Difference between revisions of "Dissemination"

From Asset
Jump to: navigation, search
(The successful completion of the ASPI 2013 Workshop)
(Publications)
 
(79 intermediate revisions by the same user not shown)
Line 1: Line 1:
=Publications=
+
= Publications<br/> =
* Denis Trcek and Andrej Brodnik. 2013. Hard and Soft Security Provisioning For Computationally Weak Pervasive Computing Systems in E-Health. IEEE Wireless Communications, August 2013, pp. 2-9
+
* Waqas Aman, '''Assessing the Feasibility of Adaptive Security Models for the Internet of Things''', Chapter, Human Aspects of Information Security, Privacy, and Trust (HAS 2016), LNCS, Springer, Vol 9750, pp 201-211, 21 June 2016
* Reijo M. Savola. 2013. “Quality of security metrics and measurements”. In Computers & Security, Vol. 37, Sept. 2013, pp. 78-90, http://dx.doi.org/10.1016/j.cose.2013.05.002
+
* Waqas Aman and Einar Snekkenes, '''Managing Security Trade-offs in the Internet of Things Using Adaptive Security''', 10th International Conference for Internet Technology and Secured Transactions (ICITST-2015), London UK.
* Mohamed Hamdi. 2013. Secure Cooperative Physical-layer Coding for the Internet of Things. Int. Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI) 2013, Sept. 8, 2013, Zürich, Switzerland, 8 p. http://dx.doi.org/10.1145/2523501.2523505
+
* Oshin, T.O., Poslad S.  Zhang, Z.  '''Energy-Efficient Real-Time Human Mobility State Classification Using Smartphones'''. IEEE Transactions on Computers, 2015, 64(6):1680-1693 (, DOI: 10.1109/TC.2014.233984
* Yared Berhanu Woldegeorgis, Habtamu Abie, and Mohamed Hamdi. 2013. A Testbed for Adaptive Security for IoT in eHealth. Int. Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI) 2013, Sept. 8, 2013, Zürich, Switzerland, 8 p. http://dx.doi.org/10.1145/2523501.2523506
+
* Evesti A., Suomalainen J., Savola R., '''Security Aspects of Short-Range Wireless Communication – Risk Analysis for the Healthcare Application.''' In the International Journal of Intelligent Computing Research (IJICR), Volume 5, Issue 3/4, ISSN: 2042 4655, 2014, pp. 438-449
* Reijo Savola and Habtamu Abie, Metrics-Driven Security Objective Decomposition for an E-Health Application with Adaptive Security Management. ”, Int. Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI) 2013, Sept. 8, 2013, Zürich, Switzerland, 8 p. http://dx.doi.org/10.1145/2523501.2523507
+
* Reijo M. Savola, Pekka Savolainen, Antti Evesti, Habtamu Abie and Markus Sihvonen, '''Risk-Driven Security Metrics Development for an e-Health IoT Application''', Proceedings of the 2015 Information Security for South Africa (ISSA 2015) Conference, 12-13 August, 2015, Johannesburg, South Africa. ISBN 978-1-4799-7754-3
* Stefan Poslad, Mohamed Hamdi, and Habtamu Abie. 2013. International Workshop on Adaptive Security & Privacy management for the Internet of Things (ASPI 2013). In Proc. of UbiComp '13 Adjunct Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication, ACM New York, NY, USA, 2013, Pages 373-378, http://dx.doi.org/10.1145/2494091.2499770
+
* Waqas Aman and EinarSnekkenes. 2015. '''EDAS: An Evaluation Prototype for Autonomic Event-Driven Adaptive Security in the Internet of Things.''' Future Internet 2015, 7, 225-256.  
* Stefan Poslad. 2013. "ERSP: An Energy-efficient Real-time Smartphone Pedometer". 2013. In IEEE Systems, Man, Cybernetics Computing (SMC), on the theme of energy-efficiency and ambulatory mobility monitoring, October 2013.
+
* Pål Ander Floor, Anna N. Kim,  Tor A. Ramstad, Ilangko Balasingham, Niklas Wernersson and Mikael Skoglund. 2015. '''On Joint Source-Channel Coding for a Multivariate Gaussian on a Gaussian MAC''', IEEE Transactions on Communications, Volume 63 , Issue 5, May 2015
* Stefan Poslad. 2013. A New Post Correction Algorithm (PoCoA) for Improved Transportation Mode Recognition. In IEEE Systems, Man, Cybernetics Computing (SMC), on the theme of energy-efficiency and ambulatory mobility monitoring, October 2013.
+
* Kashif Habib and Wolfgang Leister, '''Threats Identification for the Smart Internet of Things in eHealth and Adaptive Security Countermeasures''', NTMS 2015, Paris; 07/2015
* Waqas Aman and Einar Snekkenes, An Empirical Research on InfoSec Risk Management in IoT based eHealth. The Third International Conference on Mobile Services, Resources, and Users Mobility 2013
+
* Kashif Habib, Arild Torjusen, and Wolfgang Leister. 2015. '''Security Analysis of a Patient Monitoring System for the Internet of Things in eHealth.''' The Seventh International Conference on eHealth, Telemedicine, and Social Medicine, eTELEMED 2015, February 22 - 27, 2015 - Lisbon, Portugal. Pp. 73-78. '''Best Paper Award.'''
 +
* Kashif Habib and Wolfgang Leister. 2015. '''Context-Aware Authentication for the Internet of Things'''. The Eleventh International Conference on Autonomic and Autonomous Systems, ICAS 2015, May 24 - 29, 2015 - Rome, Italy. pp. 1-6.
  
