SecRIot 2024
5th International Workshop on Security and Reliability of IoT Systems
Abu Dhabi, United Arab Emirates
April 29 – May 1, 2024
co-located with DCOSS-IoT 2024
Important Dates
Important Info
Paper Submission Deadline: February 20 March 8, 2024
Acceptance Notification: March 8 March 25, 2024
Camera Ready Deadline: March 18 March 29, 2024
Early Registration Deadline: April 6, 2024
Conference: April 29 - May 1, 2024
Submission Link: https://easychair.org/conferences/?conf=secriot2024
Call for Papers
Scope
The next years more than 20 billion devices will be interconnected. The Internet of Things provides unparalleled opportunities for the development of new novel services. Currently, most of the new electronic devices are offering from basic to advanced networking capabilities in the context of smart environments. Newer vehicles are partially or completely autonomous, powered by modern microprocessors, hundreds of sensors and Internet enabled services. The same applies to robotic and medical devices and almost every other advanced equipment. Despite the longstanding efforts of the scientific community to secure Internet and Network communications, Operating Systems and Software Applications, only a limited amount of this knowledge has been applied to the IoT ecosystems. Most of the IoT devices, including modern vehicles suffer from numerous and multilayered vulnerabilities. Default, weak or no password authentication for remote connections, unencrypted traffic or obsolete and insecure cryptographic algorithms, outdated, unmanaged and vulnerable software are among the most serious problems of the IoT landscape. Even more alarming is the unregulated manufacturing process of many IoT constructors. Aiming to reduce the cost and minimize the time to market of their products, minimal or none effort is put to secure and support them sufficiently. Worse, there are recorded cases of IoT devices delivered with preinstalled malware that demonstrate total lack of operations security in the supply chain. In contrary to software applications in PCs and mobile devices, the owners are not likely to replace their devices because of security problems. As consequence, these systems remain vulnerable for extended periods. Recent very large-scale DDoS attacks based and executed entirely by IoT Botnets, signify the magnitude of the problem.
The aim of this workshop is to bring together researchers and professionals that are responsible for the secure design, deployment and operation of current and future IoT systems. Topics of interest include, but are not limited to:
IoT Security and Privacy
IoT Intrusion Detection and Prevention Systems
Cyber Physical Security and IoT
Secure Design Methodologies for IoT Systems
Secure Hardware and Software Codesign
Development of Secure Embedded Systems
Secure Embedded Operation Systems
IoT Malware
Autonomous Vehicles Cybersecurity
Secure Network Protocols for IoT Systems
IoT and Blockchain
Secure Manufacturing Process of IoT Devices
Privacy Protection in IoT Environments
Security and Privacy of Medical Devices
IoT Trust and Reliability
Reliable Robotic Devices
Committees
Workshop Chairs
Vasileios Vlachos (University of Thessaly, Greece)
Leandros Maglaras (Napier University, Scotland)
Athanasios Kakarountas (University of Thessaly, Greece)
Mohamed Amine Ferrag (Technology Inovation Institute, UAE)
Technical Program Committee
Apostolos Xenakis (University of Thessaly, Greece)
Christos Chrysoulas (Edinburgh Napier University, Scotland)
Dimitrios Kosmanos (University of Thessaly, Greece)
Harris Michail (Cyprus University of Technology, Cyprus)
Iryna Yevseyeva (De Montfort University, UK)
Luca Davoli (University of Parma, Italy)
Naghmeh Moradpoor (Edinburgh Napier University, Scotland)
Nestoras Chouliaras (University of West of Attica, Greece)
Paris Kitsos (University of Peloponnese, Greece)
Tiago Cruz (University of Coimbra, Portugal)
Yagmur Yigit (Edinburgh Napier University, Scotland)
Publicity Chair
List of Accepted Papers
Md Shahed Islam Noyon, Naghmeh Moradpoor, Leandros Maglaras and Jawad Ahmad, Enhancing Cloud Computing Security Through Blockchain-Based Communication for Electronic Health Records
Elena Kakoulli and Lefteris Zacharioudakis, Exploration of the Role of Cryptoprocessors in Advancing IoT Security
Edward Guillen, Bernard Uguen, Christophe Moy and Jerome Le Masson Temporal Analysis of LoRaWAN Data Packets: Unveiling Patterns for Improving Secure- Oriented IoT Designs
Anthony Bustamante, Sarah Asad, Brent Lagesse and Daniela Nicklas, A Dual-Model Anomaly Detection Algorithm for non-linear stream data in Smart City Environments
Afsaneh Mahanipour and Hana Khamfroush, Enhancing IoT Security: A Novel Feature Engineering Approach for ML-Based Intrusion Detection Systems
Olanrewaju Mueez Adesanya, Naghmeh Moradpoor, Leandros Maglaras, Ik Soo Lim and Mohamed Amine Ferrag, Assessment and Analysis of IoT Protocol Effectiveness in Data Exfiltration Scenario