IEEE 7th World Forum on Internet of Things
14 June–31 July 2021 // New Orleans, Louisiana, USA

Sensors and Sensor Systems

Track Chair

Hari Chauhan Analog Devices Inc., Boston, MA USA

Hari Chauhan received a M.S. and Ph.D. degrees in Electrical Engineering from Northeastern University in 2011 and 2016, respectively. He has over 7 years of experience in designing RF/Analog and digital circuits and systems for communication and IoT application spaces. He has considerable experience in Signal Processing and Machine Learning. His primary focus is on development of low-cost sensors technologies in healthcare and biomedical domain. Currently working in the Emerging Business group at Analog Devices’ Analog Garage division in Boston, MA developing new chemical/bio sensing technologies in the consumer and industrial IoT space. As a part of emerging business team, he leads several projects in collaboration with startups to advance the product development for quick time to market.



Ilse Bohé, Belgium

Ilse is a Ph.D. student at the research group imec-DistriNet of the Department of Computer Science at the KU Leuven, Belgium. She graduated with a Master in Electronics and ICT Engineering Technology at KU Leuven Technology Campus Ghent. Currently, she is working under the supervision of Vincent Naessens. Her work focusses on the application-centric development of IoT ecosystems. Taking into account reusability, reconfigurability, maintainability, and cost-efficiency she researches the design and development of intuitive architectural support for building sustainable IoT applications. Her research is validated in various domains ranging from care environments to logistics.


Talk Title: A Crowdsensing Solution for Tracking Bicycle Path Conditions


Security and Privacy (Including Cyber-Security and Blockchains)

Date: Monday, 6 April 2020-Wednesday, 8 April 2020
Time: 8:30am-6:30pm
Room: TBA

Track Description

IoT applications and prospective solutions mandate consideration of a broad set of security and privacy requirements. The explosion in the number of connected devices poses a significant challenge, as does the diversity of end uses. This year’s World Forum will again address the component and platform implications for IoT in the context of the full life cycle for security and privacy regimes. It will also address the many security architectures and approaches that have emerged from Government organizations around the world, from the Commercial Market space, and from the Research Community. Across the wide spectrum of use cases there is a need to appropriately balance security and privacy, and it is useful to think of classifications that distinguish the levels required. As an example, these may be thought of as:

  • Highly security-centric “life-and-death” applications such as: critical infrastructure; control systems for connected automobiles, railroads, or aircraft; connected healthcare
  • Intermediate security uses that include: smart home; routine monitoring of facilities; sports and physical exercise activities that involve tracking such as geolocation
  • Casual uses such as: games, entertainment, public virtual reality applications, and aspects of social media and general information services

This year we are adding a workshop within the track delving into “TIPPSS for IoT”, a framework IEEE has been developing since a February 2016 End to End Trust and Security Workshop. TIPPSS – Trust, Identity, Privacy, Protection, Safety and Security – requirements and implications will be presented and discussed by experts from around the world in technology, research, applications of IoT, and policy. This “TIPPSS for IoT Workshop” will include presentations and panels for Clinical IoT and connected healthcare, Smart cities and transportation, Smart grid and energy systems, Technology and Policy considerations, and research in the IOT and Cyber Physical Systems security and privacy domains.

The topics which the “Security and Privacy Regimes for IoT Track” Presentations, Panels, and Working Group discussions will cover include:

  • Achieving secure compose-ability of individually secure devices and components
  • The role of the user in helping to secure their IoT components, e.g., changing default manufacturer passwords
  • The role of manufacturers to reveal claims concerning assurances concerning their products and services, e.g., cloud
  • Scalability (for massive number of devices, and as contributors to- and consumers of- big data)
  • Device-associated robustness levels that also deal with the high variations in heterogeneity (such as stationary and mobile infrastructure, smart phones and user terminals, wearables, the wide range of possible sensors and actuator types, and embedded IoT devices)
  • Device ownership and component control (accounting for interoperability, regulatory compliance, governance, audit-ability and risk management)
  • Remediation for the reigning confusion caused by the proliferation of standards and certification, and the realization that IoT will create new experiences and a vulnerability surface that is not accounted for
  • Defense in depth strategies from IP design in the chip through the devices, systems and network to the cloud, including data and device validation and interoperability,
  • Testing approaches and procedures that overcome the lack of efficacious and accepted practices — These include: interfacing with and leveraging legacy devices and services; containment against expansion of compromise to other units, systems or networks; effective crypto-agility; defense against advanced threats such as quantum-computing attacks. These also include testing approaches for the differing device lifetimes, and lifecycle support of IoT solutions such as over-the-air firmware and software upgrades