* Habtamu Abie and Ilangko Balasingham, [http://dl.acm.org/citation.cfm?id=2442752&CFID=182090968&CFTOKEN=70357592 Risk-Based Adaptive Security for Smart IoT in eHealth]. In: BODYNETS 2012 - 7th International Conference on Body Area Networks. Brussels: ICST - Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 2012 ISBN 978-1-4503-1997-3. s. 269-275
+
* Inaki Garitano, Seraj Fayyad, and Josef Noll, '''Multi-metrics Approach for Security, privacy and Dependability in Embedded Systems''', Wireless Networks and Security Journal, Springer, April 2015, Volume 81, Issue 4, pp 1359-1376. DOI: 10.1007/s11277-015-2478-z 
* Reijo Savola, Habtamu Abie, and Markus Sihvonen, [http://dl.acm.org/citation.cfm?id=2442753&CFID=182090968&CFTOKEN=70357592 Towards Metrics-Driven Adaptive Security Management in E-Health IoT Applications]. In: BODYNETS 2012 - 7th International Conference on Body Area Networks. Brussels: ICST - Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 2012 ISBN 978-1-4503-1997-3. s. 276-281
+
* Josef Noll, Inaki Garitano, Seraj Fayyad, Erik Åsberg and Habtamu Abie, '''Measurable Security, Privacy and Dependability in Smart Grids''', Journal of Cyber-Security and Mobility, Vol. 3, Issue 4, 371–398, 3 April 2015, River Publishers.
 +
* Zhang, Z., Poslad S. '''Improved Use of Foot Force Sensors and Mobile Phone GPS for Mobility Activity Recognition'''. IEEE Sensors J, 2014, 14(12), 4340-4347.  (IF=1.8), OA, DOI: 10.1109/JSEN.2014.2331463. '''Best Journal Paper award for 2014.'''
 +
* Seraj Fayyad and Josef Noll, "'''Security and Safety Composition Methodology'''," CENTRIC 2014, 2014, pp. 60-65.
 +
* Wolfgang Leister, Mohamed Hamdi, Habtamu Abie, Stefan Poslad, Arild Torjusen, [http://publications.nr.no/1420562301/Leister_etal_EvaluationFramework_jsec14n34_51005.pdf '''An Evaluation Framework for Adaptive Security for the IoT in eHealth'''], International Journal on Advances in Security, 7(3&4), 2014, pp 93-109
 +
* Kashif Habib. 2014. '''Ethical aspects of the Internet of Things in eHealth'''. Journal of International Center for Information Ethics, Ethics for the Internet of Things, Vol. 22 - December 2014. ISSN 1614 -1687.
 +
*Oshin, T.O., Poslad S, Zhang, Z. '''Energy-Efficient Real-Time Human Mobility State Classification Using Smartphones'''. IEEE Transactions on Computing, 2014, DOI: 10.1109/TC.2014.2339846
 +
*Seyyed Hamed Fouladi, Raul Chavez-Santiago, Pål Ander Floor, Ilangko Balasingham, and Tor A. Ramstad. '''Sensing, Signal Processing, and Communication for Wireless Body Area Networks'''. In ZTE Communications, Vol.12 No. 3, 03-12, September 2014
 +
*Antti Evesti, Habtamu Abie, Reijo Savola, '''Security Measuring for Self-adaptive Security,''' ECSAW, August 25 - 29 2014, Vienna, Austria
 +
*Arild B. Torjusen, Habtamu Abie, Ebenezer Paintsil, Denis Trcek, Åsmund Skomedal, '''Towards Run-Time Verification of Adaptive Security for IoT in eHealth''', ECSAW, August 25 - 29 2014, Vienna, Austria.
 +
*Waqas Aman and Einar Snekkenes, 2014. '''Event Driven Adaptive Security in Internet of Things''', UBICOMM 2014 (The Eighth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies), August 23-28, 2014, Rome, Italy
 +
*Kashif Habib, Arild Torjusen, and Wolfgang Leister. 2014. '''A Novel Authentication Framework Based on Biometric and Radio Fingerprinting for the IoT in eHealth'''. The Third International Conference on Smart Systems, Devices and Technologies, SMART 2014, July 20 - 24, 2014 - Paris, France. pp. 32-37. '''Best Paper Awards'''.
 +
*Mohamed Hamdi and Habtamu Abie, '''Game-Based Adaptive Security in the Internet of Things for eHealth''', IEEE ICC 2014, Sydney, Australia, 10-14 June, 2014
 +
*Wolfgang Leister, Mohamed Hamdi, Habtamu Abie, and Stefan Poslad. 2014. '''An evaluation scenario for Adaptive Security in eHealth'''. In PESARO 2014, February 23 - 27, 2014 - Nice, France
 +
* Pål Anders Floor,  Anna N. Kim, Tor A. Ramstad, and Ilangko Balasingham. 2013. '''Zero delay joint source channel coding for multivariate Gaussian sources over orthogonal Gaussian channels''', Entropy, vol. 15, no. 6, pp. 2129–2161, June 2013
 +
*Zelun Zhang and Stefan Poslad. 2013. '''Design and Test of a Hybrid Foot Force Sensing and GPS System for Richer User Mobility Activity Recognition''', Sensors 2013, 13, 14918-14953; doi:10.3390/s131114918
 +
*Denis Trcek and Andrej Brodnik. 2013. '''Hard and Soft Security Provisioning For Computationally Weak Pervasive Computing Systems in E-Health'''. IEEE Wireless Communications, August 2013, pp. 2-9
 +
*Reijo M. Savola. 2013. '''Quality of security metrics and measurements'''. In Computers & Security, Vol. 37, Sept. 2013, pp. 78-90, [http://dx.doi.org/10.1016/j.cose.2013.05.002 http://dx.doi.org/10.1016/j.cose.2013.05.002]
 +
*Mohamed Hamdi. 2013. '''Secure Cooperative Physical-layer Coding for the Internet of Things'''. Int. Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI) 2013, Sept. 8, 2013, Zürich, Switzerland, 8 p. [http://dx.doi.org/10.1145/2523501.2523505 http://dx.doi.org/10.1145/2523501.2523505]
 +
*Yared Berhanu Woldegeorgis, Habtamu Abie, and Mohamed Hamdi. 2013. '''A Testbed for Adaptive Security for IoT in eHealth'''. Int. Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI) 2013, Sept. 8, 2013, Zürich, Switzerland, 8 p. [http://dx.doi.org/10.1145/2523501.2523506 http://dx.doi.org/10.1145/2523501.2523506]
 +
*Reijo Savola and Habtamu Abie. 2013. '''Metrics-Driven Security Objective Decomposition for an E-Health Application with Adaptive Security Management.'''&nbsp; Int. Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI) 2013, Sept. 8, 2013, Zürich, Switzerland, 8 p. [http://dx.doi.org/10.1145/2523501.2523507 http://dx.doi.org/10.1145/2523501.2523507]
 +
*Stefan Poslad, Mohamed Hamdi, and Habtamu Abie. 2013. '''Adaptive Security & Privacy management for the Internet of Things (ASPI 2013)'''. In Proc. of UbiComp '13 Adjunct Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication, ACM New York, NY, USA, 2013, Pages 373-378, [http://dx.doi.org/10.1145/2494091.2499770 http://dx.doi.org/10.1145/2494091.2499770]
 +
*Oshin T, Stefan Poslad. 2013. '''"ERSP: An Energy-efficient Real-time Smartphone Pedometer"'''. 2013. In IEEE Systems, Man, Cybernetics Computing (SMC), on the theme of energy-efficiency and ambulatory mobility monitoring, October 2013.
 +
*Zhang Z, Stefan Poslad. 2013. '''A New Post Correction Algorithm (PoCoA) for Improved Transportation Mode Recognition.''' In IEEE Systems, Man, Cybernetics Computing (SMC), on the theme of energy-efficiency and ambulatory mobility monitoring, October 2013.
 +
*Waqas Aman and Einar Snekkenes. 2013. '''An Empirical Research on InfoSec Risk Management in IoT based eHealth'''. The Third International Conference on Mobile Services, Resources, and Users Mobility 2013, Nov 17, 2013 - Nov 22, 2013, Lisbon, Portugal. '''Best Paper Awards.'''
 +
*Waqas Aman, 2013. '''Modeling Adaptive Security in IoT Driven eHealth.''' The 6th Norsk Informasjons Sikkerhets Konferanse (NISK 2013), pp. 61-69
 +
*Kashif Habib and Wolfgang Leister. 2013. '''Adaptive Security for the Internet of Things Reference Model'''. The Sixth Norwegian Information Security Conference, NISK 2013, November 18-20-Stavanger, Norway. pp. 13-24
 +
*Habtamu Abie and Ilangko Balasingham. 2012. '''[http://dl.acm.org/citation.cfm?id=2442752&CFID=182090968&CFTOKEN=70357592 Risk-Based Adaptive Security for Smart IoT in eHealth]'''. In: BODYNETS 2012 - 7th International Conference on Body Area Networks. Brussels: ICST - Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 2012 ISBN 978-1-4503-1997-3. s. 269-275
 +
*Reijo Savola, Habtamu Abie, and Markus Sihvonen. 2012. '''[http://dl.acm.org/citation.cfm?id=2442753&CFID=182090968&CFTOKEN=70357592 Towards Metrics-Driven Adaptive Security Management in E-Health IoT Applications].''' In: BODYNETS 2012 - 7th International Conference on Body Area Networks. Brussels: ICST - Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 2012 ISBN 978-1-4503-1997-3. s. 276-281
  
