Workshop on Cyber Security and Blockchain
Workshop Date: 7th January 2020
The Cybersecurity and Blockchain Workshop will be held in conjunction with the annual COMSNETS conference on January 07, 2020. This workshop is intended to be a forum where researchers can meet and discuss the latest in cybersecurity topics as they apply to communications systems and identify new applications, technologies and theories for blockchain. Security researchers and professionals from government, industry and academia are invited to propose and present original work in the following topics (or related areas):
- Authentication, authorization and accounting
- Information Security protocols and architectures
- Security in social networks
- Security in parallel and distributed systems
- Security in wired, mobile and wireless communications
- Network Intrusion Detection and Prevention, Firewalls, Packet Filters
- Security in grid/cloud/pervasive computing
- Public Key Infrastructures, Key Management, Credential Management
- Security and Privacy polices
- Network and Internet Forensics Techniques
- Secure Routing and Security Management
- Application security, Malware, viruses, botnets, etc.
- Embedded system security
- Security & privacy for e-commerce/m-commerce
- Blockchain and distributed ledger technologies
- Proof-of-work and consensus algorithms for blockchains
- Decentralization, scalability, and security tradeoff
- Simulation and performance evaluation techniques
- Secure smart contract and chain code
Researchers are invited to submit papers based on original work in these and other topics related to cybersecurity and blockchain technology.
Submission Guidelines
- Submissions must be no greater than 6 pages in length including all figures, tables, and references and must be a PDF file. A minimum number of 3 pages are required.
- Reviews will be single-blind: authors name and affiliation should be included in the submission.
- Submissions must follow the formatting guidelines as given on IEEE Website.
- All workshop papers (full papers - both regular and invited) will appear in conference proceedings and submitted to IEEE Xplore as well as other Abstracting and Indexing (A&I) databases.
- All papers must be in Adobe Portable Document Format (PDF) and submitted through the ITS Workshop submission site on EDAS.
- Papers can also be submitted through EDAS directly : Click Here
Important Deadlines
Paper Submission | |
Notification of Acceptance | |
Camera-ready Submission |
Keynote Speaker
Immense value can be derived through the collaboration of multiple mutually untrusting entities. Examples range from maintaining distributed joint records to performing analytics or machine learning over joint data. In this talk, I will survey some of the different use-cases of such distributed collaboration and how they can be realized using cryptographic techniques.
Nishanth Chandran is a Principal Researcher at Microsoft Research, India. His research interests are in problems related to cryptography, cloud security, confidential computing and secure computation. Prior to joining MSRI, Nishanth was a Researcher at AT&T Labs, and before that he was a Post-doctoral Researcher at MSR Redmond.
Nishanth is a recipient of the 2010 Chorafas Award for exceptional achievements in research and his research has received coverage in science journals and in the media at venues such as Nature and MIT Technology Review. He has published several papers in top computer science conferences and journals such as Crypto, Eurocrypt, CCS, TCC, STOC, FOCS, SIAM Journal of Computing, Journal of the ACM, and so on. His work on position-based cryptography was selected as one of the top 3 works and invited to QIP 2011 as a plenary talk. Nishanth has served on the technical program committee of many of the top cryptography conferences on several occasions. He holds 4 US Patents and 2 pending US Patents. Nishanth received his Ph.D. in Computer Science from UCLA, M.S. in Computer Science from UCLA, and B.E. in Computer Science and Engineering from Anna University, Chennai.
Nishanth is also a top ranking (A grade) All India Radio South Indian Classical (Carnatic) Violinist and has performed at international venues such as the Hollywood Bowl, Los Angeles (as part of legendary sitarist Late Pandit Ravi Shankar’s ensemble) and the Madras Music Academy, Chennai. You can check out a short clip from one of his concerts on Indian national television here.
