Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems
Friday, 12 June 2015 • 09:00 – 18:00
WS-22: Security and Privacy for Internet of Things and Cyber-Physical Systems
Organizer: Anastasios A. Economides (University of Macedonia, Greece)
The Internet of Things (IoT) and Cyber-Physical Systems (CPS) will fuel the realization of a new, globally interconnected cyber-world. Yet, the success, prosperity, and advancement of IoT and CPS systems strongly depend on the security, privacy and trust of the interconnected devices, networks and data being exchanged. Successful attacks targeted to IoT/CPS systems not only affect a single device, but also all interconnected systems with severe financial, environmental and health losses. This fact highlights the need to develop novel tools that will constitute the heart of a much-needed science of security for IoT and CPS. The 2015 IoT/CPS-Security workshop will bring together internationally leading academic and industrial researchers in an effort to identify and discuss the major technical challenges and recent results aimed at addressing all aspects of security and privacy for IoT and CPS.
Welcome Session
Keynote-1: Enabling Autonomous Communications between Machines, Humans, and Things
We are approaching the end of the world, as we know it. Autonomous communication between machines, the so-called Machine-to-Machine (M2M) paradigm is deemed to create a third global revolution in our daily days, the same way the steam machine triggered the Industrial Revolution, or the World Wide Web fostered the World 2.0 as we know it today. A world of interconnected machines, humans, and things, will enable new business models, improve competitiveness, and boost our concept of well-being. Many challenges need to be faced before though. In this talk, I will introduce the topic, the motivation for it, the enabling key technologies and the challenges that still need to be solved to integrate M2M communications into the next generation of communication networks; 5G and beyond.
Cloud and Middleware for Security
- Anomaly detection and privacy preservation in cloud-centric Internet of Things
- pp. 10680-10685
- A Security Architecture for the Publish/Subscribe C-DAX Middleware
- pp. 10686-10691
Keynote-2: Secure Energy-Based Critical Infrastructure
The smart grid, as a typical energy-based cyber-physical system, uses modern computing, communication and control technologies to make the power grid more efficient, reliable, and secure. Nonetheless, the smart grid may operate in hostile environments and lacking tamper-resistance hardware for sensor, meters, etc., increases the chance to be compromised by cyber adversaries. In this talk, I will introduce a modeling framework to systematically explore the space of threats in the smart grid and understand their impacts on both system operations and end users, as well as the development of effective mitigation schemes to defend against these attacks.
Secure Communication 1
- High-Rate Cooperative Beamforming for Physical- Layer Security in Wireless Cyber-Physical Systems
- pp. 10692-10696
- Impact of Security Threats in Vehicular Alert Messaging Systems
- pp. 10697-10702
- VisIoT: A Threat Visualisation Tool for IoT Systems Security
- pp. 10703-10708
Intrusion Detection and Risk Management
- A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things
- pp. 10709-10714
- Analysing Behaviours for Intrusion Detection
- pp. 10715-10721
- Intrusion Detection System for RPL from Routing Choice Intrusion
- pp. 10722-10728
Secure Communication 2
- Secure and Fast Missing RFID Tags Identification with Lightweight MAC and Rateless Coding
- pp. 10729-10734
- A View on Privacy & Trust in IoT
- pp. 10735-10740
- An Authentication and Key Establishment Scheme to Enhance Security for M2M in 6LoWPANs
- pp. 10741-10746
- Proxy-based End-to-End Key Establishment Protocol for the Internet of Things
- pp. 10747-10752