 
=Public Deliverables=
 
=Public Deliverables=
* Leister, Wolfgang; Abie, Habtamu; Poslad, Stefan, [http://publications.nr.no/1362403013/DART-17-2012.pdf Defining the ASSET Scenarios],Norsk Regnesentral 2012 17 s. NR-notat(DART/17/2012), NR
+
* Habtamu Abie, Wolfgang Leister. '''Case Study Validation: Deliverable D6.3'''. Oslo: Norsk Regnesentral 2015 20 s. NR-notat(DART/18/2015)
* Leister, Wolfgang; Floor, Pål Anders; Woldegiorgis, Yared Berhanu; Balasingham, Ilangko; Abie, Habtamu, [http://publications.nr.no/1362402875/DART-16-2012.pdf Defining the ASSET Lab], Norsk Regnesentral 2012 43 s. NR-notat(DART/16/2012), HIOA NR OUS
+
* Habtamu Abie, Wolfgang Leister. '''Case Study Simulation and Evaluation: Deliverable 6.2'''. Oslo: Norsk Regnesentral 2015 15 s. NR-notat(DART/17/2015)
 +
* Habtamu Abie, Wolfgang Leister. '''Case Study Gap Analysis: Deliverable D6.1'''. Oslo: Norsk Regnesentral 2015 24 s. NR-notat(DART/16/2015)
 +
* Habtamu Abie. '''Evaluation and Validation Using Metrics: Deliverable D5.2'''. Oslo: Norsk Regnesentral 2015 22 s. NR-notat(DART/15/2015)
 +
* Habtamu Abie. '''Development of Metrics: Deliverable D5.1.''' Oslo: Norsk Regnesentral 2015 26 s. NR-notat(DART/14/2015)
 +
* Habtamu Abie. '''Optimizing and Combining Algorithms: Deliverable D4.3'''. Oslo: Norsk Regnesentral 2015 24 s. NR-notat(DART/13/2015)
 +
* Habtamu Abie. '''Prototyping of Methods: Deliverable D4.2'''. Oslo: Norsk Regnesentral 2015 19 s. NR-notat(DART/12/2015)
 +
* Habtamu Abie. '''Game Theory and Risk Models: Deliverable D4.1'''. Oslo: Norsk Regnesentral 2015 16 s. NR-notat(DART/11/2015)
 +
* Habtamu Abie. '''ASSET Project 213131 Progress Report 2015: Reporting Period 01/10/2014-30/09/2015'''. Oslo: Norsk Regnesentral 2015 17 s. NR-notat(DART/08/2015)
 +
* Habtamu Abie, Stefan Poslad, Wolfgang Leister. '''ASSET Project 213131 2015 Final Annual Meeting''', 05-06 March: Meeting Minutes & Documentation. Oslo: Norsk Regnesentral 2015 25 s. NR-notat(DART/07/2015)
 +
* Denis Trcek, Habtamu Abie, Åsmund Skomedal. '''Trust based Adaptive Safety for Sensor Networks in e-Health'''. Oslo: Norsk Regnesentral 2015 16 s. NR-notat(DART/06/2015)
 +
* Mohamed Hamdi, Habtamu Abie. '''A Lightweight Homomorphic Digital Signature Scheme for the Internet of Things'''. Oslo: Norsk Regnesentral 2015 17 s. NR-notat(DART/05/2015)
 +
* Habtamu Abie. '''ASSET Project 213131 Progress Report 2014: Reporting Period 01/10/2013-30/09/2014''', September 30,2014. Oslo: NR 2014 22 s. NR-notat(DART/07/2014)
 +
* Habtamu Abie, Wolfgang Leister, and Trenton Schulz. '''ASSET Project 2014 Annual Meeting, 27-28 February - Meeting Minutes & Documentation'''. NR-notat DART/01/2014. pp 28. 2014.
 +
* Habtamu Abie, Mohamed Hamdi, Stefan Poslad, Pål Anders, '''Analysis and Requirements Capture for Metrics and Conditions for Adaptive Security in eHealth''', Deliverable D3.2 Version 1, NR-notat DART/10/2013 26 September 2013
 +
* Habtamu Abie, Mohamed Hamdi, Stefan Poslad, '''Analysis of Reasoning Methods''', Deliverable D3.1, NR-notat  DART/10/2013, 27 September 2013
 +
* Habtamu Abie. '''ASSET Project 213131 Progress Report 2013: Reporting Period 01/10/2012-30/09/2013'''. Oslo: Norsk Regnesentral 2013 22 s. NR-notat(DART/11/2013)
 +
* Yared Berhanu Woldegiorgis, Habtamu Abie. '''Development of Experimental IoT Lab for the ASSET Project: Testbed for IoT in eHealth''', NR-Notat (DART/07/2013), 16. August. 2013
 +
* Lothar Fritsch, Habtamu Abie. '''2nd PETweb II & ASSET joint PhD Seminar'''. Oslo: Norsk Regnesentral 2013 99 s. NR-notat(DART/01/2013)
 +
* Leister, Wolfgang; Abie, Habtamu; Poslad, Stefan, [http://publications.nr.no/1362403013/DART-17-2012.pdf '''Defining the ASSET Scenarios'''],Norsk Regnesentral 2012 17 s. NR-notat(DART/17/2012), NR
 +
* Leister, Wolfgang; Floor, Pål Anders; Woldegiorgis, Yared Berhanu; Balasingham, Ilangko; Abie, Habtamu, [http://publications.nr.no/1362402875/DART-16-2012.pdf '''Defining the ASSET Lab'''], Norsk Regnesentral 2012 43 s. NR-notat(DART/16/2012), HIOA NR OUS
  
 
=Workshops and Conferences=
 
=Workshops and Conferences=
 +
*[http://asset.nr.no/asset/index.php/MeSSa2016 3rd International Workshop on Monitoring and Measurability of Software and Network Security held in conjunction with The 10th European Conference on Software Architecture (ECSA 2016), September 5-9, 2016, Istanbul, Turkey]
 +
*[http://asset.nr.no/asset/index.php/MeSSa2014 2nd International Workshop on Measurability of Security in Software Architectures held in conjunction with The 8th European Conference on Software Architecture (ECSA 2014), August 25, 2014, in Vienna, Austria]
 +
 
*[[media:NR_ASSET_Conference_IoT_Oslo_19_03_2013.pdf‎|ASSET at IoT Conference, Tuesday 19th of March 2013, Telenor, Oslo, Norway]]
 
*[[media:NR_ASSET_Conference_IoT_Oslo_19_03_2013.pdf‎|ASSET at IoT Conference, Tuesday 19th of March 2013, Telenor, Oslo, Norway]]
 
*[http://settit.bodynets.org/2013/show/home Call For Papers - Workshop on Security Tools and Techniques for Internet of Things (SeTTIT) 2013] co-located with the [http://bodynets.org/2013/show/home BodyNets 2013 Conference] sponsored by IEEE EMB, ACM SIGCHI, and CREAT-NET. Consider to submit and publish original scientific results to the SeTTIT 2013 in Boston, Massachusetts, United States, September 30–October 2, 2013.
 
*[http://settit.bodynets.org/2013/show/home Call For Papers - Workshop on Security Tools and Techniques for Internet of Things (SeTTIT) 2013] co-located with the [http://bodynets.org/2013/show/home BodyNets 2013 Conference] sponsored by IEEE EMB, ACM SIGCHI, and CREAT-NET. Consider to submit and publish original scientific results to the SeTTIT 2013 in Boston, Massachusetts, United States, September 30–October 2, 2013.
 
*[[media:CFP SeTTIT 2013.pdf|Call For Papers SeTTIT 2013 in PDF]]
 
*[[media:CFP SeTTIT 2013.pdf|Call For Papers SeTTIT 2013 in PDF]]
 
*[http://asset.nr.no/asset/index.php/ASPI2013 International Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI 2013)] Co-located with the [http://www.ubicomp.org/ubicomp2013/ 15th ACM International Conference on Ubiquitous Computing (UbiComp2013]], September 8th (Sunday) 2013, Zurich, Switzerland
 
*[http://asset.nr.no/asset/index.php/ASPI2013 International Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI 2013)] Co-located with the [http://www.ubicomp.org/ubicomp2013/ 15th ACM International Conference on Ubiquitous Computing (UbiComp2013]], September 8th (Sunday) 2013, Zurich, Switzerland
 