Invited Speaker
In recent years, the impact evaluation of cyber-physical security of the smart grid has become highly notable and extremely important and critical research direction due to several recent cyber-attacks attempts in different countries. The smart grid is vulnerable to cyber-attacks due to its integration with communication and control technologies. The cyber-attacks can affect operations and decision-making at the energy management system or effectively destroy the critical components, even shut down the power operations and can disrupt service for its customers. Inaccurate information leads to triggering inappropriate actions by the operators. The cyber-attacks either can directly target a power component of the smart grid system or can be triggered through the communication network to the power system. In this talk, I will discuss cyber security issues with a case study to explore the cyber-physical situational awareness.
Dr. Neetesh Saxena is currently an Assistant Professor with the School of Computer Science and Informatics at Cardiff University, UK with more than 14 years of teaching and research experience. Earlier, he was an Assistant Professor (Lecturer) in the Department of Computing and Informatics, Bournemouth University, UK. Before joining BU, he was with the School of Electrical and Computer Engineering at the Georgia Institute of Technology, USA and with the Department of Computer Science, The State University of New York (SUNY) Korea, South Korea as a Post-Doctoral Researcher, and also a Visiting Scholar at the Department of Computer Science, Stony Brook University, USA. He earned his PhD in Computer Science and Engineering from Indian Institute of Technology (IIT), Indore, India. He is a TCS as well as DAAD research scholar alumnus. As a DAAD Scholar, he worked at the Bonn-Aachen International Center for Information Technology (B-IT), Rheinische-Friedrich-Wilhelms Universität, Bonn, Germany. His current research interests include cyber security, cyber-physical system security, cellular networks security, securing end-to-end systems and SMS-based applications. He has published several high-quality publications in international journals and conferences. He is a recipient of the ComSoc YP and WICE Best Paper Award at IEEE ICC 2017. He has also served as a reviewer for many prestigious IEEE/ACM journals. He has also been a TPC member for many international conferences, including IEEE ICC, MILCOM, TrustCom, SmartGridCom, WiMob, PIMRC and ICCC. He is a senior IEEE member and a member of the ACM, and Eta Kappa Nu.
Workshop Schedule
Time | Activity | Talk Title & Speaker | |
09:20 AM - 09:30 AM | Welcome by the Chairs |
||
09:30 AM - 10:30 AM | Keynote Talk | Harnessing the Power of Distributed Collaboration through Cryptography Nishanth Chandran, Microsoft Research, India |
|
10:30 AM - 11:00 AM | Tea/Coffee Break | ||
Session - 1: Cyber Security for Networks | |||
11:00 AM - 11:20 AM | Paper - 01 | Privacy-Aware Switch-Controller Mapping in SDN-Based IoT Networks Vignesh Sridharan (National University of Singapore, Singapore); Kushan Sudheera Kalupahana Liyanage (National University of Singapore & Nanyang Technological University, Singapore); Mohan Gurusamy (National University of Singapore, Singapore) |
|
11:20 AM - 11:40 AM | Paper - 02 | A Lightweight Intrusion Detection System using Benford's law and Network Flow Size Difference Kamalakanta Sethi (Indian Institute of Technology, Bhubaneswar, India); Rahul Kumar (Indian Institute of Technology Bhubaneswar, India); Nishant Prajapati (National Institute of Technology Rourkela, India); Padmalochan Bera (IIT Bhubaneswar, India) |
|