One of the objectives of the Track is to launch future actions and activities that continue beyond the World Forum as part of the IoT Initiative Working Group on “IoT Security and Privacy”.


Monday, 6 April 2020

 8:30-10:30am – S&P Session 1: IOT and Blockchain Security and Privacy
“Track Opening”, Co-chairs Florence Hudson, Founder & CEO, FDHint and Dr. Jeff Voas, NIST
Talk 1: “Managing the ‘PII in the Sky’. On Personally Identifiable Information, Blockchain and Internet of Things”, Dr. Christian Hansen, Department Chair and Professor of Statistics in the Department of Mathematics, Eastern Washington University
Talk 2: “How to Secure the Internet of Things (IoT) with Blockchain”, Dr. Xinxin Fan, Head of Cryptography, IoTeX
Talk 3: “IoT Cybersecurity and Blockchain Technology for Energy Applications: Where we are and what are the issues”, Dr. Sri Nikhil Gupta, Grid cybersecurity research engineer, Pacific Northwest National Laboratory
Panel Discussion: Jeff Voas moderates interactive panel of Session 1 presenters

10:30am-11:00am – Networking Break

11:00am-1:00pm – Plenary Session

1:00pm-2:00pm – Lunch

2:00pm-4:00pm – S&P Session 2: TIPPSS for Connected Healthcare and Clinical IoT
Talk 4: “Industrial IoT and Smart Cities – what can we learn from them to improve Healthcare IoT?”, Mitch Parker, CISO, IUHealth
Talk 5: “IoMT Security and Compliance: The Ramifications of Unmanaged Assets in the Healthcare Environment”, Cory Brennan, Security Advisor, Hall Render IT Advisory Services and  Emily Dillon, Information Security Consultant, CynergisTek, Inc
Talk 6: “How do you create an Internet of Things Workforce?”, Dr. Joanna DeFranco, Associate Professor of Software Engineering, Pennsylvania State University
Panel Discussion: Florence Hudson moderates interactive panel of Session 2 presenters

4:00pm-4:30pm – Networking Break

4:30pm-6:30pm – S&P Session 3: TIPPSS for Connected Healthcare and Smart Cities
Talk 7: “Blockchain for Healthcare: Opportunities, Challenges and Roadmap to the Future”, Dr. Mohamad Kassab, Associate research professor in Software Engineering, Pennsylvania State University
Talk 8: “Culture Clues for TIPSS for IoT and Mobile Computing in Medicine”, Sherri Douville, CEO, Medigram
Talk 9: Talk 12 “Privacy and security implications of smart cities in developing countries”, Dr. Nir Kshetri, Professor at University of North Carolina-Greensboro and Research Fellow at Kobe University
Panel Discussion: Florence Hudson moderates interactive panel of Session 3 presenters

Tuesday, 7 April 2020

8:30am-10:30am – S&P Session 4: TIPPSS for IOT and Smart Cities
Talk 1: “A Security Assessment Framework to Understand the Internet of Things (IoT) Threat Landscape for Military Smart Bases“, Dr. Zulema Caldwell, Senior Engineer, US DOD and Adjunct Associate Professor at University of Maryland
Talk 2: “Enabling Artificial Intelligence through Next-Gen Electronic Packaging Technologies”, Dr. Preeti Chauhan, Technical Program Manager in Data Center Systems Quality, Google
Talk 3: “Supporting accountability in the Internet of Things”, Dr. Jat Singh, Computer Science & Technology Department, University of Cambridge
Panel Discussion: Jeff Voas moderates interactive panel of Session 4 presenters