+
*[http://asset.nr.no/asset/index.php/SeTTIT_2012_Completion The Successful Completion of the SeTTIT 2012 Workshop]
= The successful completion of the ASPI 2013 Workshop =
+
*[http://asset.nr.no/asset/index.php/ASPI_2013_Completion The Successful Completion of the ASPI 2013 Workshop]
 
 
The ASPI 2013 (International Workshop on Adaptive Security & Privacy Management for the Internet of Things 2013) in conjunction with the 15th ACM International Conference on Ubiquitous Computing (UbiComp2013] concluded on Sunday September 8, 2013, Zurich, Switzerland. The workshop featured 2 keynote speeches and 6 regular papers and 1 short paper. The program of the workshop was as follows:
 
 
 
*''Welcome & Introduction to the Workshop, Dr. Stefan Poslad''
 
 
 
'''''Keynote speech:''' Let us Develop a Secure IoT Environment, Peter Mueller, IBM Zurich''
 
 
 
'''''Session 1: Resilient & Transparent Security Schemes for the IoT''''''', ''Chair Dr. Mohamed Hamdi''
 
 
 
*''6LoWPAN Security: Adding Compromise Resilience to the 802.15.4 Security Sublayer (K-F Krentz'')
 
*''Delay Sensitive Distributed Sensor Data Exchange for an IoT (R. Tao, S. Poslad)''
 
 
 
'''''Keynote speech''': Towards Adaptive Risk Management for the IoT, Dr. Mohamed Hamdi, Sup'Com''
 
 
 
'''''Session 2: Trust, Metrics and Adaptive Security Approaches for the IoT''''',&nbsp; ''Chair Dr. Habtamu Abie''
 
 
 
*''Trusted Tiny Things: Making Internet of Things More Transparent to Users (E. Pignotti, P. Edwards'')
 
*''Metrics-Driven Security Objective Decomposition for an E-Health Application with Adaptive Security Management (R. Savola, H. Abie'')
 
 
 
'''''Session 3: Security implementation issues in the IoT''', Chair Dr. Stefan Posla''
 
 
 
*''Lightweight Security Vehicle Tracking System Using CoAP (A. Ukil, S. Bandyopadhyay, A. Bhattacharyya, A. Pa''l)
 
*''Secure Cooperative Physical-layer Coding for the Internet of Things (M. Hamdi)''
 
*''A Testbed for Adaptive Security for IoT in eHealth (Y. B. Woldegeorgis, H. Abie, M. Hamdi'')
 
*''Closing remarks and discussion (S. Poslad)''
 
 
 
<br/>The '''first keynote speech''', "Let’s Develop a Secure IoT Environment" by Peter Mueller has focussed on one of the absolutely critical aspects within the IoT environment – Security whose functions and attributes are required at every level, from a tiny sensor device ranging up to a high performance data center on a backbone. Today’s new requirements regarding technology, policies and standards were reviewed, and some conjectures were given on where advanced security might take us and the IoT in the future.
 
 
 
[[Media:PeterMueller.jpg|frame|none]]'''Peter Mueller''' joined IBM Research as a Research Staff Member in 1988. He is also the Chair of the IEEE Communications and Information Systems Security Technical Committee (CIS-TC).&nbsp; His research expertise covers broad areas of human-machine interfaces, distributed computing systems architecture and security, communications and interconnects technology, device physics, nanoscience, and computer modeling.&nbsp; Focusing on systems architecture, his main experience is in the fields of channel coding techniques, cryptography, and error control and correction methods; resource allocation and re-allocation, synchronization, and real-time behavior including cross layer reliability issues.&nbsp; His current field of research is in the area of data center storage security and reliability.
 
 
 
<br/>The '''second keynote speech''', "Towards Adaptive Risk Management for the IoT" by Dr. Mohamed Hamdi has addressed the application of risk management methodologies and risk analysis processes to the IoT. The intrinsic features of the IoT have first been underlined. Then, the shortcomings of the traditional frameworks to address these specific needs have been discussed. Particularly, the need for real-time reactivity and the support of a dynamic context have been emphasized. Several new methodologies, protocols, and algorithms that have been recently developed to apply adaptive security to the IoT have been reviewed. Finally, some open issues were highlighted.
 
 
 
'''Mohamed Hamdi '''is currently a visiting researcher at the Norwegian Computing Center where he contributes to the ASSET project. He is also an Associate Professor at University of Carthage, Tunisia. He co-authored more than 80 scientific publications in international journals and conferences. He was the chair of the 'Cloud security' industry forum in the IEEE ICC'12 conference (Ottawa, Canada).&nbsp; He is conducting research activities in the areas of adaptive risk management, lightweight security for the IoT, algebraic modeling, cloud security, and advanced network forensics.
 
 
 
=The successful completion of the SeTTIT 2012 Workshop=
 
The SeTTIT (Security Tools and Techniques for Internet of Things) Workshop in conjunction with the BodyNets 2012 Conference concluded on Wednesday September 26, 2012, Oslo, Norway. The workshop featured 2 keynote speeches and 4 regular papers. The program of the workshop was as follows:
 
 
 
* ''Chair: Dr. Habtamu Abie NR, Norway''
 
* ''Keynote speech: Information Management Challenges in a context-aware Internet of Things Towards a Healthy You, Prof. Stefan Poslad, Queen Mary University of London, UK''
 
* ''Security and Privacy Threats in IoT Architectures, D. Kozlov, J. Veijalainen and Y. Ali, University of Jyväskylä, Finland''
 
* ''Towards Metrics-Driven Adaptive Security Management in E-Health IoT Applications, R. M. Savola, H. Abie and M. Sihvonen, VTT Finland''
 
* ''Keynote speech: Game Theory and Trust Models for the Internet of Things, Dr. Mohamed Hamdi, School of Communication Engineering, Tunisia''
 
* ''Risk-Based Adaptive Security for Smart IoT in eHealth, H. Abie and I. Balasingham, Norwegian Computing Center, Norway''
 
* ''Managing Access Control for Things: a Capability Based Approach, D. Rotondi and S. Piccione, TxT e-solutions S.p.A., Italy''
 
 
 
 
 
The '''first keynote speech''', "Information Management Challenges in a Context-Aware Internet of Things (ioT)  towards a Healthy You" by Prof. Stefan Poslad, has covered the ‘Old’ Internet of Devices vs the ‘New’ IoT, IoT Architecture Models, IoT Apps in eHealth, and the objectives and challenges of information management including how IoT such as sensors and RFID tags add more low resource digital things, and single-task OS & RTOS devices that run vertical services are networked but not IP networked and cannot easily be orchestrated, and how the use and value of  sensor data and the ways  can be orchestrated  can be  enhanced if the appropriate contexts for the sensor data are defined, can be captured, linked to, browsed and post-processed which represent key information management challenges in a context-aware IoT towards a healthy you.
 
