{"title":"Title Page i","authors":"","doi":"10.1109/siot.2018.00001","DOIUrl":"https://doi.org/10.1109/siot.2018.00001","url":null,"abstract":"","PeriodicalId":447072,"journal":{"name":"2018 International Workshop on Secure Internet of Things (SIoT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125316003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mengmeng Ge, Jin-Hee Cho, C. Kamhoua, Dong Seong Kim
{"title":"Optimal Deployments of Defense Mechanisms for the Internet of Things","authors":"Mengmeng Ge, Jin-Hee Cho, C. Kamhoua, Dong Seong Kim","doi":"10.1109/SIoT.2018.00008","DOIUrl":"https://doi.org/10.1109/SIoT.2018.00008","url":null,"abstract":"Internet of Things (IoT) devices can be exploited by the attackers as entry points to break into the IoT networks without early detection. Little work has taken hybrid approaches that combine different defense mechanisms in an optimal way to increase the security of the IoT against sophisticated attacks. In this work, we propose a novel approach to generate the strategic deployment of adaptive deception technology and the patch management solution for the IoT under a budget constraint. We use a graphical security model along with three evaluation metrics to measure the effectiveness and efficiency of the proposed defense mechanisms. We apply the multi-objective genetic algorithm (GA) to compute the {em Pareto optimal} deployments of defense mechanisms to maximize the security and minimize the deployment cost. We present a case study to show the feasibility of the proposed approach and to provide the defenders with various ways to choose optimal deployments of defense mechanisms for the IoT. We compare the GA with the exhaustive search algorithm (ESA) in terms of the runtime complexity and performance accuracy in optimality. Our results show that the GA is much more efficient in computing a good spread of the deployments than the ESA, in proportion to the increase of the IoT devices.","PeriodicalId":447072,"journal":{"name":"2018 International Workshop on Secure Internet of Things (SIoT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129382637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SIoT 2018 Foreword","authors":"","doi":"10.1109/siot.2018.00005","DOIUrl":"https://doi.org/10.1109/siot.2018.00005","url":null,"abstract":"","PeriodicalId":447072,"journal":{"name":"2018 International Workshop on Secure Internet of Things (SIoT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122217709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SIoT 2018 Organization","authors":"","doi":"10.1109/siot.2018.00006","DOIUrl":"https://doi.org/10.1109/siot.2018.00006","url":null,"abstract":"","PeriodicalId":447072,"journal":{"name":"2018 International Workshop on Secure Internet of Things (SIoT)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120914875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Guidelines for the Choice of a Wireless Secure Positioning and Communication System","authors":"Baptiste Pestourie, V. Beroulle, N. Fourty","doi":"10.1109/SIoT.2018.00007","DOIUrl":"https://doi.org/10.1109/SIoT.2018.00007","url":null,"abstract":"The interest for indoor positioning and communication systems has been growing lately, as a lot of IoT applications would benefit from accessing devices locations. For cost and simplicity sake, having an all-in-one wireless positioning and communication system is an appealing solution, but the choice of the appropriate technology can be complex. Moreover, as positions should not be corruptible, integrity and authenticity of the data are primordial in location-related applications and different kinds of system-level security approaches are available. Hence, this paper intends to provide guidelines for the choice of a positioning and communication system and its security features, according to a defined set of criteria. Bluetooth, WiFi, RFID and UWB technologies are compared relatively to those criteria. We classified the security system-level approaches into four main types: statistical, sector-based, distance-bounding, and cooperative methods. We discuss the contexts of use and the challenges that will face a developer for each approach. This paper should provide a good insight into the different technologies and security approaches, for a developer looking for an indoor secure positioning and communication solution for a given application.","PeriodicalId":447072,"journal":{"name":"2018 International Workshop on Secure Internet of Things (SIoT)","volume":"7 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124024166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Moreno Ambrosin, M. Conti, R. Lazzeretti, Md Masoom Rabbani, Silvio Ranise
{"title":"PADS: Practical Attestation for Highly Dynamic Swarm Topologies","authors":"Moreno Ambrosin, M. Conti, R. Lazzeretti, Md Masoom Rabbani, Silvio Ranise","doi":"10.1109/SIoT.2018.00009","DOIUrl":"https://doi.org/10.1109/SIoT.2018.00009","url":null,"abstract":"Remote attestation protocols are widely used to detect device configuration (e.g., software and/or data) compromise in Internet of Things (IoT) scenarios. Unfortunately, the performances of such protocols are unsatisfactory when dealing with thousands of smart devices. Recently, researchers are focusing on addressing this limitation. The approach is to run attestation in a collective way, with the goal of reducing computation and communication. Despite these advances, current solutions for attestation are still unsatisfactory because of their complex management and strict assumptions concerning the topology (e.g., being time invariant or maintaining a fixed topology). In this paper, we propose PADS, a secure, efficient, and practical protocol for attesting potentially large networks of smart devices with unstructured or dynamic topologies. PADS builds upon the recent concept of non-interactive attestation, by reducing the collective attestation problem into a minimum consensus one. We compare PADS with a state-of-the art collective attestation protocol and validate it by using realistic simulations that show practicality and efficiency. The results confirm the suitability of PADS for low-end devices, and highly unstructured networks.","PeriodicalId":447072,"journal":{"name":"2018 International Workshop on Secure Internet of Things (SIoT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124688994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}