10:30am-11:00am – Networking Break

11:00am-1:00pm – Plenary Session

1:00pm-2:00pm – Lunch

2:00pm-4:00pm – S&P Session 5: TIPPSS for Smart Cities and Transportation
Talk 4: “Security and Compliance for IoT in the Built Environment “, Dr. Trevor Pering, systems software engineer, Google
Talk 5: “Can my charging station trust your EV? Exploring security problems & solutions to improve trusted vehicle to infrastructure communications”, Dr. Raju Gottumukkala, Assistant Professor Mechanical Engineering, University of Louisiana at Lafayette
Talk 6: “An IoT Perspective of Understanding the Boeing 737 MAX Crashes”, Dr. Zhaojun Steven Li, Associate Professor Department of Industrial Engineering & Engineering Management, Western New England University
Panel Discussion: Jeff Voas moderates interactive panel of Session 5 presenters

4:00pm-4:30pmNetworking Break

4:30pm-6:30pm – S&P Session 6: Technology and Policy TIPPSS for IoT
Talk 7: “Your Critical Role in the World of Compliance”, Hon. Cynthia Mares, District Court Judge, Colorado
Talk 8: “Hey Siri and Alexa – How on Earth (or, for that matter, in Outer Space) Can I Determine What Data Protection and Privacy Laws Apply and How to Comply?”, Martin Zoltick. Esq., Rothwell, Figg, Ernst & Manbeck, P.C.
Talk 9: “Keeping up with the Jetson’s—The Future of Personal Data and Data Privacy”, Jenny Colgate, Esq., Rothwell, Figg, Ernst & Manbeck, P.C.
Panel Discussion: Florence Hudson moderates interactive panel of Session 6 presenters

Wednesday, 8 April 2020

8:30am-10:30am – S&P Session 7: Emerging IOT/CPS and Blockchain Security solutions
Talk 2: “Authentication using Synchronization:  IoT Security Solutions Based on Zero-Power Timekeeping”, Dr. Shantanu Chakrabartty, Professor, Washington University in St. Louis
Talk 2: “Cybersecurity for IOT Supply Chains: Comparison of Emerging Types of Solutions”, Celia Paulsen, Cybersecurity Researcher, NIST
Talk 3: “Rethinking Distributed Ledger Technology”, Rick Kuhn, Computer Scientist, NIST
Panel Discussion: Florence Hudson moderates interactive panel of Session 7 presenters

10:30am-11:00am – Networking Break

11:00am-1:00pm – Plenary Session

1:00pm-2:00pm – Lunch

2:00pm-4:00pm – S&P Session 8: IOT security, privacy and accessibility in Smart Cities
Talk 4: “IoT Accessibility, Security, and Opportunity for Inclusiveness”, Dr. Kit August, Research, Stevens Institute of Technology
Talk 5: “Combinatorial Methods for Explainability in Autonomous Systems”, Rick Kuhn, Computer Scientist, NIST
Talk 6: “Trustworthiness: Understanding and Solving Challenges of Digital IT/OT Transformation”, Marcellus Buchheit, President & CEO of Wibu-Systms USA Inc. and Co-Founder, Wibu-Systems AG
Panel Discussion: Dr. Jeff Voas moderates interactive panel of Session 8 presenters

4:00pm-4:30pm – Networking Break

4:30pm-6:30pm – S&P Session 9: IoT Security

  • Talk 7: “Mitigating IoT Risks by Securing Software in Network Connectable Devices”, Joe Jarzombek, Director for Government & Critical Infrastructure Programs, Synopsys, Inc
  • Talk 8: “IoT Vulnerabilities via NIST Bugs Framework”, Dr. Irena Bojanova, Computer Scientist, NIST
  • Talk 9: “IoT in the Security Industry”, John Viega, Co-founder and CEO, Capsule8
  • Panel Discussion: Dr. Jeff Voas moderates interactive panel of Session 9 presenters

