The 2012 Workshop on the Security of the Internet of Things (SecIoT'12)
 Munich (Germany), July 30, 2012
 in conjunction with
 IEEE ICCCN 2012, July 30 – August 2, 2012

Important Dates:

Paper Submission due: March 9, 2012
Acceptance notification: April 25, 2012
Final papers due: May 10, 2012


While there are many definitions of the Internet of Things (IoT), all of
them revolve around the same central concept: a world-wide network of
interconnected objects. These objects will make use of multiple
building blocks (e.g. wireless communication, sensors, actuators, RFID)
and connectivity paradigms (e.g. cloud-based infrastructures, P2P systems)
in order to allow people and things to be connected anytime anyplace,
with anything and anyone. However, mainly due to the inherent
of this vision and its broad scope, there will not be a single silver
security solution that will fulfill all the security requirements of the
Therefore: How can we include security as a core element of the IoT? How
the IoT interact with other security mechanisms of the Future Internet? 
What security requirements will be truly challenged by the ultimate vision
the IoT?

It is precisely the goal of this workshop to bring together researchers
industry experts in areas relevant to the security of the Internet of
to discuss these and other significant issues. Moreover, this workshop
has the objective to serve as a forum not only for presenting cutting-edge
research, but also for debating the role of security and its practical
implications in the development of the IoT.

Topics of interest for the workshop include the following:

 * New security problems in the context of the IoT.
 * Privacy risks and data management problems.
 * Identifying, authenticating, and authorizing entities.
 * Development of trust frameworks for secure collaboration.
 * New cryptographic primitives for constrained "things".
 * Connecting heterogeneous ecosystems and technologies.
 * Legal challenges and governance Issues. 
 * Resilience to external and internal attacks.
 * Context-Aware security.
 * Providing protection to an IP-connected IoT.
 * Web services security and other application-layer issues.
 * Security of cloud-based M2M/IoT platforms.
 * Distributed policy enforcement and rights management.
 * Usability of security and privacy technologies in the context of the

Submission Guidelines:

Submitted manuscripts must be formatted in standard IEEE camera-ready
(double-column, 10-pt font) and must be submitted via EDAS
as PDF files (formatted for 8.5x11-inch paper). The manuscripts should be
longer than 5 pages. One additional page is permitted if the authors are
willing to pay an over-length charge at the time of publication
should not exceed 6 pages). Submitted papers cannot have been previously
published in or be under consideration for publication in another journal
conference. The workshop Program Committee reserves the right to not
papers that either exceed the length specification or have been submitted
published elsewhere. Submissions must include a title, abstract, keywords,
author(s) and affiliation(s) with postal and e-mail address(es). A paper
abstract must be registered on EDAS by the deadline.

Submitted papers will be reviewed by the workshop Program Committee and
judged on originality, technical correctness, relevance, and quality of
presentation. An accepted paper must be presented at the ICCCN 2012 venue
by one of the authors registered at the full registration rate. Each
registration covers up to two workshop papers by an author. Accepted and
registered papers will be published in proceedings that will be available
through Xplore. Papers that are not presented at the ICCCN 2012 venue by
of the registered co-authors will not appear in Xplore.

General Chair:
 - Jim Clarke (Waterford Institute of Technology, Ireland)

Program Co-Chairs:
 - Rodrigo Roman (Institute for Infocomm Research, Singapore)
 - Stefanos Gritzalis (University of the Aegean, Greece)

Program Committee:
 - Gergely Acs (INRIA, France)
 - Hani Alzaid (King Abdulaziz City for Science and Technology, Saudi
 - Katrin Borcea-Pfitzmann (TU Dresden, Germany)
 - Seyit Ahmet Camtepe (TU Berlin, Germany)
 - Alvaro Cardenas (Fujitsu Labs, USA)
 - Chao Chen (University of Florida, USA)
 - Benjamin Fabian (Humboldt-Universität zu Berlin, Germany)
 - Tobias Heer (Aachen University, Germany)
 - Qiong Huang (South China Agricultural University, China)
 - Antonio Jara (University of Murcia, Spain)
 - Marc Joye (Technicolor, France)
 - Manik Lal Das (Dhirubhai Ambani Inst. for Information and Communication
Tech., India)
 - Costas Lambrinoudakis (University of Piraeus, Greece)
 - Albert Levi (Sabanci University, Turkey)
 - Pablo Najera (University of Malaga, Spain)
 - Neeli Prasad (Aalborg University, Denmark)
 - Sasa Radomirovic (University of Luxembourg, Luxembourg)
 - Shahid Raza (Swedish Institute of Computer Science (SICS), Sweden)
 - Panagiotis Rizomiliotis (University of the Aegean, Greece)
 - Matt Robshaw (Orange Labs, France)
 - Gokay Saldamli (Bogazici University, Turkey)
 - Neeraj Suri (Technische Universitaet Darmstadt, Germany)
 - Yanjiang Yang (Institute for Infocomm Research, Singapore)
 - Wen Tao Zhu (CAS, China)

Steering Committee
 - Jim Clarke (Waterford Institute of Technology, Ireland)
 - Stefanos Gritzalis (University of the Aegean, Greece)
 - Javier Lopez (University of Malaga, Spain)
 - Rodrigo Roman (Institute for Infocomm Research, Singapore)
 - Jianying Zhou (Institute for Infocomm Research, Singapore)