Loading...

FDP Programme : Department of Computer Science and Engineering Indian Institute of Technology Kharagpur India -721302.

Participants Details

# Name Gender Organization/Institute Name
1 Vatsavayi Valli Kumari Female Andhra university
2 Kousik Maiti Male CDAC Kolkata
3 Priyadarshi Male university of hyderabad
4 Anurag Mathur Male NIELIT AGARTALA
5 Pankaj Pal Male IIT(ISM), Dhanbad
6 Ravi Kumar Male IIT (ISM) Dhanbad
7 Prasenjit Maiti Male National Institute of Technology, Rourkela
8 Vaibhav K Dewangan
9 Bithika Pal Female IIT Kharagpur
10 Shashi Mogalla Female Andhra University College of Engg
11 Bhabendu Kumar Mohanta Male IIIT Bhubaneswar
12 Pranesh Santikellur Male IIT KGP

Event Details

In recent years, Internet of Things (IoT) has been an industry buzzword which actually refers to uniquely identifiable objects or things and their virtual representations in an internet-like infrastructure. The IoT allows objects to be sensed and/or controlled remotely across existing network infrastructure, creating opportunities for more direct integration of the physical world into computer-based systems, and resulting in improved efficiency, accuracy and economic benefit. The IoT nodes such as heart monitoring implants, bio-chip transponders, electric clams in coastal waters, sensor nodes in automobiles, smart thermostats, RFID tags, WiFi connected electronic home appliances and smart cards etc., generate large quantities of possibly security sensitive data. This, in turn, leads to an exponential growth of the attack surface. Hence, along with creating a new eco system for this framework, we need to ensure that the IoT nodes are free from the threats of device tampering, information disclosure, privacy breach, denial-of-service, spoofing, elevation of privilege etc.

Since the IoT nodes are inherently resource-constrained, an additional challenge in this context is that the implementation of the security measures must be sufficiently lightweight. The main objective of this workshop is to make the audience familiar with different plausible threat models that can be imposed on this framework and feasible lightweight solutions to evade these security concerns.

Web Link: http://cse.iitkgp.ac.in/conf/IoT/
 
Schedule

24 Oct, 2016 (Monday)

1Welcome Speech by the Guest of Honour. 
Speaker: 
Duration: 9.30 a.m. to 10.00 a.m. 

2. Talk 1: Physically Unclonable Functions: A Promising Primitive for IoT Security 
Speaker: Dr. Debdeep Mukhopadhyay 
Duration: 10.00 a.m. to 11 a.m. 

3. Talk 2: Physically Unclonable Functions: A Novel Hardware Security Primitive 
Speaker: Dr. Rajat Subhra Chakraborty 
Duration: 11 a.m. to 1.00 p.m. 

Lunch Break (1.00 p.m. to 2.00 p.m.) 

Demo Session (2.00 p.m. onwards) 
4. Demo 1: Eavesdropping attack on Phillips Hue Wireless Lighting System 

5. Demo 2: Man-In-Middle attack on Wireless Surveillance System.


25 Oct, 2016 (Tuesday)


1. Talk 3: Introduction to Wireless Hacking 
Speaker: Vidya Govindan
Duration: 9.30 a.m. to 10.00 a.m. 

2. Talk 4: Security Model and Threat Taxonomy for Internet of Things (IoT) 
Speaker: Dr. Sandip Chakraborty 
Duration: 10.00 a.m. to 11.00 a.m. 

3. Talk 5: Side Channel Analysis 
Speaker: Dr. Debdeep Mukhopadhyay 
Duration: 11.00 a.m. to 1.00 p.m. 

Lunch Break (1.00 p.m. to 2.00 p.m.) 

Demo Session (2.00 p.m. onwards) 
4. Demo 3: Design and implementation of Physically Unclonable Functions 

5. Demo 4: Implementation of Hardware Trojan Horse

26 Oct, 2016 (Wednesday)


1. Talk 6: Privacy Issues in Smart Devices 
Speaker: Dr. Sandip Chakraborty 
Duration: 9.30 a.m. to 10.30 a.m. 

2. Talk 7: Introduction to Lightweight Cryptosystem 
Speaker: Rajat Sadhukhan 
Duration: 10.30 a.m. to 11 a.m. 

3. Talk 8: Introduction to Hardware Trojan Horse 
Speaker: Debapriya Basu Roy 
Duration: 11.00 a.m. to 11.45 a.m. 

4. Talk 9: PUF based Authentication Protocols 
Speaker: Urbi Chatterjee 
Duration: 11.45 p.m. to 12.30 p.m. 

Lunch Break (1.00 p.m. to 2.00 p.m.) 

Demo Session (2.00 p.m. onwards) 
5. Demo 5: Integrating PUFs with the Smart Devices 

6. Demo 6: Exploiting Safe error attack based Kay leakage in RFID authentication protocols.



Official Website of the Workshop


 

Subject :
SecIoT (Security of Internet of Things) Workshop
Start :
24-Oct-2016
End :
24-Oct-2016
Venue :
Department of Computer Science and Engineering Indian Institute of Technology Kharagpur India -721302.
Registration Status :
1

Workshop / Event co-ordinator Detail

Name :
Dr. Debdeep Mukhopadhyay
Mobile :
9434744544
Email :
debdeep@cse.iitkgp.ernet.in

Style Switcher

Predefined Colors

Layout Style

Header Color

Footer Top Color

Footer Bottom Color