Get Adobe Flash player

Special Session: Security and Privacy in WSN and IoT

Recent advancements of processing power, battery life and storage capacity pave passage for different new technologies and applications hitherto seemed farfetched. Among them wireless sensor networks (WSN) is one of the most promising concept, which shows great potential to combat difficult computing and communication challenges, like disaster management, battlefield ad hoc communication etc. With the proliferation of WSN applications, Internet of things (IoT) becomes a reality. For IoT kind of applications, the world will be a web of huge number of computing devices communicating through a common media of IP. The benefit of realization of IoT in human life is immense. It will make our lives comfortable and eventually help us to build smarter planet. However, the benefit of WSN and IoT comes with a cost, which is mainly due to the concern of security and privacy. Large amount of retrievable data storage, collaborating computing, distributed applications are very much susceptible to different security and privacy breach attacks. For sake of simplicity, we define security as a measure of alertness to counter certain attacks, while privacy is defined in terms of probability of exposure at the time of attack.

In this session, the objective will be to identify and address the security and privacy issues in WSN and IoT. This session will cover developments, research directions and advancements on security and privacy in WSN and IoT perspectives. Both theoretical and applied approaches are to be discussed. The topics include (but are not limited to):

  1. Cryptography
  2. Public-key and symmetric-key cryptosystems, block ciphers, and hash functions
  3. Cryptanalysis
  4. Phishing, spam, and click fraud
  5. Cloud security
  6. Biometric security
  7. Intrusion detection
  8. Denial of service
  9. Evidence, Authentication, and Identity
  10. Trust management
  11. Malicious Codes
  12. Trusted computing
  13. Anonymity
  14. Secure multi-party computation
  15. Homomorphic encryption
  16. Privacy preserving data mining
  17. Data stream privacy
  18. Context privacy
  19. Privacy Policies and Laws/li>


Dr Arijit Ukil

Text Box: Arijit Ukil is currently working in Innovation Labs, Tata Consultancy Services (TCS) Ltd., Kolkata as a Scientist. He is primarily engaged with the research activity on Internet of things, security and privacy and wireless networking. Before joining TCS in 2007, he has worked as Scientist in Deference Research and Development Organization (DRDO) for four years, where his primary focus area was embedded systems and wireless communication for Radar applications. He was mainly involved in naval based Radar systems. He has done his B.Tech in Electronics and Telecommunication Engineering in 2002 and currently pursuing PhD from Birla Institute of Technology, Mesra. He has published more than 30 conference and journal papers of national and international repute. He has already published three book chapters. He has been reviewer of a number of IEEE conferences like, IEEE VTC, IEEE WCNC. He has organized SPCS session in ICCSA 2012. He has been invited and delivered keynote and tutorials in many international and national conferences and symposia. He is enlisted in 2010 Marquis’ “Who’s Who” as a renowned contributor in the field of computer science and information technology.