IEEE End to End Trust and Security Workshop for the Internet of Things - Washington, D.C.

marvin center in dcIEEE End to End Trust and Security Workshop for the Internet of Things was held on
4 February 2016 at:

Marvin Center at The George Washington University 
Grand Ballroom 
800 21st Street NW 
Washington, D.C. 20052

View listing of hotels convenient to the Marvin Center



A Call for Technology Leaders and Innovators

IEEEInternet2, and the National Science Foundation (NSF) as well as a host of other sponsors worked together to gather industry technologists who helped drive the Internet of Things (IoT) conversation and contribute to the development of an open architectural framework.

On Thursday, 4 February 2016, IEEE organized "IEEE End-to-End Trust and Security for the Internet of Things," a workshop that was held at George Washington University. Together with our sponsors, we were seeking qualified technology leaders and innovators to participate as presenters and attendees at this invitation-only event.

A Call for Presentations

Industry, government, and academic professionals, including researchers, IT architects, security professionals, government agencies, industry associations, professors, and post-graduate students, were encouraged to develop and submit presentations that expressed viewpoints, made recommendations, and further discussed the subject of end-to-end trust and security for an open IoT architectural framework. Submissions should address the TIPPSS elements: trust, identity, privacy, protection, security, and safety.

The submissions were reviewed, and the top fifteen selected were presented at the IoT workshop on 4 February in Washington DC. Submissions that addressed policy were also eligible for presentation at the "IEEE Experts in Technology and Policy (ETAP) Forum," which took place at the same location on the following day.


Program

Start Time  End Time  Program
8:00 am  8:30 am   Coffee
8:30 am  9:00 am   Welcome and introductions – Led by Oleg Logvinov, IEEE
9:00 am  10:00 am   Opening Panel: The Needs and Challenges in End to End Trust, Security, Privacy for the IoT – moderated  by Florence Hudson, Internet2
  • Rosio Alvarez, US Department of Energy
  • Oleg Logvinov, IEEE
  • Bob Martin, IIC
  • Anita Nikolich, NSF
  • Sarah Cooper, M2Mi
10:00 am  10:15 am   Break
10:15 am  12:15 am   Presentations on E2ET&S for IoT
  • E2E Trust and Security using ISO/IEC/IEEE P21451-1-4 (Sensei-IoT*) 1st Semantic Web 3.0 Standard for the Internet of Things (IoT) (W. J. Miller)
  • Industrial Internet Reference Architecture (Robert Martin)
  • NETWORK END-TO-END DATA LINK EVALUATION SYSTEM (NEEDLES) (William Woodward)
  • Outcomes of the 2015 Internet of Things Security and Privacy Keynotes workshop (Glenn Fink)
  • The Internet of Things: An overview. Understanding the issue and Challenges of a More Connected World (Karen O'Donoghue)
  • The IoT and the Ability to Defend Against the Silent Intruder (Lillie Coney)
12:15 pm  12:30 pm   Pick up box lunch en route to breakouts
12:30 pm  2:00 pm   Breakout group presentations

 Access Control and Identity Management:
  • Access Control for IoT: A Position Paper (Alan Karp)
  • Authorization within the Internet of Things using private biometric verification (Ira Konvalinka)
  • In the IoT no T is an Island Trust, Policy, Privacy among interacting Things (Rob Gingell)
  • IoT Secruity - A Nightmare in Progress (Prof. Scott Streit, Jason Braverman, and Hector Hoyos)
  • Lessons from the Internet of People: Architectural Principles to Guide IoT (Ken Klingenstein)
  • Onboarding Security: Establishing Interconnectivity in the Internet of Things (Brian Scriber)
  • Trust and Security for the IoT (Wenjia Li)
  • Virtual Organizations: A User-facing Abstraction for Managing Trust, Federation and Collaboration on a Global Scale (Dr. Craig A. Lee)
 Architectural Framework:
  • A Layered Solution to Cybersecurity (Dr. Erfan Ibrahim, Maurice Martin)
  • A Secure ’Industrial Internet of Things’ (IIoT) using Deterministic Photonic Packet Switches (Ted Szymanski)
  • CHOOSING A CRC & SPECIFYING ITS REQUIREMENTS FOR FIELD-LOADABLE SOFTWARE & PROPOSING IMPROVEMENTS TO AVOID THE CRC COMPROMISE AND THE SILENT SPECIFICATION (Cleon Rogers)
  • Hardware-Induced Security & Privacy Vulnerabilities in the Internet of Things (Yiorgos Makris, Dr. Angelos Antonopoulos)
  • Safety and Security in the Intelligent Transportation System: A Need for Ontology-grounded Simulation Support (Margaret Lyell)
  • Secure Data Architecture: Ensuring data integrity at the beginning of the scientific workflow; a Mini-ScienceDMZ1 (Mini-DMZ) for instruments (Steven Wallace)
  • Security Vulnerabilities and Challenges in IoT End to End systems and Current Security Implementations (Vamsi Gondi, David L. White, Jill Gemmill and Christopher W. Post)
  • The Security for Safety Modeling Approach (Vyacheslav Zolotnikov, Semen Kort, Ekaterina Rudina)
  • tiCrypt Framework Security and Compliance Overview (Thomas Samant)
 Policy & Standards:
  • Architecting Global Ethics Awareness for Transnational Ent-to-End Cybersecurity (John Murray)
  • Integrated Technology and Policy Enabling Large-Scale Deployment of UAVs: Trustworthiness and Threat Mitigation." (Dr. Bertrand Cambou)
  • IoT Assurance Model (Edward Aractingi)
  • IoT Governance: Norms & Standards-are we setting ourselves up for a problem (Michael A Aisenberg)
  • Open Solutions for the Internet of Things (Mark Cather)
  • PENDING_Decoding the Internet of Things (Jeffrey Voas)
  • Privacy & Security Standards for IoT viability-OutSecure (Pamela Gupta)
  • Security without IoT Mandatory Backdoors (Carl Hewitt)
 Scenarios and Use Cases:
  • A Byte or Two: Food For Thought (Luke Russell)
  • ON VULNERABILITIES OF IOT-BASED CONSUMER-ORIENTED CLOSED-LOOP CONTROL AUTOMATION SYSTEMS (Martin Murillo)
  • Paradigms of Distributed vs. Networked and Hardware vs. Software (Reza Arghandeh)
  • Privacy Mediators: Helping IoT Cross the Chasm (Nigel Davies)
  • Properties of Vehicle Network Privacy (Dr. George Corser)
  • ROLE OF IOT ANALYTICS DRIVEN FOREWARNING IN GOVERNMENT, POLICY MAKING AND REGULATION (Rabi Chakraborty)
  • The Impacts of Ever-Permeating Connectivity on Society and Security (Ron Winward)
2:00 pm  3:00 pm   Breakout group brainstorming
3:00 pm  3:30 pm   Break
3:30 pm  4:30 pm   Readout from breakouts
4:30 pm  5:15 pm   Brainstorming Next Steps & Actions
5:15 pm  5:30 pm   Closing Remarks