The Internet of Things (IoT) is emerging from the lab into the everyday world, but the sheer number of devices of which it is predicted to comprise mean that current approaches to cybersecurity are unlikely to scale. Aspects of privacy associated with the widespread deployment of sensor devices have yet to find solutions. These and other problems make this a fruitful field for cybersecurity and computer science researchers.
Considering design, technological, human and societal aspects of the IoT, this one-day workshop examined the challenges, possible solutions and interesting research directions associated with the problem of securing the IoT.
The programme for the day included invited speakers as well as researchers from within the SICSA community who showcased their projects and interests.
Presentation | Author |
Welcome/Introduction (video) | Dr Ian Ferguson (Abertay University) |
Keynote - The internet of Things - Are we running quickly into the darkness? (video) (slides) | Dr George Weir (University of Strathclyde) |
Invited Talk - Designing for Adoption in The Internet of Things (video) (slides) | Prof. Paul Coulton (Lancaster University) |
Power Analysis Attacks against the Arduino IoT platform (video) (slides) | Dr Owen Lo (Edinburgh Napier University) |
Agency and transparency in publically deployed IoT systems (video) (slides) | Dr Naomi Jacobs (University of Aberdeen) |
A community driven transparency model for the IoT (video) (slides) | Dr David Corsar (University of Aberdeen) |
Internet of Things: the governance and metagovernance of networking everything (video) (slides) | Dr Ewan Sutherland (University of the Witwatersrand) |
Towards a methodology for IoT Penetration Testing - Exploiting an IoT Baby Monitor (video) (slides) | Ross Heenan (Abertay University) |
Q and A - (video) | Plenary session |
List of delegates
- Nicholas O'Neill nicholas.edward.oneill@gmail.com
- Lynsay Shepherd lynsay.shepherd@abertay.ac.uk
- Ishbel Duncan ishbel.duncan@st-andrews.ac.uk
- Jacqueline Archibald j.archibald@abertay.ac.uk
- Rohith Kalvala 1701858@abertay.ac.uk
- Michael Upton michael.upton@nccgroup.trust
- Jim Conacher jconacher@swish-ict.com
- Kunal Kathrani kunalkathrani@gmail.com
- Ewan Sutherland sutherla@gmail.com
- Adrian Bruce adrian.bruce.ic@uhi.ac.uk
- Stephen Duncan stephen.duncan.ic@uhi.ac.uk
- Natalie Sparks natalie.sparks@scotent.co.uk
- Ian Ferguson ian.ferguson@abertay.ac.uk
- Rohith Kumar 1701858@ABERTAY.AC.UK
- Owen Lo o.lo@napier.ac.uk
- Karen Renaud k.renaud@abertay.ac.uk
- Adrian Smales a.smales@napier.ac.uk
- Noura Aleisa n.aleisa.1@research.gla.ac.uk
- Beverley MacKenzie beverley.mackenzie@logicalstep.co.uk
- Wendy Moncur wmoncur@dundee.ac.uk
- Natalie Coull n.coull@abertay.ac.uk
- David Corsar dcorsar@abdn.ac.uk
- Mehrdad Mizani mehrdad.mizani@ed.ac.uk
- Naomi Jacobs naomi.jacobs@abdn.ac.uk
- James Chapman jmchapman@gmail.com
- Paul Marsden paul.marsden1968@gmail.com
- George Weir george.weir@strath.ac.uk
- Joseph Maguire joseph.maguire@glasgow.ac.uk
- Zhen Ge holidayge919@gmail.com
- Adam Sampson a.sampson@abertay.ac.uk
- Tayyaba Nafees 1405357@abertay.ac.uk
- Mattias Wecksten mattias.wecksten@hh.se
- Alex Caunt 1704013@abertay.ac.uk
Interesting links from the discussions
Thanks and Acknowledgments
The organisers would like to express their thanks to SICSA CyberNexus for financially supporting the workshop, to the invited speakers and particularly to NCC Group for their support.
Presenter Ross Heenan gets a special mention for transforming his contribution from a lab-based tutorial, into a demonstration, into a presentation and finally into a video presentation all with only a few hours notice!
Downloads
Organiser
Dr Ian Ferguson - Senior Lecturer in Cybersecurity - ian.ferguson@abertay.ac.uk and coordinator of the Security Research Group