IEEE End to End Trust and Security Workshop for the Internet of Things - Washington, D.C.

marvin center in dcIEEE End to End Trust and Security Workshop for the Internet of Things was held on
4 February 2016 at:

Marvin Center at The George Washington University 
Grand Ballroom 
800 21st Street NW 
Washington, D.C. 20052

View listing of hotels convenient to the Marvin Center

 


EVENT RESOURCES

End to End Trust and Security Workshop Meeting recap report

Speaker presentation video recordings


A Call for Technology Leaders and Innovators

IEEEInternet2, and the National Science Foundation (NSF) as well as a host of other sponsors worked together to gather industry technologists who helped drive the Internet of Things (IoT) conversation and contribute to the development of an open architectural framework.

On Thursday, 4 February 2016, IEEE organized "IEEE End-to-End Trust and Security for the Internet of Things," a workshop that was held at George Washington University. Together with our sponsors, we were seeking qualified technology leaders and innovators to participate as presenters and attendees at this invitation-only event.

A Call for Presentations

Industry, government, and academic professionals, including researchers, IT architects, security professionals, government agencies, industry associations, professors, and post-graduate students, were encouraged to develop and submit presentations that expressed viewpoints, made recommendations, and further discussed the subject of end-to-end trust and security for an open IoT architectural framework. Submissions should address the TIPPSS elements: trust, identity, privacy, protection, security, and safety.

The submissions were reviewed, and the top fifteen selected were presented at the IoT workshop on 4 February in Washington DC. Submissions that addressed policy were also eligible for presentation at the "IEEE Experts in Technology and Policy (ETAP) Forum," which took place at the same location on the following day.


Program

Start Time  End Time  Program
8:00 am  8:30 am   Coffee
8:30 am  9:00 am   Welcome and introductions – Led by Oleg Logvinov, IEEE
9:00 am  10:00 am   Opening Panel: The Needs and Challenges in End to End Trust, Security, Privacy for the IoT – moderated  by Florence Hudson, Internet2
  • Rosio Alvarez, US Department of Energy
  • Oleg Logvinov, IEEE
  • Bob Martin, IIC
  • Anita Nikolich, NSF
  • Sarah Cooper, M2Mi
10:00 am  10:15 am   Break
10:15 am  12:15 am   Presentations on E2ET&S for IoT
  • E2E Trust and Security using ISO/IEC/IEEE P21451-1-4 (Sensei-IoT*) 1st Semantic Web 3.0 Standard for the Internet of Things (IoT) (W. J. Miller)
  • Industrial Internet Reference Architecture (Robert Martin)
  • NETWORK END-TO-END DATA LINK EVALUATION SYSTEM (NEEDLES) (William Woodward)
  • Outcomes of the 2015 Internet of Things Security and Privacy Keynotes workshop (Glenn Fink)
  • The Internet of Things: An overview. Understanding the issue and Challenges of a More Connected World (Karen O'Donoghue)
  • The IoT and the Ability to Defend Against the Silent Intruder (Lillie Coney)
12:15 pm  12:30 pm   Pick up box lunch en route to breakouts
12:30 pm  2:00 pm   Breakout group presentations

