Tutorials confirmed at PEMWN 2020

Tutorial 1: When routing meets caching in NDN

By Sonia Mettali Gammar, ISAMM, Tunisia

Biography: Sonia Mettali Gammar is an Assistant Professor in Computer Science at the Higher Institute of Multimedia Arts of Manouba (ISAMM TUNISIA) and member of Ramsis research group of the CRISTAL Research Laboratory at the National School of Computer Science (ENSI Tunisia). She received her HDR degree (Habilitation à Diriger des Recherches) and her PHD Degree in Computer Science from the National School of Computer Sciences Tunisia respectively in 2018 and 1999. Her research interests lie in the field of Internet of Things (IoT), Mesh Networks and Wireless Sensor Network (Routing, Qos and Management), vehicular Networks and ICN (Information Centric Networks), especially NDN (Named Data Networking).

Abstract: With the extended use of applications and services whose objective is to find and publish content (P2P, video streaming services, etc.), NDN (Named Data Networking) offers an approach based on the content itself rather than the location of hosts. Contents are retrieved from network caching throughout the delivery path. No routing schemes have been defined for NDN, NDN messages are then flooded along the network, making the latter lose its resources and reduce its overall performance. This keynote will: (i) present the key features of NDN focusing on routing, forwarding and caching (ii) briefly summarize proposed solutions in the literature (iii) introduce a new approach combining routing and caching and based on SDN (Software Defined Networking) (iv) draw out future research directions.


Tutorial 2: Cyber security, trust and privacy: What role can the Blockchain play?

By Hela Kaffel Ben Ayed, FST, Tunisia

Biography: Hella Kaffel-Ben Ayed received both Engineering, PhD and Habilitation Universitaire degrees from the Faculty of Sciences of Tunis, University of Tunis El Manar. She was an Engineer at Centre de Calcul El Khawarizmi than Assistant and Assistant professor at the Faculty of Science of Tunis. Since 2018, she is an Associate Professor at the Faculty of Sciences of Tunis, teaching graduate and undergraduate courses in computer networks and IT security. She is also a senior researcher at CRISTAL Lab., University of Manouba. Her main research interests include development and evaluation of communication and security protocols for new mobile and pervasive applications as well as security and privacy in IoT. She published papers in scientific journals and international conferences. She participated in the setting up of various research projects in the framework of partnership between Cristal Lab. and European and Canadian labs as well as at the national scale. Her recent research interests are EDGE computing, IOT Transactions security, privacy enhancing technologies and new Blockchain based solutions.


Abstract: The digitization of our society and the Internet of Things have radically impacted the way computer systems are used, both at the individual level and that of organizations and industries. E-health, intelligent transport systems, industry 4.0 etc. improve the quality of services in different sectors. New business models such as the sharing economy and electronic platforms are emerging. However, the underlying information systems are constantly exposed to attacks with personal, physical and financial impact that can cause serious damage.Furthermore, these different ecosystems constitute a field for potential disclosures of personal data; which creates a serious risk to privacy.

Traditional security systems usually rely on security mechanisms such as cryptography and often rely third parties to instore trust. This model may in certain contexts present limitations in terms of performance and robustness or cost. Blockchain is a technology whose initial objective is to establish a system of trust between entities that do not trust each other. Cryptocurrencies are known to be the primary use case of Blockchain. The objective of this presentation is to present the building blocks of Blockchain, application domains. The contributions and use cases of Blockchain in cyber security and privacy will be discussed.


Tutorial 3: Microcontroller-based Secure IoT: a Hand-on Course with RIOT

By Alexandre Abadie, INRIA-SACLAY, FRANCE

Biography: Alexandre Abadie is a research engineer at Inria Saclay - Île-de-France. He is one of the main contributors of RIOT, involved in LoRaWAN support, STM32 and RISC-V support. As part of this Inria work, Alexandre Abadie is a technical team member of the FIT-IoT-LAB platform, a testbed for large scale IoT experimentation.


Abstract: To address Internet of Things (IoT) requirements, low-power embedded devices must simultaneously provide communication capabilities and be able to perform more and more complex tasks. Key aspects that must be assessed before deploying an IoT solution include among others interoperability and life-cycle aspects, lifetime while operating on small batteries, and the security of the devices' embedded software and communication stack.

In this context, RIOT is an open source operating system designed for microcontroller-based IoT devices. This category of devices trades off limiting resource budgets (small CPU operating in the MHz range, network throughput and RAM/ROM memory budgets in the kByte range) for efficient communication capabilities and the ability to run a long time on a tiny battery.

In this tutorial, you will get an introduction to the RIOT operating system: its characteristics, the ecosystem around RIOT, the features provided by the system and an overview of IoT deployments where RIOT is used. You will also program your first RIOTapplication and run it on real hardware, on a remote open-access testbed. Then the tutorial will lead you through secure IoT building blocks which will culminate in secure OTA over the low-power network, using the SUIT specifications.

Please Consider Instructions below for this tutorial:

Background

In this tutorial, we will use RIOT hands-on: you'll be getting your hands dirty with (some) coding! For a quick introduction to RIOT you could refer to this documentation and to this recent IEEE IoT Journal article providing a high-level overview. TLDNR: we will introduce you to the basics during the tutorial anyways, so no prior knowledge is necessary.

Setup & Workflow

No preliminary setup is necessary. We will provide Jupyter notebooks accessible directly through your web browser, to interact with a large-scale open-access remote testbed FIT IoT-Lab. Via these Jupyter notebooks you will write code, cross-compile it, and run it on real hardware – including on low-power microcontroller-based devices.