It is our great pleasure to welcome you to the 2015 ACM Workshop on IoT Privacy, Trust, and Security -- IoTPTS'15. At a basic level, the Internet of Things (IoT) refers simply to networked devices, but the IoT vision consists of a complex ecosystem that ranges from cloud backend services and big-data analytics to home, public, industrial, and wearable sensor devices and appliances. Architectures for these systems are in the formative stages, and IoTPTS 2015 gives researchers and practitioners a unique opportunity ensure privacy, trust, and security are designed into these systems from the beginning.
This is the inaugural year of the IoTPTS Workshop and the call for papers attracted 13 submissions worldwide from 12 countries and 4 continents. The final program contained 5 papers (representing an acceptance rate of 38%) and a keynote IoT Security and Privacy: Threats and Challenges by Dr. Yong Ho Hwang from the Software R&D Center at Samsung Electronics.
Proceeding Downloads
IoT Security & Privacy: Threats and Challenges
The era of the Internet of Things (IoT) has already started and it will profoundly change our way of life. While IoT provides us many valuable benefits, IoT also exposes us to many different types of security threats in our daily life. Before the advent ...
Privilege-Based Remote Attestation: Towards Integrity Assurance for Lightweight Clients
Remote attestation is used to assure the integrity of a trusted platform (prover) to a remote party (challenger). Traditionally, plain binary attestation (i.e., attesting the integrity of software by measuring their binaries) is the method of choice. ...
Entropy Extraction from Bio-Signals in Healthcare IoT
In this paper, the theoretical approach to estimate the amount of entropy which can be extracted from heart-rate based biomedical signals has been considered. Mathematical models for estimating the values of min-entropy, Shannon entropy, and collision ...
A Secure Automobile Information Sharing System
Utilizing the proxy re-encryption technique described in \cite{w-IBPdr}, we construct a secure storage system named PRINCESS Proxy Re-encryption with INd-Cca security in an Encrypted file Storage System). With PRINCESS, the files encrypted in accordance ...
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group
In this paper, we study Password Authenticated Key Exchange (PAKE) in a group. First, we present a generic "fairy-ring dance" construction that transforms any secure two-party PAKE scheme to a group PAKE protocol while preserving the round efficiency in ...
Lightweight Protection of Group Content Distribution
Achieving security properties in distributed, hardware-limited, and unattended networks is a challenging task. This setting is challenging because an adversary can capture and physically compromise unattended nodes. In this setting, this paper presents ...
Index Terms
- Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
IoTPTS '17 | 14 | 5 | 36% |
IoTPTS '16 | 12 | 6 | 50% |
IoTPTS '15 | 13 | 5 | 38% |
Overall | 39 | 16 | 41% |