 Access Control and Identity Management:
  • Access Control for IoT: A Position Paper (Alan Karp)
  • Authorization within the Internet of Things using private biometric verification (Ira Konvalinka)
  • In the IoT no T is an Island Trust, Policy, Privacy among interacting Things (Rob Gingell)
  • IoT Secruity - A Nightmare in Progress (Prof. Scott Streit, Jason Braverman, and Hector Hoyos)
  • Lessons from the Internet of People: Architectural Principles to Guide IoT (Ken Klingenstein)
  • Onboarding Security: Establishing Interconnectivity in the Internet of Things (Brian Scriber)
  • Trust and Security for the IoT (Wenjia Li)
  • Virtual Organizations: A User-facing Abstraction for Managing Trust, Federation and Collaboration on a Global Scale (Dr. Craig A. Lee)
 Architectural Framework:
  • A Layered Solution to Cybersecurity (Dr. Erfan Ibrahim, Maurice Martin)
  • A Secure ’Industrial Internet of Things’ (IIoT) using Deterministic Photonic Packet Switches (Ted Szymanski)
  • CHOOSING A CRC & SPECIFYING ITS REQUIREMENTS FOR FIELD-LOADABLE SOFTWARE & PROPOSING IMPROVEMENTS TO AVOID THE CRC COMPROMISE AND THE SILENT SPECIFICATION (Cleon Rogers)
  • Hardware-Induced Security & Privacy Vulnerabilities in the Internet of Things (Yiorgos Makris, Dr. Angelos Antonopoulos)
  • Safety and Security in the Intelligent Transportation System: A Need for Ontology-grounded Simulation Support (Margaret Lyell)
  • Secure Data Architecture: Ensuring data integrity at the beginning of the scientific workflow; a Mini-ScienceDMZ1 (Mini-DMZ) for instruments (Steven Wallace)
  • Security Vulnerabilities and Challenges in IoT End to End systems and Current Security Implementations (Vamsi Gondi, David L. White, Jill Gemmill and Christopher W. Post)
  • The Security for Safety Modeling Approach (Vyacheslav Zolotnikov, Semen Kort, Ekaterina Rudina)
  • tiCrypt Framework Security and Compliance Overview (Thomas Samant)
 Policy & Standards:
  • Architecting Global Ethics Awareness for Transnational Ent-to-End Cybersecurity (John Murray)
  • Integrated Technology and Policy Enabling Large-Scale Deployment of UAVs: Trustworthiness and Threat Mitigation." (Dr. Bertrand Cambou)
  • IoT Assurance Model (Edward Aractingi)
  • IoT Governance: Norms & Standards-are we setting ourselves up for a problem (Michael A Aisenberg)
  • Open Solutions for the Internet of Things (Mark Cather)
  • PENDING_Decoding the Internet of Things (Jeffrey Voas)
  • Privacy & Security Standards for IoT viability-OutSecure (Pamela Gupta)
  • Security without IoT Mandatory Backdoors (Carl Hewitt)
 Scenarios and Use Cases:
  • A Byte or Two: Food For Thought (Luke Russell)
  • ON VULNERABILITIES OF IOT-BASED CONSUMER-ORIENTED CLOSED-LOOP CONTROL AUTOMATION SYSTEMS (Martin Murillo)
  • Paradigms of Distributed vs. Networked and Hardware vs. Software (Reza Arghandeh)
  • Privacy Mediators: Helping IoT Cross the Chasm (Nigel Davies)
  • Properties of Vehicle Network Privacy (Dr. George Corser)
  • ROLE OF IOT ANALYTICS DRIVEN FOREWARNING IN GOVERNMENT, POLICY MAKING AND REGULATION (Rabi Chakraborty)
  • The Impacts of Ever-Permeating Connectivity on Society and Security (Ron Winward)
2:00 pm  3:00 pm   Breakout group brainstorming
3:00 pm  3:30 pm   Break
3:30 pm  4:30 pm   Readout from breakouts
4:30 pm  5:15 pm   Brainstorming Next Steps & Actions
5:15 pm  5:30 pm   Closing Remarks

  

Submissions

Submissions will be accepted for consideration from Monday, 4 January 2016 until midnight (EST), Friday, 15 January 2016 and should be sent to d.ceruto@ieee.org.

IEEE is looking for deep-diving technical presentations (no page limit). Preference will be given to submissions that also reflect the interaction of technology and policy in the areas of trust, identity, privacy, protection, security, and safety.

If your paper is selected to be presented, a presentation template will be provided for you to use.

For example, a presentation could be:

Page 1 - title and presenter name/affiliations
Page 2 - a brief abstract 
Page 3 - content details 
Page 4 - conclusions 
Page 5 - recommendations

Note: Presentations will be limited to 5-10 slides in total for 15 or 20 minutes per presentation.

Review of paper submissions to be completed by 22 January.

If you have any questions, please email us.

We encourage you to share this information with your colleagues and other experts in end-to-end trust and security and the development of an open architecture for the Internet of Things.

To request your invitation to the "IEEE End-to-End Trust and Security for the Internet of Things" workshop, please complete our online form.

 

Registration to the Friday, 5 February "IEEE Experts in Technology and Policy (ETAP) Forum" is also by invitation, and capacity is limited. If you would like to attend, please request an invitation by completing the online form.