Security and Privacy issues still demand significant research efforts in Vehicular Networks, one of the most important implementations of the Internet of Things paradigm. A distinctive social benefit of these networks is the set of applications related to active road safety characterized by stringent latency and capacity constraints but also by security and privacy requirements. Current specifications of the standard require enrolment, authentication, authorization and integrity, and the corresponding procedures create substantial communication and computation overhead compromising latency and capacity in the 30 MHz bandwidth ITS-G5A band reserved for these applications. Altogether the multiple conflicting Security and Privacy issues in Vehicular Networks call for a global and dynamic optimization framework.
Communications
The communication presentations (keynote talks, facilitated break-out sessions, posters) will be continuously in May and June.

Poster
| Attachment | Size |
|---|---|
| 4.56 MB |
Wearable health sensors are becoming a pervasive family of devices that are constantly connected and capturing data. They are the most personal devices that fitting into the broad area of the Internet of Things (IoT). Once this data is produced and stored, technology must be in place to store the encrypted data in the cloud in such a way that the cloud manager cannot read the data. However, the data owner should be able to not only access the data but also perform operations over the encrypted data. This poster discusses the challenges in acessing health data from IoT devices data stored by a third cloud storage.
Poster

IoT focuses on interconnecting millions of smart devices. These devices manipulate personnal and sensitive data and control physical systems. Hence, any breach in these devices may result in compromising human lives and lowering privacy protection. It is then mandatory that these devices support receiving security updates, on the field, with no manual intervention. Also, they must get enough computing power to support next generation security policies. Besides, some contraints such as low-power cannot be disregarded, as in any embedded system. Reconfigurable computing match these requirements. It offers a high performance/low power hardware support for implementing complex policies. We discuss adding RC support to IoT devices in order to implement complex solutions such as multi-level proxies supporting virtualization and cryptography.
Poster
| Attachment | Size |
|---|---|
| 2.72 MB |

We review the current procedures for capturing and disseminating provenance data for NASA Earth Science Data Products. We identify provenance collection and representation methodologies for theprovenance data that is driven by instrumenting the e-Science applications within the NASA-funded Instant Karma project. We illustrate the identified ideas of provenance collection to support Earth science research with the specific example of Sea Ice Data Processing Workflows. We present a model fo
thinking about provenance instrumentation. We discuss the model by applying it to data processing workflows with the use of Karma provenance collection framework.
Poster

RFID technology enables traceability systems that capture detailed data about goods as they move in the supply chain. Securing this data requires evaluating dynamic conditions to authorize business partners that are not known in advance. Furthermore, the system must promote trust and give incentives so that each partner shares its own data.
TrakChain implemented data visibility restriction policies using RDF and SPARQL. These policies can be converted to a standard format, XACML, to reuse existing enforcement infrastructures and tools. The expressiveness of the policies was evaluated against a set of requirements for a pharmaceutical traceability system.
Poster
| Attachment | Size |
|---|---|
| 1.01 MB |
- ‹ previous
- 2 of 2

