It is our great pleasure to welcome you to the 2017 ACM Workshop on IoT Privacy, Trust, and Security -- IoTPTS'17. The Internet of Things (IoT) refers to an exploding complex ecosystem that ranges from cloud backend services and big-data analytics to home, public, industrial, and wearable sensor devices and appliances. IoTPTS'17 explores opportunities to design privacy, trust, and security into these systems.
This is the third year of the IoTPTS Workshop and the call for papers attracted 14 submissions worldwide from 8 countries. The final program contained 5 papers (representing an acceptance rate of 35%) and a keynote Blockchain Engineering for the Internet of Things: Systems Security Perspective by Professor Davor Svetinovic from the Masdar Institute of Science and Technology, Abu Dhabi.
Proceeding Downloads
Blockchain Engineering for the Internet of Things: Systems Security Perspective
The Internet of Things (IoT) technology has a potential to bring the benefits of intelligently interconnecting not just computers and humans, but most of everyday things. IoT has a promise of opening significant business process improvement ...
Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things
The exponential increase of Internet of Things (IoT) devices have resulted in a range of new and unanticipated vulnerabilities associated with their use. IoT devices from smart homes to smart enterprises can easily be compromised. One of the major ...
Secure Data Provenance for the Internet of Things
The vision of smart environments, systems, and services is driven by the development of the Internet of Things (IoT). IoT devices produce large amounts of data and this data is used to make critical decisions in many systems. The data produced by these ...
Ring-LWE Ciphertext Compression and Error Correction: Tools for Lightweight Post-Quantum Cryptography
Some lattice-based public key cryptosystems allow one to transform ciphertext from one lattice or ring representation to another efficiently and without knowledge of public and private keys. In this work we explore this lattice transformation property ...
IoTScanner: Detecting Privacy Threats in IoT Neighborhoods
In the context of the emerging Internet of Things (IoT), a proliferation of wireless connectivity can be expected. That ubiquitous wireless communication will be hard to centrally manage and control, and can be expected to be opaque to end users. As a ...
Intrusion Detection in the RPL-connected 6LoWPAN Networks
The interconnectivity of 6LoWPAN networks with the Internet raises serious security concerns, as constrained 6LoWPAN devices are accessible anywhere from the untrusted global Internet. Also, 6LoWPAN devices are mostly deployed in unattended environments,...
Index Terms
- Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
IoTPTS '17 | 14 | 5 | 36% |
IoTPTS '16 | 12 | 6 | 50% |
IoTPTS '15 | 13 | 5 | 38% |
Overall | 39 | 16 | 41% |