Track Co-Chairs

Florence DiStefano Hudson FDHint LLC, New York USA

Florence D. Hudson is Founder & CEO of FDHint, LLC, consulting in advanced technologies, diversity and inclusion. Her expertise includes technical and business leadership, artificial intelligence, big data and analytics, Internet of Things (IoT), smart campus and cities, cybersecurity, connected healthcare, clinical IoT, blockchain, partnerships, ecosystems, innovation, strategic growth, business development, change management, marketing, diversity & inclusion. Formerly an IBM Vice President and Chief Technology Officer, Internet2 Senior Vice President and Chief Innovation Officer, and an aerospace engineer at Grumman and NASA, she is Special Advisor for TrustedCI – the NSF Cybersecurity Center of Excellence at Indiana University, and Northeast Big Data Innovation Hub at Columbia University. She is Chair of the IEEE-Standards Association working group (P2733) for Clinical Internet of Things (IOT) Data and Device Interoperability with TIPPSS – Trust, Identity, Privacy, Protection, Safety, and Security, and is a co-leader of the IEEE-Standards Association workstream on blockchain for clinical trials. Widely published, she is author of multiple articles and chapters including an article in the Huffington Post on Smart Buildings, articles in IEEE magazines on wearables and medical interoperability, and enabling trust and security for the Internet of Things, and book chapters on IoT and cognitive computing, as well as smart cities. She is Editor in Chief for the book “Women Securing the Future with TIPPSS for IOT” written by 17 women. She did a TEDx talk on energy and the environment, for sustainability on a smarter planet. She serves on advisory boards for Princeton, Cal Poly, and Stony Brook Universities, the open peer-reviewed journal Blockchain in Healthcare Today, and the IEEE Engineering in Medicine and Biology Standards Committee (EMB-SC). She graduated from Princeton University with a BSE in Mechanical and Aerospace Engineering, and attended executive education at Harvard Business School and Columbia University.

Jeffrey Voas NIST, Gaithersburg, MD USA

Jeffrey Voas is an author and innovator. He is currently a computer scientist at the US National Institute of Standards and Technology (NIST) in Gaithersburg, MD. Before joining NIST in 2009, Voas was an entrepreneur and co-founded Cigital that is now a part of Synopsys (Nasdaq: SNPS). He has served as the IEEE Reliability Society President (2003-2005, 2009-2010, 2017-2018), and served as an IEEE Director (2011-2012). Voas co-authored two John Wiley books (Software Assessment: Reliability, Safety, and Testability [1995] and Software Fault Injection: Inoculating Software Against Errors [1998], is on the editorial board of IEEE Computer Magazine, and was on the Editorial Advisory Board of IEEE Spectrum Magazine.  Voas will be the Editor-in-Chief of IEEE Computer starting in 2020. Voas received his undergraduate degree in computer engineering from Tulane University (1985) and received his M.S. and Ph.D. in computer science from the College of William and Mary (1986, 1990 respectively).   Voas is a Fellow of the IEEE, member of IEEE Eta-Kappa Nu (IEEE Honor Society), Fellow of the Institution of Engineering and Technology (IET), Fellow of the American Association for the Advancement of Science (AAAS), and Life Member of the Washington Academy of Sciences. Voas’s current research interests include Internet of Things (IoT), Blockchain, verified time and timestamping using atomic clocks. Voas received the Gold Medal from the US Department of Commerce in 2014.

Track Speakers

Shantanu Chakrabartty, Washington University in St, USA

Shantanu Chakrabartty is a Clifford Murphy professor in the Mckelvey School of Engineering at Washington University in St. Louis. His research covers different aspects of analog computing, and in particular, self-powered and energy-efficient computing systems. Dr. Chakrabartty is a recipient of National Science Foundation’s CAREER award, University Teacher-Scholar Award from Michigan State University and the 2012 Technology of the Year Award from MSU Technologies. Dr. Chakrabartty is a senior member of the IEEE with over 170 journal and conference publications along with twelve issued and pending US patents. He has served on the editorial board for the IEEE Transactions of Biomedical Circuits and Systems and the Frontiers of Neuromorphic Engineering journal. Dr. Chakrabartty holds a Ph.D. from The Johns Hopkins University and previously he has held academic appointments at Michigan State University where he co-founded a startup to commercialize self-powered infrastructural monitoring technologies.