 
 
 
 
The '''second keynote speech''', “Game Theory and Trust Models for the IoT" by Dr. Mohamed Hamdi, analyzed the threat sophistication in the IoT based on real attack cases, discussed relevant examples including coalition attacks and impersonation in online gaming applications, reviewed the mathematical foundations of game theory with a listing of the different categories of games and their main features, and a discussion of the categories that better fit the requirements for IoT trust management, and  explored potential use cases of game theory for IoT trust management with three scenarios the interception of a message by an intruder, the propagation of a worm in a networked system, and  the use of game theory to assess the vulnerability of an ad hoc topology against denial of service attacks.
 
 
 
 
 
The '''four regular papers''' addressed security and privacy threats in IoT architectures by Prof Jari Veijalainen, metrics-driven adaptive security management in eHealth IoT applications by Mr Reijo Savola, risk-based adaptive security for IoT in eHealth by Dr. Habtamu Abie, and managing access control for things-a capability-based approach by Mr Domenico Rotondi, respectively.
 
 
 
 
 
Both the presentations and discussions were instructive and fruitful. In sum, the workshop has achieved its main objectives of bringing experts from science and industry together to discuss new insights from work in progress, technological and scientific breakthroughs and practical aspects of securing the IoT. The audience had the opportunity to take part in the discussion of protection tools and techniques for the IoT.
 
 
 
 
 
Workshop Chairs
 
 
 
Dr. Mohamed Hamdi, School of Communication Engineering, Tunisia
 
 
 
Dr. Habtamu Abie, Norwegian Computing Center, Norway
 
 
 
==Sponsors==
 
[[Image:ResearchCouncilofNorway.gif‎|left]]
 
 
 
[[Image:Asset_logo.png‎|100px]]
 

