Information Security Education Awareness (ISEA)
SecIoT (Security of Internet of Things) Workshop

Department of Computer Science and Engineering
IIT Kharagpur


Introduction

In recent years, Internet of Things (IoT) has been an industry buzzword which actually refers to uniquely identifiable objects or things and their virtual representations in an internet-like infrastructure. The IoT allows objects to be sensed and/or controlled remotely across existing network infrastructure, creating opportunities for more direct integration of the physical world into computer-based systems, and resulting in improved efficiency, accuracy and economic benefit. The IoT nodes such as heart monitoring implants, bio-chip transponders, electric clams in coastal waters, sensor nodes in automobiles, smart thermostats, RFID tags, WiFi connected electronic home appliances and smart cards etc., generate large quantities of possibly security sensitive data. This, in turn, leads to an exponential growth of the attack surface. Hence, along with creating a new eco system for this framework, we need to ensure that the IoT nodes are free from the threats of device tampering, information disclosure, privacy breach, denial-of-service, spoofing, elevation of privilege etc.

Since the IoT nodes are inherently resource-constrained, an additional challenge in this context is that the implementation of the security measures must be sufficiently lightweight. The main objective of this workshop is to make the audience familiar with different plausible threat models that can be imposed on this framework and feasible lightweight solutions to evade these security concerns.


Link to the Talks/ Speakers/Abstracts/PPTs:

Check the newly activated Presentation button underneath each talk. To download right click on the button and click Save As

Registration Procedure

a. Go to http://www.isea.gov.in/isea/home/index.html

b. Log in with your credentials.

c. In the Statistics section of the dashboard, please click: Education > FDP Programme@Department of Computer Science and Engineering Indian Institute of Technology Kharagpur.

d. A new window will be opened. In the bottom, you will find a link to register online.


24 Oct, 2016 (Monday)

25 Oct, 2016 (Tuesday)

26 Oct, 2016 (Wednesday)


1. Talk 1: Physically Unclonable Functions: A Promising Primitive for IoT Security
Speaker: Dr. Debdeep Mukhopadhyay
Duration: 10.00 a.m. to 11.00 a.m.
Presentation

2. Talk 2: Introduction to Wireless Hacking
Speaker: Vidya Govindan
Duration: 11.00 a.m. to 11.30 a.m.
Presentation

3. Talk 3: Public Key Cryptography for IoT
Speaker: Debapriya Basu Roy
Duration: 11.30 a.m. to 12.15 p.m.
Presentation

4. Talk 4: PUF based Authentication Protocols
Speaker: Urbi Chatterjee
Duration: 12.15 p.m. to 1.00 p.m.
Presentation

Lunch Break (1.00 p.m. to 2.00 p.m.)

Demo Session (2.00 p.m. onwards)
4. Demo 1: Eavesdropping attack on Phillips Hue Wireless Lighting System
5. Demo 2: Man-In-Middle attack on Wireless Surveillance System.

1. Talk 5: Introduction to Lightweight Symmetric Cryptosystem
Speaker: Rajat Sadhukhan
Duration: 9.30 a.m. to 10 a.m.
Presentation

2. Talk 6: Security Model and Threat Taxonomy for Internet of Things (IoT)
Speaker: Dr. Sandip Chakraborty
Duration: 10.00 a.m. to 11.00 a.m.
Presentation

3. Talk 7: Side Channel Analysis
Speaker: Dr. Debdeep Mukhopadhyay
Duration: 11.00 a.m. to 1.00 p.m.
Presentation

Lunch Break (1.00 p.m. to 2.00 p.m.)

Demo Session (2.00 p.m. onwards)
3. Demo 3: Design and implementation of Physically Unclonable Functions
4. Demo 4: Implementation of Hardware Trojan Horse

Grand Dinner: 8.00 p.m. at VikramShila Foyer.

1. Talk 8: Privacy Issues in Smart Devices
Speaker: Dr. Sandip Chakraborty
Duration: 9.30 a.m. to 10.30 a.m.
Presentation

2. Talk 9: Physically Unclonable Functions: Construction and attacks.
Speaker: Dr. Rajat Subhra Chakraborty
Duration:10.30 a.m. to 12.30 p.m.
Presentation

Lunch Break (12.30 p.m. to 2.00 p.m.)

Demo Session (2.00 p.m. onwards)
6. Demo 5: Integrating PUFs with the Smart Devices
7. Demo 6: Exploiting Safe error attack based Key leakage in RFID authentication protocols.