Talk Title: Authentication using Synchronization:  IoT Security Solutions Based on Zero-Power Timekeeping 

Abstract: For low-resource internet-of-things (IoTs) like wearables, health-monitors, tags and sensors, existing authentication techniques (using encryption, strong hash functions and pseudorandom number generators) might be impractical for securing access to critical data. This is because these IoT platforms have limited computational bandwidth; limited availability of energy; and require real-time authentication. On the other hand, static identifiers like bar-codes, product IDs, embedded physical unclonable functions (PUFs) or stored private keys are vulnerable to theft, counterfeiting, replay attacks or tampering. In this talk I will present a hardware-software approach that could be used for a SecureID-type dynamic authentication on low-resource IoTs. The approach uses a quantum-based zero-power timer technology for time-keeping and for distributed synchronization without the need for any external powering (using batteries or energy-scavenging). Rapid trust verification and authentication is achieved by comparing the synchronized tokens generated by the IoT and a remote server. In the absence of any external powering, the dynamic tokens are secure against any power side-channel attacks, snooping and tampering. The hardware-software infrastructure also supports mutual authentication, where the IoT device could also query and verify the trust of its reader. In addition to using the zero- power timer technology for designing ultra-secure root-of-trust, I will also highlight some unique extensions of the technology for generating dynamic signatures that could be used for tracking and authenticating product supply-chain.

Jenny Colgate, Rothwell, Figg, Ernst and Manbeck, USA

Jenny Colgate is a partner at Rothwell, Figg, Ernst and Manbeck in Washington, DC.  She is an experienced litigator, including contract and licensing matters, counselling, and opinion work. Ms. Colgate’s practice covers a broad range of diverse technologies, including high technology (e.g., LEDs and mobile phones), software and hardware (including open source issues), finance/fintech, media/publishing, medical device, chemical coatings, machinery, and consumer products.

Ms. Colgate was named a Washington DC Super Lawyer “Rising Star” for IP litigation seven years in a row from 2013 through 2019.

Ms. Colgate was a summa cum laude graduate of the University of Pennsylvania, where she graduated with honors in Communications, completing her thesis in the area of children’s cognitive abilities to distinguish online advertisements from web site content.  While in college, Ms. Colgate captained the University of Pennsylvania equestrian team, and she competed in equestrian at the national level.
Ms. Colgate received her J.D. and LLM (in intellectual property, commerce and technology) from Franklin Pierce Law Center (now the University of New Hampshire).  She graduated magna cum laude.  While in law school, Ms. Colgate was a teaching assistant of Constitutional Law, Legal Writing, and Torts; an editor of IDEA, the Intellectual Property Law Review; and in 2004, Ms. Colgate was a judicial intern for the Honorable Arthur J. Gajarsa of the U.S. Court of Appeals for the Federal Circuit.  Ms. Colgate wrote a book on her law school experience, which was published in 2006.

Talk Title: Keeping up with the Jetson’s—The Future of Personal Data and Data Privacy

 Abstract: Technology is developing much faster than the laws and policies surrounding data privacy and cybersecurity.  As a result, it is important for the people conducting business in this ever-changing environment to keep in regular communication with law and policy-makers.  In this session, we will explore the future together – a future where the IoT is constantly recording individuals’ emotions, wellbeing, and actions through security systems, appliances, wearables, and cars.  In this world, your devices know everything about you – whether you are happy or sad, healthy or sick, have indigestion, are stressed, tired, energetic, hungry, etc.  And they do not all have GUIs to interact with.  It’s not always possible to “click a button” saying “do not share my personal information.”  Also, in this world data is processed in and transmitted via outer space.  And even if your company is not processing data in outer space, your vendors likely are.  Meanwhile, the legal regime is likely not that different than it is today.  Privacy and cybersecurity laws are still regulated by nation states.  There is no international treaty on data privacy and cybersecurity.  The laws of outer space remain focused on space exploration, and not commercialization.  “Cross-border” data transfers ignore that data can be transmitted outside of nation states.  And CCPA continues to require a “do not sell my personal information” button, even though interfaces are no longer graphical.

