{"id":1616,"date":"2021-04-13T07:24:01","date_gmt":"2021-04-13T07:24:01","guid":{"rendered":"https:\/\/seeda2021.uowm.gr\/?page_id=1616"},"modified":"2021-06-14T06:07:44","modified_gmt":"2021-06-14T06:07:44","slug":"secriot-2021","status":"publish","type":"page","link":"https:\/\/seeda2021.uowm.gr\/secriot-2021\/","title":{"rendered":"SecRIoT 2021"},"content":{"rendered":"

Short\u00a0Description and Goals<\/strong><\/h4>\n

The next years more than 20 billion devices will be interconnected. The Internet of Things provides unparalleled opportunities for the development of new novel services. Currently most of the new electronic devices are offering from basic to advanced networking capabilities in the context of smart environments. Newer vehicles are partially or completely autonomous, powered by modern microprocessors, hundreds of sensors and Internet enabled services. The same applies to robotic and medical devices and almost every other advanced equipment. Despite the longstanding efforts of the scientific community to secure Internet and Network communications, Operating Systems and Software Applications only a limited amount of this knowledge has been applied to the IoT ecosystems. Most of the IoT devices, including modern vehicles suffer from numerous and multilayered vulnerabilities. Default, weak or no password authentication for remote connections, unencrypted traffic or obsolete and insecure cryptographic algorithms, outdated, unmanaged and vulnerable software are among the most serious problems of the IoT landscape. Even more alarming is the unregulated manufacturing process of many IoT constructors. Aiming to reduce the cost and minimize the time to market of their products, minimal or none effort is put to secure and support them sufficiently. Worse, there are recorded cases of IoT devices delivered with preinstalled malware that demonstrate total lack of operations security in the supply chain. In contrary to software applications in PCs and mobile devices, the owners are not likely to replace their devices because of security problems. As consequence these systems remain vulnerable for extended periods. Recent very large-scale DDoS attacks based and executed entirely by IoT Botnets, signify the magnitude of the problem.<\/p>\n

Workshop Topics<\/strong><\/h4>\n

The aim of this workshop is to bring together researchers and professionals that are responsible for the secure design, deployment and operation of current and future IoT systems. Topics of interest include, but are not limited to:<\/p>\n