PRIMORIS      Contacts      FAQs      INSTICC Portal
 
Workshop
Innovative CyberSecurity and Privacy for Internet of Things: Strategies, Technologies, and Implementations - WICSPIT 2017

24 - 26 April, 2017 - Porto, Portugal

In conjunction with the International Conference on Internet of Things, Big Data and Security - IoTBDS 2017


WICSPIT is a shared event between IoTBDS and SMARTGREENS.

CO-CHAIRS

Roger Hallman
Spawar Systems Center Pacific
United States
 
Brief Bio
Roger Hallman is a Cybersecurity Research Scientist and a Science & Technology Manager at the Space & Naval Warfare (SPAWAR) Systems Center, Pacific, US Department of Defense. Since joining the Department of Defense in 2014, Mr. Hallman has authored or co-authored publications on enterprise decision making, secure cloud computing, and critical infrastructure security. He is a lead or co-inventor on multiple patent applications in the areas of enterprise decision making and secure computation. His research interests include encrypted computing, active cybersecurity, and data privacy.
Hala Mostafa
United Technologies Research Center
United States
 
Brief Bio
Dr. Hala Mostafa is a Research Scientist in the Decision Support and Machine Intelligence Group at United Technologies Research Center where her expertise is in probabilistic reasoning under uncertainty, automated decision making and machine learning. She works on applications of these areas to short-term customer projects as well as longer-term research projects, including principled distributed and single-agent decision-making approaches for problems in cyber-security and IoT. Before UTRC, Hala worked at Raytheon BBN Technologies where she was the Technical Lead on an AFRL-funded project that developed distributed coordination approaches for managing contested computer networks.
Kurt Rohloff
New Jersey Institute of Technology
United States
 
Brief Bio
Dr. Kurt R. Rohloff is the co-founder and director of the NJIT Cybersecurity Research Center and an associate professor of computer science at NJIT. His areas of technical expertise include homomorphic encryption, secure computing, high-assurance software engineering, control engineering and prototype system building. He is the PI on a multi-disciplinary DARPA project to develop an open-source software library for highly optimized lattice encryption. Prior to joining NJIT, he was a senior scientist at Raytheon BBN Technologies. https://web.njit.edu/~rohloff/
Victor Chang (honorary)
IBSS, Xi'an Jiaotong Liverpool University
China
 
Brief Bio
Victor Chang is an Associate Professor (Reader) in Information Management and Information Systems of International Business School Suzhou, Xi'an Jiaotong Liverpool University, China. He's also a Director of PhD Program. He was previously a Senior Lecturer in the School of Computing, Creative Technologies at Leeds Beckett University, UK. He’s a Visiting Researcher at the University of Southampton, UK and an Honorary Associate Professor at the University of Liverpool, UK. He is an expert on Cloud Computing and Big Data in both academia and industry with extensive experience in related areas since 1998. He completed a PGCert (Higher Education) and PhD (Computer Science) within four years while working full-time. He has over 100 peer-reviewed published papers. He won £20,000 funding in 2001 and £81,000 funding in 2009. He was involved in part of the £6.5 million project in 2004, part of the £5.6 million project in 2006 and part of a £300,000 project in 2013. He won a 2011 European Identity Award in Cloud Migration, since his work is making contributions. He has won 2016 European Identity and Cloud Award on the best project in research, involved with more than 20 collaborators worth more than $10 millions in valuation. He was selected to present his research in the House of Commons in 2011 and won the best paper in 2012 and 2015. He has demonstrated Storage as a Service, Health Informatics as a Service, Financial Software as a Service, Education as a Service, Big Data Processing as a Service, Integration as a Service, Security as a Service, Social Network as a Service, Data Visualization as a Service (Weather Science) and Consulting as Service in Cloud Computing and Big Data services in both of his practitioner and academic experience. His proposed frameworks have been adopted by several organizations. He is the founding chair of international workshops in Emerging Software as a Service and Analytics and Enterprise Security. He is the founding chair of IoTBDS and COMPLEXIS which have become popular in research communities. He is an Editor-in-Chief (EIC) in International Journal of Organizational and Collective Intelligence and a founding EIC in Open Journal of Big Data. He is the Editor of a highly prestigious journal, Future Generation Computer Systems (FGCS). He is a reviewer of numerous well-known journals and had published three books on Cloud Computing which are available on Amazon website. He is a keynote speaker for CLOSER 2015/WEBIST2015/ICTforAgeingWell 2015 and has received positive support.