Mitchell Parker, IU Health

Mitchell Parker, MBA, CISSP, is the CISO, at IU Health. Mitch has eleven years’ experience in this role, having established effective organization-wide programs at multiple organizations. He is responsible for providing policy and governance oversight and research, third-party vendor guidance, proactive vulnerability research and threat modeling services, payment card and financial systems security, and security research to IU Health and IU School of Medicine. In this role, Mitch collaborates across the organization and with multiple third parties to improve the people, processes, and technologies used to facilitate security and privacy for the benefit of IU Health’s patients and team members.
He also publishes in multiple publications, including CSO Magazine, Healthcare IT News,, Security Current, Healthcare Scene, and HIMSS’ blog. He also has contributed a chapter for an upcoming Cybersecurity in Healthcare textbook, an essay to Voices of Innovation, which was published in March 2019 by HIMSS, and has a chapter in an upcoming book on Healthcare Cybersecurity for the American Bar Association’s Health Law section. Mitch has also been quoted in numerous publications, including the Wall Street Journal, ISMG, HealthITSecurity, and Becker’s Hospital Review.
Mitch is also a co-vice chair of the IEEE P2733 working group, Trust, Integrity, Privacy, Protection, Safety, and Security of the Internet of Things (IoT), and a co-subgroup chair of the P2418.6, Blockchain in Healthcare and Life Sciences Cybersecurity and IoT subgroups. Mitch also participates in other IEEE working groups related to security of the Internet of Things and collaborates with researchers and professionals worldwide on establishing and understanding standards for cybersecurity.

Talk Title: Industrial IoT and Smart Cities – what can we learn from them to improve Healthcare IoT?

Abstract: As healthcare both deals with an epidemic of ransomware and with the changing landscape from inpatient to outpatient, technology needs to adapt to serve the needs of and protect patients.  Ransomware means that organizations need more than ever to take steps to safeguard and protect not only their assets, but how they are managed and protected from insiders and outsiders.  It’s not enough to claim that a device is going to be only used internally, and therefore does not need the same security controls that a router or industrial IoT device requires.

Additionally, the center of patient treatment is moving from the hospital to the home.  This is driven by cost and the need to monitor for compliance to improve health.  This means that the devices utilized to monitor patients in an inpatient setting are operating in a hostile environment.

Organizations such as Johns Hopkins have set up capacity command centers to monitor patient safety, experience, volume, and movement.  These command centers draw upon experience from power, utilities, and aviation.  They utilize simulation modeling of workflows and processes with a focus on improvement.

Smart Cities and Industrial IoT have these command centers at their core to help monitor and triage issues from the thousands of sensors that blanket factories and cities.

What we will discuss are recommendations to expand Hospital Capacity Command Centers to also include Security Operations, Remote Device Management, and Device Monitoring.  As we shift from the inpatient to outpatient world, and with the focus on device security, we’ll go over how to augment the command center.

The recommendations we will make to augment them are to isolate command center networks, monitor device health and security, include Security Operations and Clinical Engineering on the Command Center staff, utilize simulation modeling of workflows for medical device management, including security updates and patches, loss of connectivity, and alarm situations, and utilize well-defined security requirements as part of the device purchasing and management process (such as IU Health’s).

We will go over how important process and simulation modeling is to an effective command center, and how this important concept learned from Industrial IoT and Smart Cities can be expanded to evolve to meet the needs of health systems as their focus changes.

Zulema Belyeu Caldwell

Zulema Caldwell graduated with a B.S. in Electrical Engineering from Texas A&M University and a M.S. in Electrical Engineering from the University of Maryland at College Park. She completed her Ph.D. in Information Technology with a specialization in Computer Information Security at Capella University. Zulema has a wealth of experience as a researcher, engineer, and software developer. She was the former owner and lead technical partner for a defense contracting company, which served multiple DoD agencies. Zulema has served as a technical director for several organizations within the Department of Defense, and she has also served as a program manager responsible for the budget and resources of multi-tiered national security projects. She is currently a technical director specializing in cyber security solutions for critical infrastructure, industrial control systems, and industrial Internet of Things (IIoT) devices.  Zulema has performed research for several projects focused on energy disaggregation, machine learning anomaly detection, and security event management for industrial control systems. She is a certified computer information security specialist (CISSP), and she has served as an instructor at several higher learning institutions. She taught computer science courses at Anne Arundel Community College, and she is currently an adjunct faculty member teaching graduate level information assurance and cyber security courses at University of Maryland Global Campus, where she focuses on research for understanding the threat landscape, conducting security assessments, and identifying control measures or mitigations for a variety of information systems, including financial information systems, electronic health records management systems, telecommunications, and industrial control systems. Zulema is also a founding member of the University of Maryland Clark School Women in Engineering Advisory Board, and she devotes a significant amount of time supporting STEM programs at local elementary schools and serving as a mentor for high school and college students.

