Pr: Latif Ladid, University of Luxembourg
                                            IPv6-Only based 5G Mobile Wireless Internet enabled thru SDN-NFV, IoT and Fog Computing

Biography

     

- Founder & President, IPv6 FORUM (www.ipv6forum.com)
- Chair, 5G World Alliance (http://www.5gworldalliance.org/ )
- Chair, IEEE COMSOC IoT subCommittee (http://committees.comsoc.org/IoT)
- Chair, IEEE COMSOC 5G subCommit http://committees.comsoc.org/5gmwi

- Chair, ETSI IPv6 ISG (icl. 5G) (http://portal.etsi.org/tb.aspx?tbid=827&SubTB=827 )
- Co-Chair, IEEE COMSOC SDN-NFV subCommittee
- Emeritus Trustee, Internet Society - ISOC (www.isoc.org)
- IPv6 Ready Logo Program Board (www.ipv6ready.org)
- Research Fellow @ SnT - University of Luxembourg on multiple European Commission Next Generation Technologies IST Projects
- Member of 3GPP PCG (Board) (www.3gpp.org)
- Member of 3GPP2 PCG (www.3gpp2.org)
- Member of UN Strategy Council GAID
- Member of the Future Internet Forum for Member States http://ec.europa.eu/information_society/activities/foi/lead/fif/index_en.htm
- Board member of WSA http://www.wsis-award.org/index.wbp
- Co-Founder of ETSI AFI ISG

Title

IPv6-Only based 5G Mobile Wireless Internet enabled thru SDN-NFV, IoT and Fog Computing

Abstract:

This talk will focus on exploring and elucidating all facets of the next generation of 5G “Mobile Wireless Internet of Everything” technology, business and societal gaps and challenges between the current 3G-4G-LTE access-only Internet models and the proper vision of 5G, evolutionary or revolutionary, to go beyond just access by embracing and facilitating the upfront integration of all new technologies (IOT, SDN/NFV, Cloud Computing, ..) to be user-transparent, app-oriented, service-ready, ubiquitous and lowest cost. As Internet usages are proliferating, communications networks are faced with new shortcomings. Future networks will have to support in 2020 mobile traffic volumes 1000 times larger than today and a spectrum crunch is anticipated. Wireless access rates are today significantly lower than those of fixed access, which prevents the emergence of ubiquitous low cost integrated access continuum with context independent operational characteristics. Communication networks energy consumption is growing rapidly, especially in the radio part of mobile networks. The proliferation of connected devices makes it very difficult to maintain similar performance characteristics over an ever larger portfolio of technologies and requirements (i.e.Ultra High Definition TV vs. M2M, IoT). Heterogeneity of access technologies entails unsustainable cost with increasing difficulties to integrate an ever larger set of resources with reduced OPEX. Network infrastructure openness is still limited. It prevents the emergence of integrated OTT (cloud)-network integration with predictable end to end performance characteristics, and limits the possibility for networks to become programmable infrastructures for innovation with functionalities exposed to developers' communities. This talk will be devoted to analyse the transformative impact of IPv6 on IoT and 5G and its advanced features, presenting the challenges and solutions being considered in the context of several deployment scenarios or pre-standardization around the world.

     Pr: Ann Cavoukian, Privacy and Big Data Institute, Ryerson UniversityCanada                                                                            The Essential Need to Embed Privacy – by Design, into Big Data Analytics 

Biography


- 2014 – Present, Executive Director,Privacy and Big Data Institute, Ryerson University
- 1997 – 2014 Information and Privacy Commissioner (three-terms), Ontario, Canada
- 1987 – 1997 Assistant Commissioner of Privacy, IPC

- 1985 – 1987 Director of Compliance, IPC
- 1980 – 1985 Chief of Research, Ministry of the Attorney General, Ontario, Canada

Title

The Essential Need to Embed Privacy – by Design, into Big Data Analytics

Abstract:

Dr. Cavoukian dispels the view that privacy acts as a barrier to data analytics and the innovations they can lead to. While some believe that fundamental privacy protections will be challenged by the operation of Big Data analytics, she strongly disagrees. Dr. Cavoukian argues that the limiting paradigm of win/lose “zero-sum” – that you can either have privacy or innovation, but not both – is an outdated model of approaching the question of privacy in the age of Big Data. Instead, a win/win “positive-sum” solution is needed, in which the interests of both sides may be met, in a doubly-enabling manner though Privacy by Design (PbD). PbD is predicated on the rejection of zero-sum propositions by proactively embedding privacy-protective measures into the design of IT, business practices, and networked infrastructure – baking them directly into the data architecture! Dr. Cavoukian will demonstrate that you can embed privacy into virtually any system or operation to achieve doubly-enabling, win/win outcomes, enabling Big Data and Big Privacy – not one at the expense of the other. .

    Pr: Edgar Weippl, SBA Research center for Information Security, Austria                                                                                             Research Challenges in Information Security – Engaging Students at all levels.

Biography

After graduating with a Ph.D. from the TU Wien, Edgar worked in a research startup for two years. He then spent one year teaching as an Assistant Professor at Beloit College, WI. From 2002 to 2004, while with the software vendor ISIS Papyrus, he worked as a consultant in New York, NY and Albany, NY, and in Frankfurt, Germany. In 2004 he joined the TU Wien and founded the research center SBA Research together with A Min Tjoa and Markus Klemen. Edgar R. Weippl (CISSP, CISA, CISM, CRISC, CSSLP, CMC) is member of the editorial board of Computers & Security (COSE), ), organizes the ARES conference and is General Chair of SACMAT 2015, PC Chair of Esorics 2015 and General Chair of ACM CCS 2016.

Title

Research Challenges in Information Security – Engaging Students at all levels.

Abstract:

Students can be engaged effectively by letting them re-test results of published papers in applied security research. Applied research in network security is becoming increasingly important as many large scale cloud systems and complex decentralized networked systems are used today by millions of people. Often, the systems’ characteristics cannot be observed directly, either because the operators of centralized services do not provide this information (e.g. Facebook, Amazon) or because the decentralized nature does not allow doing so (e.g. crypto protocols used on servers, Tor). In addition, software development becomes more complex as software is developed in large, globally distributed teams so that one has to operate under the assumption that within any large team there are people trying to incorporate malicious code into the code base. Up to date there is little work that provides any empirical evidence on how widespread such problems are and whether there are effective means (and which) to mitigate this risk. Research methodology in information security is evolving and many of the earlier well- known empirical research findings are hard to reproduce for two main reasons: First, the original data is not or no longer available or may have been altered. Second, research ethics have changed and some experiments are no longer an acceptable practice. In this presentation I will (1) highlight the impact of our past research in the field, (2) show how promising theoretical concepts can be explored and applied to important empirical problems, and (3) explore future research paths in the field.

    Pr: Pr Jarno Limnéll, Aalto University, Finland                                                                                                                                                        The Most Important Strategic Trends in Cybersecurity.

Biography

- Jarno Limnéll is the Professor of Cybersecurity in Finnish Aalto University. He also works as a Vice President of Cybersecurity in Insta Group plc. He has been working with security issues more than 20 years, and he has profound understanding of the global threat landscape, combined with the courage to address the most complex issues. Prof. Limnéll holds a Doctor of Military Science degree in Strategy from the National Defense University in Finland; a Master of Social Science degree from Helsinki University; and an Officer ìs degree from the National Defense University. Mr. Limnéll has published a comprehensive list of works on security issues. His most recent book is “Cybersecurity for decision makers.” Limnéll served a long career has an officer in the Finnish Defense Forces and as worked as Director of Cybersecurity in McAfee.

Title

The Most Important Strategic Trends in Cybersecurity

Abstract:

TBA

 

    Pr: Maria Teresa Restivo, Faculty of Engineering of the University of Porto, Portugal                                                                        Online experimentation: technologies, examples, and perspectives.