Latest revision as of 08:58, 11 July 2016

Publications

  • Waqas Aman, Assessing the Feasibility of Adaptive Security Models for the Internet of Things, Chapter, Human Aspects of Information Security, Privacy, and Trust (HAS 2016), LNCS, Springer, Vol 9750, pp 201-211, 21 June 2016
  • Waqas Aman and Einar Snekkenes, Managing Security Trade-offs in the Internet of Things Using Adaptive Security, 10th International Conference for Internet Technology and Secured Transactions (ICITST-2015), London UK.
  • Oshin, T.O., Poslad S. Zhang, Z. Energy-Efficient Real-Time Human Mobility State Classification Using Smartphones. IEEE Transactions on Computers, 2015, 64(6):1680-1693 (, DOI: 10.1109/TC.2014.233984
  • Evesti A., Suomalainen J., Savola R., Security Aspects of Short-Range Wireless Communication – Risk Analysis for the Healthcare Application. In the International Journal of Intelligent Computing Research (IJICR), Volume 5, Issue 3/4, ISSN: 2042 4655, 2014, pp. 438-449
  • Reijo M. Savola, Pekka Savolainen, Antti Evesti, Habtamu Abie and Markus Sihvonen, Risk-Driven Security Metrics Development for an e-Health IoT Application, Proceedings of the 2015 Information Security for South Africa (ISSA 2015) Conference, 12-13 August, 2015, Johannesburg, South Africa. ISBN 978-1-4799-7754-3
  • Waqas Aman and EinarSnekkenes. 2015. EDAS: An Evaluation Prototype for Autonomic Event-Driven Adaptive Security in the Internet of Things. Future Internet 2015, 7, 225-256.
  • Pål Ander Floor, Anna N. Kim, Tor A. Ramstad, Ilangko Balasingham, Niklas Wernersson and Mikael Skoglund. 2015. On Joint Source-Channel Coding for a Multivariate Gaussian on a Gaussian MAC, IEEE Transactions on Communications, Volume 63 , Issue 5, May 2015
  • Kashif Habib and Wolfgang Leister, Threats Identification for the Smart Internet of Things in eHealth and Adaptive Security Countermeasures, NTMS 2015, Paris; 07/2015
  • Kashif Habib, Arild Torjusen, and Wolfgang Leister. 2015. Security Analysis of a Patient Monitoring System for the Internet of Things in eHealth. The Seventh International Conference on eHealth, Telemedicine, and Social Medicine, eTELEMED 2015, February 22 - 27, 2015 - Lisbon, Portugal. Pp. 73-78. Best Paper Award.
  • Kashif Habib and Wolfgang Leister. 2015. Context-Aware Authentication for the Internet of Things. The Eleventh International Conference on Autonomic and Autonomous Systems, ICAS 2015, May 24 - 29, 2015 - Rome, Italy. pp. 1-6.
  • Inaki Garitano, Seraj Fayyad, and Josef Noll, Multi-metrics Approach for Security, privacy and Dependability in Embedded Systems, Wireless Networks and Security Journal, Springer, April 2015, Volume 81, Issue 4, pp 1359-1376. DOI: 10.1007/s11277-015-2478-z
  • Josef Noll, Inaki Garitano, Seraj Fayyad, Erik Åsberg and Habtamu Abie, Measurable Security, Privacy and Dependability in Smart Grids, Journal of Cyber-Security and Mobility, Vol. 3, Issue 4, 371–398, 3 April 2015, River Publishers.
  • Zhang, Z., Poslad S. Improved Use of Foot Force Sensors and Mobile Phone GPS for Mobility Activity Recognition. IEEE Sensors J, 2014, 14(12), 4340-4347. (IF=1.8), OA, DOI: 10.1109/JSEN.2014.2331463. Best Journal Paper award for 2014.
  • Seraj Fayyad and Josef Noll, "Security and Safety Composition Methodology," CENTRIC 2014, 2014, pp. 60-65.
  • Wolfgang Leister, Mohamed Hamdi, Habtamu Abie, Stefan Poslad, Arild Torjusen, An Evaluation Framework for Adaptive Security for the IoT in eHealth, International Journal on Advances in Security, 7(3&4), 2014, pp 93-109
  • Kashif Habib. 2014. Ethical aspects of the Internet of Things in eHealth. Journal of International Center for Information Ethics, Ethics for the Internet of Things, Vol. 22 - December 2014. ISSN 1614 -1687.
  • Oshin, T.O., Poslad S, Zhang, Z. Energy-Efficient Real-Time Human Mobility State Classification Using Smartphones. IEEE Transactions on Computing, 2014, DOI: 10.1109/TC.2014.2339846
  • Seyyed Hamed Fouladi, Raul Chavez-Santiago, Pål Ander Floor, Ilangko Balasingham, and Tor A. Ramstad. Sensing, Signal Processing, and Communication for Wireless Body Area Networks. In ZTE Communications, Vol.12 No. 3, 03-12, September 2014
  • Antti Evesti, Habtamu Abie, Reijo Savola, Security Measuring for Self-adaptive Security, ECSAW, August 25 - 29 2014, Vienna, Austria
  • Arild B. Torjusen, Habtamu Abie, Ebenezer Paintsil, Denis Trcek, Åsmund Skomedal, Towards Run-Time Verification of Adaptive Security for IoT in eHealth, ECSAW, August 25 - 29 2014, Vienna, Austria.