11:40 AM - 12:00 PM | Paper - 03 | HTmRPL++: A Trust-Aware RPL routing protocol for Fog Enabled Internet of Things Nishanth Subramanian and Shashwatha Mitra G B (National Institute of Technology Karnataka, Surathkal, India); John Martin (National Institute of Technology, Karnataka, India); Chandra Sekaran (National Instittute of Technology Karnataka, India) |
|
12:00 PM - 12:20 PM | Paper - 04 | Detection of Algorithmically Generated Domain Names using LSTM Palak Vij and Sayali Nikam (BITS Pilani, India); Ashutosh Bhatia (Birla Institute of Technology and Science, Pilani, India) |
|
12:20 PM - 12:40 PM | Paper - 05 | Reputation Based Routing in MANET Using Blockchain Maqsood Abdul Careem and Aveek Dutta (University at Albany, SUNY, USA) |
|
01:00 PM - 02:00 PM | Lunch Break | ||
02:00 PM : 02:50 PM | Invited Talk | Smart Grid Security Neetesh Saxena, Cardiff University, UK |
|
Session - 2: AI for Cyber Security | |||
02:50 PM - 03:10 PM | Paper - 06 | Deep Reinforcement Learning based Intrusion Detection System for Cloud Infrastructure Kamalakanta Sethi (Indian Institute of Technology, Bhubaneswar, India); Rahul Kumar (Indian Institute of Technology Bhubaneswar, India); Nishant Prajapati (National Institute of Technology Rourkela, India); Padmalochan Bera (IIT Bhubaneswar, India) |
|
03:10 PM - 03:30 PM | Paper - 07 | Evaluation of Feature and Signature based training approaches for Malware Classification using Autoencoders Sreenivas Sremath Tirumala (Auckland University of Technology); Maheswara Rao Valluri (Fiji National University, Fiji); David Nandigam (ATMC New Zealand, New Zealand) |
|
03:30 PM - 04:00 PM | Tea/Coffee Break | ||
Session - 3: Blockchain | |||
04:00 PM - 04:20 PM | Paper - 08 | Fountain Coding for Bootstrapping of the Blockchain Rudrashish Pal (Indian Institute of Technology Bhilai, India) |
|
04:20 PM - 04:40 PM | Paper - 09 | Software wallet based secure participation in Hyperledger Fabric networks Anil Thota (Lovely Professional University, India); Prashant Upadhyay (Birla Institute of Technology, Mesra, India); Srihari Kulkarni and Parameswaram Selvam (IBM Software Labs, India); Balaji Viswanathan (IBM India Pvt Ltd, India) |
|
04:40 PM - 05:00 PM | Paper - 10 | Veriblock: A novel blockchain framework based on verifiable computing and trusted execution environment Lakshmi Padmaja Maddali (Tata Consultancy Services, India); Meena Singh (Tata Consultancy Sevices Limited, India); Rajan M A, Vigneswaran R, Srujana Kanchanapalli and Batsayan Das (Tata Consultancy Services, India) |
|
05:00 PM - 05:20 PM | Paper - 11 | Blockchain-based Interoperable Healthcare Using Zero-knowledge Proofs and Proxy Re-Encryption Bhavye Sharma (Maharaja Agrasen Institute of Technology, India); Raju Halder and Jawar Singh (IIT Patna, India) | |
05:20 PM - 05:40 PM | Paper - 12 | An Automated Solution for Improving the Efficiency of Cryptocurrency Mining Connie Man-Ching Yuen (Hong Kong Shue Yan University, Hong Kong); Ka-Ming Lau (Hong Kong Institute of Vocational Education, Hong Kong); Ka-Fai Ng (The Hong Kong University of Science and Technology, Hong Kong) |
|
05:40 PM - 06:00 PM | Paper - 13 | Distributed Off-chain Storage of Patient Diagnostic Reports in Healthcare System using IPFS and Blockchain Randhir Kumar. (NIT Raipur, India); Rakesh Tripathi (Indian Institute of Technology Guwahati, India); Ningrinla Marchang (North Eastern Regional Institute of Science and Technology, Arunachal Pradesh, India) |
|
06:00 PM | Workshop Closure |
Program Committee:
Dr. Mamoun Alazab CDU, Australia
Dr. Pelin Angin Middle East Technical University, Turkey
Dr. Junaid Arshad University of West London, UK
Dr. Chitra Balakrishna The Open University, UK
Dr. Thomas Chen City University London, UK
Dr. Athanasopoulos Elias University of Cyprus, Cyprus
Dr. Gregory Epiphaniou University of Wolverhampton, UK
Dr. Roberto Di Pietro Hamad Bin Khalifa University, Qatar
Dr. Vinay Ribeiro Indian Institute of Technology Delhi, India