A Ubiquity symposium is an organized debate around a proposition or point of view. It is a means to explore a complex issue from multiple perspectives. An early example of a symposium on teaching computer science appeared in Communications of the ACM (December 1989).
To organize a symposium, please read our guidelines.
New in Ubiquity Symposia:
- The Third Wave (Opening Statement) by Kemal Delic
- Discovery in the Internet of Things by Arkady Zaslavsky and Prem Prakash Jayaraman
- W3C Plans for Developing Standards for Open Markets of Services for the IoT by Dave Raggett (October 2015)
- Standards for Tomorrow by Dejan Milojicic, Paul Nikolich, and Barry Leiba (November 2015)
- A Case for Interoperable IoT Sensor Data and Meta-data Formats by Milan Milenkovic (November 2015)
- Programmable IoT: On The role of APIs in IoT by Maja Vukovic (November 2015)
- Fog Computing Distributing Data and Intelligence for Resiliency and Scale Necessary for IoT by Charles Byers and Patrick Wetterwald (November 2015)
- Evolution and Disruption in Network Processing for The Internet of Things by Lorenzo di Gregorio (December 2015)
- The Importance of Cross-Layer Considerations in a Standardized WSN Protocol Stack Aiming for IoT by Bogdan Pavkovic, Marko Batic, and Nikola Tomasevic (December 2015)
- Using Redundancy to Detect Security Anomalies Toward IoT Security Attack Detectors by Mladen A. Vouk and Roopak Venkatakrishnan (January 2016)
- Ensuring Trust and Security in the Industrial IoT by Bernardo A. Huberman (January 2016)
- On Resilience of IoT Systems by Kemal Delic (February 2016)
- IoT in Energy Efficiency by Francois Jammes (February 2016)
- IoT: Promises, Perils, Perspectives (Closing Statement) by Kemal Delic (February 2016)
Previous Ubiquity Symposia:
Ensuring Trust and Security in the Industrial IoT: The Internet of Things (Ubiquity symposium)
by Bernardo A. Huberman
Industrial Internet of Things (IOT) is a distributed network of smart sensors that enables precise control and monitoring of complex processes over arbitrary distances. The great advantage of the industrial IoT is counterbalanced by a security weakness. The insertion of a smart device capable of extracting protected data or malicious actions can infect the whole network with relative ease. Thus it becomes imperative to discover whether or not new devices have the right capabilities and compatibilities with other sensors. This article presents a zero knowledge protocol that achieves precisely that objective while keeping the sensor data private.
Using Redundancy to Detect Security Anomalies: Towards IoT security attack detectors: The Internet of Things (Ubiquity symposium)
by Roopak Venkatakrishnan, Mladen A. Vouk
January 2016Cyber-attacks and breaches are often detected too late to avoid damage. While "classical" reactive cyber defenses usually work only if we have some prior knowledge about the attack methods and ...