Difference between revisions of "Asset:Current events"

From Asset
Jump to: navigation, search
(CALL FOR PARTICIPATION)
(The successful completion of the Security Tools and Techniques for Internet of Things (SeTTIT) Workshop)
Line 1: Line 1:
=The successful completion of the Security Tools and Techniques for Internet of Things (SeTTIT) Workshop=
+
=The successful completion of the SeTTIT (Security Tools and Techniques for Internet of Things) Workshop=
"*******************************************************************************************"
+
The SeTTIT Workshop in conjunction with the BodyNets 2012 Conference concluded on Wednesday September 26, 2012, Oslo, Norway. The workshop featured 2 keynote speeches and 4 regular papers. The program of the workshop was as follows:
  
'''Workshop on Security Tools and Techniques for Internet of Things (SeTTIT 2012)'''
+
* ''Chair: Dr. Habtamu Abie NR, Norway
 +
* Keynote speech: Information Management Challenges in a context-aware Internet of Things Towards a Healthy You, Prof. Stefan Poslad, Queen Mary University of London, UK
 +
* Security and Privacy Threats in IoT Architectures, D. Kozlov, J. Veijalainen and Y. Ali, University of Jyväskylä, Finland
 +
* Towards Metrics-Driven Adaptive Security Management in E-Health IoT Applications, R. M. Savola, H. Abie and M. Sihvonen, VTT Finland
 +
* Keynote speech: Game Theory and Trust Models for the Internet of Things, Dr. Mohamed Hamdi, School of Communication Engineering, Tunisia
 +
* Risk-Based Adaptive Security for Smart IoT in eHealth H. Abie and I Balasingham, Norwegian Computing Center, Norway
 +
* Managing Access Control for Things: a Capability Based Approach, D. Rotondi and S. Piccione, TxT e-solutions S.p.A., Italy''
  
'''Oslo, Norway -- September 26, 2012'''
+
The first keynote speech, "Information Management Challenges in a Context-Aware Internet of Things (ioT)  towards a Healthy You" by Prof. Stefan Poslad, has covered the ‘Old’ Internet of Devices vs the ‘New’ IoT, IoT Architecture Models, IoT Apps in eHealth, and the objectives and challenges of information management including how IoT such as sensors and RFID tags add more low resource digital things, and single-task OS & RTOS devices that run vertical services are networked but not IP networked and cannot easily be orchestrated, and how the use and value of  sensor data and the ways  can be orchestrated  can be  enhanced if the appropriate contexts for the sensor data are defined, can be captured, linked to, browsed and post-processed which represent key information management challenges in a context-aware IoT towards a healthy you.
  
http://settit.bodynets.org/2012/show/home
+
The second keynote speech, “Game Theory and Trust Models for the IoT" by Dr. Mohamed Hamdi, analyzed the threat sophistication in the IoT based on real attack cases, discussed relevant examples including coalition attacks and impersonation in online gaming applications, reviewed the mathematical foundations of game theory with a listing of the different categories of games and their main features, and a discussion of the categories that better fit the requirements for IoT trust management, and  explored potential use cases of game theory for IoT trust management with three scenarios the interception of a message by an intruder, the propagation of a worm in a networked system, and  the use of game theory to assess the vulnerability of an ad hoc topology against denial of service attacks.
  
"********************************************************************************************"
+
The four regular papers addressed security and privacy threats in IoT architectures by Prof Jari Veijalainen, metrics-driven adaptive security management in eHealth IoT applications by Mr Reijo Savola, risk-based adaptive security for IoT in eHealth by Dr. Habtamu Abie, and managing access control for things-a capability-based approach by Mr Domenico Rotondi, respectively.
  
+
Both the presentations and discussions were instructive and fruitful. In sum, the workshop has achieved its main objectives of bringing experts from science and industry together to discuss new insights from work in progress, technological and scientific breakthroughs and practical aspects of securing the IoT. The audience had the opportunity to take part in the discussion of protection tools and techniques for the IoT.
Experts from science and industry will discuss new insights from work in progress, technological and scientific breakthroughs and practical aspects of securing the Internet of Things (IoT). Take part in the discussion of protection tools and techniques for the IoT!
 
 
 
 
 
 
 
'''Technical program:'''
 
 
 
'''Keynote speech''' : Information Management Challenges in a context-aware Internet of Things Towards a Healthy You, Prof. Stefan Poslad, Queen Mary University of London, UK
 
 
 
 
 
Security and Privacy Threats in IoT Architectures, D. Kozlov, J. Veijalainen and Y. Ali University of Jyväskylä, Finland
 
 
 
 
 
Towards Metrics-Driven Adaptive Security Management in E-Health IoT Applications, R. M. Savola, H. Abie and M. Sihvonen VTT Finland
 
 
 
 
 
'''Keynote speech''' : Game Theory and Trust Models for the Internet of Things, Dr. Mohamed Hamdi, School of Communication Engineering, Tunisia
 
 
 
 
 
