid may operate in hostile environments and lacking tamper-resistance hardware for sensor, meters, etc., increases the chance to be compromised by cyber adversaries. In this talk, I will introduce a modeling framework to systematically explore the space of threats in the smart grid and understand their impacts on both system operations and end users, as well as the development of effective mitigation schemes to defend against these attacks.

Secure Communication 1

High-Rate Cooperative Beamforming for Physical- Layer Security in Wireless Cyber-Physical Systems
Yizhen Zhang, Guobing Li, Qinghe Du and Gangming Lyu (Xi'an Jiaotong University, P.R. China); Guomei Zhang (Xi’an Jiaotong University, P.R. China)
pp. 10692-10696
Impact of Security Threats in Vehicular Alert Messaging Systems
Wafa Ben Jaballah (University of Bordeaux, France); Mauro Conti (University of Padua, Italy); Mosbah Mohamed (University of Bordeaux & LaBRI, France); Claudio E. Palazzi (University of Padua, Italy)
pp. 10697-10702
VisIoT: A Threat Visualisation Tool for IoT Systems Security
Panagiotis Sarigiannidis (University of Western Macedonia, Greece); Eirini Karapistoli and Anastasios A. Economides (University of Macedonia, Greece)
pp. 10703-10708

Intrusion Detection and Risk Management

A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things
George Rontidis (Hellenic Open University, Greece); Emmanouil Panaousis (University of Brighton, United Kingdom); Aron Laszka (Vanderbilt University, USA); Tasos Dagiuklas (Hellenic Open University & University of Patras, Greece); Pasquale Malacaria (Queen Mary University of London, United Kingdom); Tansu Alpcan (The University of Melbourne, Australia)
pp. 10709-10714
Analysing Behaviours for Intrusion Detection
George Mamalakis, Christos Diou and Andreas Symeonidis (Aristotle University of Thessaloniki, Greece)
pp. 10715-10721
Intrusion Detection System for RPL from Routing Choice Intrusion
Lan Zhang, Gang Feng and Shuang Qin (University of Electronic Science and Technology of China, P.R. China)
pp. 10722-10728

Secure Communication 2

Secure and Fast Missing RFID Tags Identification with Lightweight MAC and Rateless Coding
Kentaroh Toyoda and Iwao Sasase (Keio University, Japan)
pp. 10729-10734
A View on Privacy & Trust in IoT
Jörg Daubert (Technische Universitaet Darmstadt, Germany); Alexander Wiesmaier and Panayotis Kikiras (AGT International, Germany)
pp. 10735-10740
An Authentication and Key Establishment Scheme to Enhance Security for M2M in 6LoWPANs
Yue Qiu and Maode Ma (Nanyang Technological University, Singapore)
pp. 10741-10746
Proxy-based End-to-End Key Establishment Protocol for the Internet of Things
Pawani Porambage (University of Oulu, Finland); An Braeken (Vrije Universiteit Brussel, Belgium); Pardeep Kumar (University of Oulu, Finland); Andrei Gurtov (Aalto University & ITMO University, Finland); Mika Ylianttila (University of Oulu, Finland)
pp. 10747-10752