  • Waqas Aman and Einar Snekkenes, 2014. Event Driven Adaptive Security in Internet of Things, UBICOMM 2014 (The Eighth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies), August 23-28, 2014, Rome, Italy
  • Kashif Habib, Arild Torjusen, and Wolfgang Leister. 2014. A Novel Authentication Framework Based on Biometric and Radio Fingerprinting for the IoT in eHealth. The Third International Conference on Smart Systems, Devices and Technologies, SMART 2014, July 20 - 24, 2014 - Paris, France. pp. 32-37. Best Paper Awards.
  • Mohamed Hamdi and Habtamu Abie, Game-Based Adaptive Security in the Internet of Things for eHealth, IEEE ICC 2014, Sydney, Australia, 10-14 June, 2014
  • Wolfgang Leister, Mohamed Hamdi, Habtamu Abie, and Stefan Poslad. 2014. An evaluation scenario for Adaptive Security in eHealth. In PESARO 2014, February 23 - 27, 2014 - Nice, France
  • Pål Anders Floor, Anna N. Kim, Tor A. Ramstad, and Ilangko Balasingham. 2013. Zero delay joint source channel coding for multivariate Gaussian sources over orthogonal Gaussian channels, Entropy, vol. 15, no. 6, pp. 2129–2161, June 2013
  • Zelun Zhang and Stefan Poslad. 2013. Design and Test of a Hybrid Foot Force Sensing and GPS System for Richer User Mobility Activity Recognition, Sensors 2013, 13, 14918-14953; doi:10.3390/s131114918
  • Denis Trcek and Andrej Brodnik. 2013. Hard and Soft Security Provisioning For Computationally Weak Pervasive Computing Systems in E-Health. IEEE Wireless Communications, August 2013, pp. 2-9
  • Reijo M. Savola. 2013. Quality of security metrics and measurements. In Computers & Security, Vol. 37, Sept. 2013, pp. 78-90, http://dx.doi.org/10.1016/j.cose.2013.05.002
  • Mohamed Hamdi. 2013. Secure Cooperative Physical-layer Coding for the Internet of Things. Int. Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI) 2013, Sept. 8, 2013, Zürich, Switzerland, 8 p. http://dx.doi.org/10.1145/2523501.2523505
  • Yared Berhanu Woldegeorgis, Habtamu Abie, and Mohamed Hamdi. 2013. A Testbed for Adaptive Security for IoT in eHealth. Int. Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI) 2013, Sept. 8, 2013, Zürich, Switzerland, 8 p. http://dx.doi.org/10.1145/2523501.2523506
  • Reijo Savola and Habtamu Abie. 2013. Metrics-Driven Security Objective Decomposition for an E-Health Application with Adaptive Security Management.  Int. Workshop on Adaptive Security & Privacy Management for the Internet of Things (ASPI) 2013, Sept. 8, 2013, Zürich, Switzerland, 8 p. http://dx.doi.org/10.1145/2523501.2523507
  • Stefan Poslad, Mohamed Hamdi, and Habtamu Abie. 2013. Adaptive Security & Privacy management for the Internet of Things (ASPI 2013). In Proc. of UbiComp '13 Adjunct Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication, ACM New York, NY, USA, 2013, Pages 373-378, http://dx.doi.org/10.1145/2494091.2499770
  • Oshin T, Stefan Poslad. 2013. "ERSP: An Energy-efficient Real-time Smartphone Pedometer". 2013. In IEEE Systems, Man, Cybernetics Computing (SMC), on the theme of energy-efficiency and ambulatory mobility monitoring, October 2013.
  • Zhang Z, Stefan Poslad. 2013. A New Post Correction Algorithm (PoCoA) for Improved Transportation Mode Recognition. In IEEE Systems, Man, Cybernetics Computing (SMC), on the theme of energy-efficiency and ambulatory mobility monitoring, October 2013.
  • Waqas Aman and Einar Snekkenes. 2013. An Empirical Research on InfoSec Risk Management in IoT based eHealth. The Third International Conference on Mobile Services, Resources, and Users Mobility 2013, Nov 17, 2013 - Nov 22, 2013, Lisbon, Portugal. Best Paper Awards.
  • Waqas Aman, 2013. Modeling Adaptive Security in IoT Driven eHealth. The 6th Norsk Informasjons Sikkerhets Konferanse (NISK 2013), pp. 61-69
  • Kashif Habib and Wolfgang Leister. 2013. Adaptive Security for the Internet of Things Reference Model. The Sixth Norwegian Information Security Conference, NISK 2013, November 18-20-Stavanger, Norway. pp. 13-24
  • Habtamu Abie and Ilangko Balasingham. 2012. Risk-Based Adaptive Security for Smart IoT in eHealth. In: BODYNETS 2012 - 7th International Conference on Body Area Networks. Brussels: ICST - Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 2012 ISBN 978-1-4503-1997-3. s. 269-275
  • Reijo Savola, Habtamu Abie, and Markus Sihvonen. 2012. Towards Metrics-Driven Adaptive Security Management in E-Health IoT Applications. In: BODYNETS 2012 - 7th International Conference on Body Area Networks. Brussels: ICST - Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 2012 ISBN 978-1-4503-1997-3. s. 276-281

