Assis. Prof. Eslam G. AbdAllah
Concordia University of Edmonton, Canada
>>>Personal Webpage: Click
Eslam G. AbdAllah is an Assistant Professor in Concordia University of Edmonton, AB, Canada. In 2019–2020, he was a postdoctoral fellow in Carleton University, ON, Canada. In 2018, Dr. AbdAllah worked as an Assistant Professor at the Faculty of Computer and Information Sciences in Ain Shams University in Egypt. Dr. AbdAllah received his Ph.D. from the School of Computing, Queen’s University in Kingston, Ontario in 2017. Eslam has contributed to a number of journals, technical papers and reports and his research interests include cryptography, network security, post-quantum cryptography, information centric networking (ICN), Radio Frequency IDentification (RFID), and autonomous vehicles. He won the best paper award at IEEE-DASC 2015 conference in Liverpool, UK.
Security Trends for the Next Generation Internet (NGI)
Nowadays, the Internet has changed into the Internet of Things (IoT), Internet of Services, Internet of People, and Internet of Media. This Next Generation Internet (NGI) comes with new requirements of highly scalable, efficient, and secure distribution of content to efficiently serve the increasing number of users, devices, and objects. IoT refers to the expanding interconnections of smart devices ranging from tiny sensors to appliances. The diversity of communication types and devices in IoT and NGI will enable attackers to perform different types of attacks.
Current symmetric and asymmetric cryptographic solutions are computationally expensive and consume significant amounts of energy, limiting the practical applicability of these algorithms for embedded devices, sensors, and battery-powered mobile devices.
In this talk, we will explore the future trends for security in the NGI including Information Centric Networking (ICN) and Lightweight Cryptography (LC). ICN is a new communication paradigm that focuses on content retrieval from a network regardless of the storage location or physical representation of this content. In ICN, securing the content itself is much more important than securing the infrastructure or the endpoints. LC is suitable for small embedded systems and wearable technology such as those in wide use in the IoT. The term lightweight indicates that a cryptographic algorithm makes minimal resource demands on the target platforms.
Assis. Prof. Waleed Ejaz
Lakehead University, Canada
>>>Personal Webpage: Click
Waleed Ejaz(S’12-M’14-SM’16) is an Assistant Professor in the Department of Electrical Engineering at Lakehead University, BarrieCampus, ON, Canada. Prior to that he was an Assistant Professor in the Department of Engineering &Applied Science at Thompson Rivers University, Kamloops, BC, Canada. Previously, he held academic and research positions at Ryerson University, Carleton University, and Queen’s University in Canada. He received the B.Sc. and M.Sc. degrees in Computer Engineering from the University of Engineering and Technology, Taxila, Pakistan and the National University of Sciences and Technology, Islamabad, Pakistan, and the Ph.D. degree in Information and Communication Engineering from Sejong University, Republic of Korea. He has co-authored over 90 papers in prestigious journals and conferences, and 3 books. His current research interests include Internet of Things (IoT), energy harvesting, 5G and beyond networks, and mobile edge computing. He is an Associate Editor of the IEEE Communications Magazine, IEEE Canadian Journal of Electrical and Computer Engineering, and the IEEE ACCESS. Dr. Ejaz completed certificate courses on “Teaching and Learning in Higher Education” from the Chang School at Ryerson University. He is a registered Professional Engineer (P.Eng.) in the province of Ontario, Canada. Dr. Ejaz is a senior member of IEEE, member of ACM, and ACM distinguished speaker.
Massive Connectivity in Future Wireless Networks
Assis. Prof. Mohiuddin Ahmed
Edith Cowan University, Australia
>>>Personal Webpage: Click
Mohiuddin Ahmed has made practical and theoretical contributions in cyber security and big data analytics for several application domains. His research has a high impact on data and security analytics, false data injection attacks, and digital health. Mohiuddin has led edited multiple books and contributed articles in The Conversation. He has over 50 publications in reputed venues. Mohiuddin secured the prestigious ECU Early Career Researcher Grant for investigating effectiveness of blockchain for dependable and secure e-health. He also secured several external and internal grants within a very short time frame.
Secure Edge Computing: Applications, Techniques and Challenges
The internet is
making our daily life as digital as possible, and this new era is called the
Internet of Everything (IoE). Edge computing is an emerging data analytics
concept that addresses the challenges associated with IoE. More specifically,
edge computing facilitates data analysis at the edge of the network instead
of interacting with cloud-based servers. Therefore, more and more devices
need to be added in remote locations without any substantial monitoring
This increased connectivity and the devices used for edge computing will create more room for cyber criminals to exploit the system’s vulnerabilities. Ensuring cyber security at the edge should not be an afterthought or a huge challenge. The devices used for edge computing are not designed with traditional IT hardware protocols. There are diverse-use cases in the context of edge computing and Internet of Things (IoT) in remote locations. However, the cyber security configuration and software updates are often overlooked when they are most needed to fight cybercrime and ensure data privacy. Therefore, the threat landscape in the context of edge computing becomes wider and far more challenging.
There is a clear need for collaborative work throughout the entire value chain of the network. This talk will address the cyber security challenges associated with edge computing, provide a bigger picture of the concepts, techniques, applications, and open research directions in this area.
Copyright© IoTSC 2022
2022 2nd International Conference on Internet of Things and Smart City （IoTSC 2022） http://2022.iotsc.net/