SCOPE

Cyber-attackers are steadily getting more creative and ambitious in their exploits and causing real-world damage (e.g., the German steel mill hack in 2014, the Ukrainian Power Grid hack in 2015). Proprietary and personally identifiable information are vulnerable to leakage as well (e.g., the Sony hack in 2014, the US Office of Personnel Management in 2014). The Internet of Things (IoT), a platform which allows everything to process information, communicate data, and analyze context opens up new vulnerabilities for both security and privacy. Smart buildings and smart cities, for example, will collect and process data for millions of individuals. Industrial systems, which were never intended to be linked via common protocols, are recognized as suddenly being open to security threats that can limit service availability and possibly cause considerable damage. Autonomous systems allowed to operate with minimal oversight are ripe targets for cyber-attacks. Data stored and processed in confidence in the cloud may be subject to exfiltration, leading to public embarrassment or the exposure of proprietary information.
As cyber-events increase in number and severity, security engineers must incorporate innovative cybersecurity strategies and technologies to safeguard their systems and confidential information. A strategy to address a cybersecurity vulnerability, once identified, must understand the nature of the vulnerability and how to mitigate it. The “security tax” or “privacy tax” (system and service degradation) caused by the implementation of the mitigating security technologies may be so great that the end user bypasses the technologies and processes meant to ensure the system’s security and privacy. A practical reality of the adoption of IoT is that it will require integration of new technologies with existing systems and infrastructure, which will continue to expose new security and privacy vulnerabilities; re-engineering may be required. The human element of IoT, the user, must be considered, and how the user and the IoT system interact to optimize system security and user privacy must be defined. Cyber-attackers and cyber victims are often in different countries, the transnational nature of many cyber-events necessitate the consideration of public policy and legal concerns as well.
This workshop aims to showcase new and emerging strategies and technologies for forecasting, mitigating, countering, and attributing cyber-events that threaten security and privacy within the realm of IoT. The institutional benefits of IoT adoption are clear, however security and privacy concerns are constantly coming to light. As organizations—both public and private, large and small—adopt new IoT technologies, we hope that this workshop can serve as an opening conversation between government, industry, and academia for the purpose of addressing those concerns.

Topics of Interest

Topics of interest include (but are not limited to):
Cyber–security approaches
  • Honeypots, Honeynets and Honeypatches
  • Deception-based approaches
  • Encrypted Computing and Secure Computation
  • Active and Passive Cybersecurity
  • Firmware vetting
  • Privacy-Enhancing Technologies
  • Intelligence and Counter-Intelligence
  • Security and Privacy Engineering
Cyber-security Settings
  • Cyber-Security and Privacy in Cyber-Physical Systems
  • Industrial Internet of Things (IIoT)
  • Smart Cities
  • Cyber-Physical Power Systems
Data analytics for cyber-security
  • Predictive Cyber-Security
  • Event Analysis
  • Event Attribution and Cyber-Forensics
Cyber-security metrics
  • Security and Privacy Metrics and Analysis
  • Metrics of defense effectiveness
  • Quantifying the ‘security/privacy tax’
Human/Societal issues
  • Legal and Policy Topics related to Cyber-Security and Privacy
  • Human Factors in Cyber-Security and Privacy
  • Inter-Organizational Cyber-Threat Information Sharing
Other topics
  • Integration of New Technology into Existing Systems
  • Situational Awareness
  • System Situational Awareness
  • Emerging Threats
  • Event Recovery
  • Security as a Service (SaaS)
  • Private Data as a Service (PDaaS)

IMPORTANT DATES

Paper Submission: February 20, 2017
Authors Notification: March 1, 2017
Camera Ready and Registration: March 13, 2017

WORKSHOP PROGRAM COMMITTEE

Marina Blanton, University at Buffalo, The State University of New York, United States
An Braeken, Vrije Universiteit Brussel, Belgium
Daniel Conte de Leon, University of Idaho, United States
Tiago Cruz, University of Coimbra, Portugal
Ishbel Duncan, University of St. Andrews, United Kingdom
ADNAN EL NASAN, AMERICAN UNIVERSITY IN DUBAI, United Arab Emirates
Sunny Fugate, SPAWAR Systems Center Pacific, United States
Kevin Hamlen, University of Texas at Dallas, United States
Hongxin Hu, Clemson University, United States
Andreas Jacobsson, Malmö University, Sweden
Jaclyn Kerr, Lawrence Livermore National Laboratory; Stanford University, United States
Xenofon Koutsoukos, Vanderbilt University, United States
Devu MANIKANTAN, United Technologies Research Center, United States
Jason R. C. Nurse, University of Oxford, United Kingdom
Kasper Rasmussen, Oxford University, United Kingdom
Mohammad Abdur Razzaque, Trinity College Dublin, Ireland
Jose Romero-Mariona, SPAWAR Systems Center Pacific, United States
Siamak F Shahandashti, Newcastle University, United Kingdom
Paulo Simoes, University of Coimbra, Portugal
Dhananjay Singh, Hankuk Univ. of Foreign Studies, Seoul, Korea, Republic of
Jia Song, University of Idaho, United States
Pawel Szalachowski, ETH Zurich, Switzerland
April Tanner, Jackson State University, United States
Clark Thomborson, University of Auckland, New Zealand

PAPER SUBMISSION

Prospective authors are invited to submit papers in any of the topics listed above.
Instructions for preparing the manuscript (in Word and Latex formats) are available at: Paper Templates
Please also check the Guidelines.
Papers must be submitted electronically via the web-based submission system using the appropriated button on this page.

PUBLICATIONS

After thorough reviewing by the workshop program committee complemented by members of the main conference program committee, all accepted papers will be published in a special section of the conference proceedings book - under an ISBN reference and on CD-ROM support.
All papers presented at the conference venue will be available at the SCITEPRESS Digital Library (http://www.scitepress.org/DigitalLibrary/).
SCITEPRESS is a member of CrossRef (http://www.crossref.org/) and every paper is given a DOI (Digital Object Identifier).

SECRETARIAT CONTACTS

IoTBDS Workshops - WICSPIT 2017
e-mail: iotbd.secretariat@insticc.org
footer