header images

Program

The workshop will be held online on Monday, August 31st

  • Welcome message (14.05 - 14.15)
  • Keynotes:
  • (14.15 - 15.00) Xenofon Fafoutis, Associate Professor, Technical University of Denmark (DTU): "Reliable Industrial Wireless IoT Networks: In the Lab and out in the Wild"
    Abstract: In the era of the Internet of Things (IoT), resource-constrained wireless embedded systems support critical infrastructures of everyday life. These application domains require industrial-grade reliability in the wireless communication. TSCH (Time-Slotted, Chanel Hopping) is a relatively recent addition to the IEEE 802.15.4 standard that aims to bring industrial-grade reliability and predictability to resource-constrained IoT networks that operate on naturally unreliable wireless environments. This talk is organised in two parts. In the first part ("In the lab..."), we will briefly go through a number of TSCH works, which address challenges in time synchronisation, channel selection, and scheduling. In the second part of this talk ("...and out in the wild"), we will discuss a deployment of 50+ TSCH networks in residential environments for up to twelve months, demonstrating long-term reliable operation in the wild.

    (15.00 - 15.45) Panayiotis Kotzanikolaou, Associate Professor, University of Piraeus, Greece: "IoT Enabled Attacks Against Critical Infrastructures and Services"
    Abstract: The vast deployment of Internet of Things (IoT) technologies creates new attack opportunities for cyber attackers. Many recent cyber attacks are IoT-enabled: the attacker initially exploits some vulnerable IoT technology as a first step towards compromising a critical system or service connected in some way with the IoT. For sectors like industry, smart grids, transportation, and healthcare, the significance of such attacks is obvious, since IoT technologies are part of critical back-end systems. However, in other sectors where IoT is usually at the end-user side, like smart homes, such attacks can be underestimated. Based on our recent work on IoT enabled attacks, in this presentation some recent and characteristic IoT-enabled cyber attacks are analyzed using a risk based approach. The goal is to demonstrate the risk of hidden and/or underestimated IoT enabled attack paths against critical infrastructures and services. Finally, existing mitigation strategies and research gaps are discussed.

  • Technical papers:
    1. (15.45 - 16.15) D. Sourailidis, R. A. Koutsiamanis, G. Papadopoulos, D. Barthel, N. Montavont, "RFC 6550: On Minimizing the Control Plane Traffic of RPL-based Industrial Networks"
    2. (16.15 - 16.45) D. Zorbas, "Improving Delay and Capacity of TS-LoRa with Flexible Guard Times"

About Cork

Wikipedia