Biography

Maria Teresa Restivo has a degree in Solid State Physics and a PhD in Engineering Sciences. Her research and teaching activities, are accomplished within the Automation, Instrumentation and Control Group of the Mechanical Engineering Department (DEMec) of the Faculty of Engineering of the University of Porto (FEUP) and the System Integration and Process Automation Research Unit (UISPA) within the Associated Laboratory for Energy, Transports and Aeronautics (LAETA-INEGI). These activities are related with the intelligent control of laboratory/industrial systems, development of sensors also for the health area, virtual instrumentation, online experimentation, wireless sensorization, as well as the use of emerging technologies in training and in education. She is author (or co-author) of articles, book chapters and books. She has been awarded prizes in R&D areas. She has been project leader and team member at national and international levels. She has supervised a number of theses. She has four patents, one licensed and a fifth one pending. She is coordinator of the System Integration and Process Automation Research Unit within the Associated Laboratory for Energy, Transports and Aeronautics (LAETA-INEGI). She is member of the scientific boards of FEUP and DEMec. She is EC Member of the International Society for Engineering Education (IGIP) and has the International Engineering Educator (ING-PAED IGIP) qualification. She is institutional member of GOLC. She is Individual and Institutional Member of the VIT@LIS network and of the ELTF Task Force - EUNIS (European University Information Systems Organization) and of "IT in Engineering Education" and "Tools to Develop Higher Order Thinking Skills", both working groups of SPEE (Portuguese Society for Engineering Education). She is in the Executive Committee of the International Association of Online Engineering.

Title

Online experimentation: technologies, examples, and perspectives

Abstract:

Familiarizing youngsters with online experimentation is mandatory in the era of the IoT. Taking advantage of the available online experimentation resources in education and training, at all levels, provides a great opportunity. Recovering trends in experimentation and enriching in this way concept perception, can motivate youngsters and contribute to attenuate the worldwide deficit of vocations for Science and Technology, that is being felt in the last two decades and which threatens to compromising future evolution in this area. In the talk examples will be used to illustrate current technologies that can support online experimentation in education, in industrial and medical training, and in research and knowledge dissemination. The results from some resource evaluations will be analysed in order to get new insights from the examples presented.

 

    Pr: Antonio J. Jara, University of Applied Sciences Western Switzerland;                                                                                          Security challenges in IOT and internet-IPV6.

Biography

Antonio J. Jara; Assistant Prof. PostDoc at University of Applied Sciences Western Switzerland (HES-SO) from Switzerland , vice-chair of the IEEE Communications Society Internet of Things Technical Committee, and founder of the Wearable Computing and Personal Area Networks company HOP Ubiquitous S.L., He did his PhD (Cum Laude) at the Intelligent Systems and Telematics Research Group of the University of Murcia (UMU) from Spain. He received two M.S. (Hons. - valedictorian) degrees. Since 2007, he has been working on several projects related to IPv6, WSNs. and RFID applications in building automation and healthcare. He is especially focused on the design and development of new protocols for security and mobility for Future Internet of things, which was the topic of his Ph.D. Nowadays, he continues working on IPv6 technologies for the Internet of Things in projects such as IoT6, and also Big Data and Knowledge Engineering for Smart Cities and eHealth. He has also carried out a Master in Business Administration (MBA). He has published over 100 international papers, As well, he holds one patent. Finally, he participates in several Projects about the IPv6, Internet of Things, Smart Cities, and mobile healthcare.

Title

Security challenges in IOT and internet-IPV6

Abstract:

Security support for small and smart devices is one of the most important issues in the Internet of things, since technologies such as 6LoWPAN / GLoWBAL IPv6 / THREAD are enabling IPv6 for constrained devices, these emerging capabilities are opening the access to the real world through Internet. These new devices are highly constrained in terms of computational capabilities, memory, communication bandwidth, and battery power. Therefore, in order to support security, it is necessary to implement new optimized and scalable cryptographic mechanisms, which provide security, authentication, privacy and integrity to the communications. This talk covers from cryptographic primitives for Public Key Cryptography (PKC) based on Elliptic Curve Cryptography (ECC), protocols for authentication, bootstrapping and commisioning (EAP, TEPANOM and other emerging protocols), to finally new ways to do IoT computation such as edge network intelligence (fog computing).