Public Deliverables

  • Habtamu Abie, Wolfgang Leister. Case Study Validation: Deliverable D6.3. Oslo: Norsk Regnesentral 2015 20 s. NR-notat(DART/18/2015)
  • Habtamu Abie, Wolfgang Leister. Case Study Simulation and Evaluation: Deliverable 6.2. Oslo: Norsk Regnesentral 2015 15 s. NR-notat(DART/17/2015)
  • Habtamu Abie, Wolfgang Leister. Case Study Gap Analysis: Deliverable D6.1. Oslo: Norsk Regnesentral 2015 24 s. NR-notat(DART/16/2015)
  • Habtamu Abie. Evaluation and Validation Using Metrics: Deliverable D5.2. Oslo: Norsk Regnesentral 2015 22 s. NR-notat(DART/15/2015)
  • Habtamu Abie. Development of Metrics: Deliverable D5.1. Oslo: Norsk Regnesentral 2015 26 s. NR-notat(DART/14/2015)
  • Habtamu Abie. Optimizing and Combining Algorithms: Deliverable D4.3. Oslo: Norsk Regnesentral 2015 24 s. NR-notat(DART/13/2015)
  • Habtamu Abie. Prototyping of Methods: Deliverable D4.2. Oslo: Norsk Regnesentral 2015 19 s. NR-notat(DART/12/2015)
  • Habtamu Abie. Game Theory and Risk Models: Deliverable D4.1. Oslo: Norsk Regnesentral 2015 16 s. NR-notat(DART/11/2015)
  • Habtamu Abie. ASSET Project 213131 Progress Report 2015: Reporting Period 01/10/2014-30/09/2015. Oslo: Norsk Regnesentral 2015 17 s. NR-notat(DART/08/2015)
  • Habtamu Abie, Stefan Poslad, Wolfgang Leister. ASSET Project 213131 2015 Final Annual Meeting, 05-06 March: Meeting Minutes & Documentation. Oslo: Norsk Regnesentral 2015 25 s. NR-notat(DART/07/2015)
  • Denis Trcek, Habtamu Abie, Åsmund Skomedal. Trust based Adaptive Safety for Sensor Networks in e-Health. Oslo: Norsk Regnesentral 2015 16 s. NR-notat(DART/06/2015)
  • Mohamed Hamdi, Habtamu Abie. A Lightweight Homomorphic Digital Signature Scheme for the Internet of Things. Oslo: Norsk Regnesentral 2015 17 s. NR-notat(DART/05/2015)
  • Habtamu Abie. ASSET Project 213131 Progress Report 2014: Reporting Period 01/10/2013-30/09/2014, September 30,2014. Oslo: NR 2014 22 s. NR-notat(DART/07/2014)
  • Habtamu Abie, Wolfgang Leister, and Trenton Schulz. ASSET Project 2014 Annual Meeting, 27-28 February - Meeting Minutes & Documentation. NR-notat DART/01/2014. pp 28. 2014.
  • Habtamu Abie, Mohamed Hamdi, Stefan Poslad, Pål Anders, Analysis and Requirements Capture for Metrics and Conditions for Adaptive Security in eHealth, Deliverable D3.2 Version 1, NR-notat DART/10/2013 26 September 2013
  • Habtamu Abie, Mohamed Hamdi, Stefan Poslad, Analysis of Reasoning Methods, Deliverable D3.1, NR-notat DART/10/2013, 27 September 2013
  • Habtamu Abie. ASSET Project 213131 Progress Report 2013: Reporting Period 01/10/2012-30/09/2013. Oslo: Norsk Regnesentral 2013 22 s. NR-notat(DART/11/2013)
  • Yared Berhanu Woldegiorgis, Habtamu Abie. Development of Experimental IoT Lab for the ASSET Project: Testbed for IoT in eHealth, NR-Notat (DART/07/2013), 16. August. 2013
  • Lothar Fritsch, Habtamu Abie. 2nd PETweb II & ASSET joint PhD Seminar. Oslo: Norsk Regnesentral 2013 99 s. NR-notat(DART/01/2013)
  • Leister, Wolfgang; Abie, Habtamu; Poslad, Stefan, Defining the ASSET Scenarios,Norsk Regnesentral 2012 17 s. NR-notat(DART/17/2012), NR
  • Leister, Wolfgang; Floor, Pål Anders; Woldegiorgis, Yared Berhanu; Balasingham, Ilangko; Abie, Habtamu, Defining the ASSET Lab, Norsk Regnesentral 2012 43 s. NR-notat(DART/16/2012), HIOA NR OUS

Workshops and Conferences