Risk-Based Adaptive Security for Smart IoT in eHealth, H. Abie and I Balasingham Norwegian Computing Center, Norway
 
 
 
 
 
Managing Access Control for Things: a Capability Based Approach, D. Rotondi and S. Piccione TxT e-solutions S.p.A., Italy
 
 
 
 
 
 
 
'''Subjects of the workshop include:'''
 
 
 
- Definition of accurate metrics to assess the threats and the risks associated to IoT for e-health
 
 
 
- Identification and description of new attack scenarios that are specific to IoT architectures
 
 
 
- Investigation of the security properties that should be fulfilled by the transmission of patient data across body area networks
 
 
 
- Monitoring the security level of the e-health applications relying on IoT
 
 
 
- Analyzing the results of experiments conducted using real patient data and studying the security performance of the associated architectures
 
 
 
 
 
 
 
SeTTIT 2012 will be held in conjunction with BodyNets 2012. For the program and all information about the workshop schedule, directions and your stay in Oslo please visit:
 
 
 
http://bodynets.org/2012/show/home
 
 
 
 
 
We are looking forward to inspiring discussions with you about our security of the IoT!
 
  
  
 
WORKSHOP CHAIRS
 
WORKSHOP CHAIRS
 
 
Dr. Mohamed Hamdi, School of Communication Engineering, Tunisia
 
Dr. Mohamed Hamdi, School of Communication Engineering, Tunisia
 
 
Dr. Habtamu Abie, Norwegian Computing Center, Norway
 
Dr. Habtamu Abie, Norwegian Computing Center, Norway

Revision as of 08:55, 3 October 2012

The successful completion of the SeTTIT (Security Tools and Techniques for Internet of Things) Workshop

The SeTTIT Workshop in conjunction with the BodyNets 2012 Conference concluded on Wednesday September 26, 2012, Oslo, Norway. The workshop featured 2 keynote speeches and 4 regular papers. The program of the workshop was as follows:

  • Chair: Dr. Habtamu Abie NR, Norway
  • Keynote speech: Information Management Challenges in a context-aware Internet of Things Towards a Healthy You, Prof. Stefan Poslad, Queen Mary University of London, UK
  • Security and Privacy Threats in IoT Architectures, D. Kozlov, J. Veijalainen and Y. Ali, University of Jyväskylä, Finland
  • Towards Metrics-Driven Adaptive Security Management in E-Health IoT Applications, R. M. Savola, H. Abie and M. Sihvonen, VTT Finland
  • Keynote speech: Game Theory and Trust Models for the Internet of Things, Dr. Mohamed Hamdi, School of Communication Engineering, Tunisia
  • Risk-Based Adaptive Security for Smart IoT in eHealth H. Abie and I Balasingham, Norwegian Computing Center, Norway
  • Managing Access Control for Things: a Capability Based Approach, D. Rotondi and S. Piccione, TxT e-solutions S.p.A., Italy

The first keynote speech, "Information Management Challenges in a Context-Aware Internet of Things (ioT) towards a Healthy You" by Prof. Stefan Poslad, has covered the ‘Old’ Internet of Devices vs the ‘New’ IoT, IoT Architecture Models, IoT Apps in eHealth, and the objectives and challenges of information management including how IoT such as sensors and RFID tags add more low resource digital things, and single-task OS & RTOS devices that run vertical services are networked but not IP networked and cannot easily be orchestrated, and how the use and value of sensor data and the ways can be orchestrated can be enhanced if the appropriate contexts for the sensor data are defined, can be captured, linked to, browsed and post-processed which represent key information management challenges in a context-aware IoT towards a healthy you.

The second keynote speech, “Game Theory and Trust Models for the IoT" by Dr. Mohamed Hamdi, analyzed the threat sophistication in the IoT based on real attack cases, discussed relevant examples including coalition attacks and impersonation in online gaming applications, reviewed the mathematical foundations of game theory with a listing of the different categories of games and their main features, and a discussion of the categories that better fit the requirements for IoT trust management, and explored potential use cases of game theory for IoT trust management with three scenarios the interception of a message by an intruder, the propagation of a worm in a networked system, and the use of game theory to assess the vulnerability of an ad hoc topology against denial of service attacks.

The four regular papers addressed security and privacy threats in IoT architectures by Prof Jari Veijalainen, metrics-driven adaptive security management in eHealth IoT applications by Mr Reijo Savola, risk-based adaptive security for IoT in eHealth by Dr. Habtamu Abie, and managing access control for things-a capability-based approach by Mr Domenico Rotondi, respectively.

Both the presentations and discussions were instructive and fruitful. In sum, the workshop has achieved its main objectives of bringing experts from science and industry together to discuss new insights from work in progress, technological and scientific breakthroughs and practical aspects of securing the IoT. The audience had the opportunity to take part in the discussion of protection tools and techniques for the IoT.


WORKSHOP CHAIRS Dr. Mohamed Hamdi, School of Communication Engineering, Tunisia Dr. Habtamu Abie, Norwegian Computing Center, Norway