Talk Title: A Security Assessment Framework to Understand the Internet of Things (IoT) Threat Landscape for Military Smart Bases

Abstract: The number of interconnected devices has exploded and continues to grow at a steady pace.  The International Data Corporation (IDC) estimates that there will be 41.6 billion connected Internet of Things (IoT) devices generating over 79 zettabytes (ZB) of data by 2025.  As the market continues to develop and mature, IoT will be a major part of the infrastructure that enables the exchange of information between machines, people, and processes.  In addition, IoT will pay a major role in smart city implementations for public safety and infrastructure monitoring.  Military installations, which function as small cities, have also begun preparing for a new way of operating through the implementation of IoT solutions for a variety of critical domains, including energy and utilities, transportation, military personnel engagement, infrastructure, safety, and security.  The Department of Defense has selected four bases as the first military installations to start testing and experimenting with 5G technology to support IoT integration for military smart bases.  Smart bases will, undoubtedly, enhance base operations, help to conserve limited resources, and identify new and creative ways to drive the mission through IoT and interconnected sensors.  However, there are numerous security threat vectors associated with IoT implementations, and the risk can be a major factor for national security, especially when it comes to military installations.  This presentation will initiate the discussion and demonstrate the need for a security assessment framework to evaluate the security posture of military smart bases, to identify the security challenges and provide an overview of the IoT threat landscape, as well as to identify effective countermeasures for base security and resiliency.

Rick Kuhn

Rick Kuhn is a computer scientist in the computer security division of the National Institute of Standards and Technology, and is a Fellow of the Institute of Electrical and Electronics Engineers (IEEE). He has authored three books and more than 150 papers on information security, empirical studies of software failure, and combinatorial methods in software testing.  He previously served as program manager for the Committee on Applications and Technology of the President’s Information Infrastructure Task Force (1994-1995), and as manager of the Software Quality Group at NIST. Before joining NIST, he worked as a software developer with NCR Corporation and the Johns Hopkins University Applied Physics Laboratory. He received an MS in computer science from the University of Maryland College Park and an MBA from William & Mary.

Talk Title: Combinatorial Methods for Explainability in Autonomous Systems

Abstract: IoT is closely associated with autonomous systems, which often require extensive networks of sensors, decision nodes, and other components.  Because a human must ultimately take responsibility for autonomous system decisions and actions, explainability is essential, but existing methods leave much to be desired.

The central problem for explainability, according to DARPA, is to provide sufficient justification for a conclusion such that users know why a conclusion was reached, or why not, and to allow the user to know when an algorithm will succeed or fail, and when it can be trusted. Many conventional approaches leave users wondering what inputs led to a particular conclusion.  More than curiosity is involved, as many autonomous system applications may be security and safety critical, and accuracy rates that are high enough for some applications are inadequate when safety, security, and lives are at risk. For example, analysis within the aerospace industry concludes that the “artificial intelligence (AI) technology that has made spectacular progress in the consumer world is thus far unsuited to air transport safety standards”, and explainability will be essential for certification by regulatory authorities. Ideally, an AI algorithm should be able to explain its conclusion in a manner similar to a human expert, so that other human experts can have confidence in a conclusion, or spot a flaw in the reasoning.  This is a significant challenge for methods such as neural nets.

This presentation introduces an approach to producing explanations or justifications of decisions made by artificial intelligence and machine learning (AI/ML) systems, using methods derived from those for fault location in combinatorial testing. We use a conceptually simple scheme to make it easy to justify classifications or decisions: identifying combinations of features that are present in members of the identified class and absent or rare in non-members. The method has been implemented in a prototype tool, and examples of its application to IoT problems are given.

2nd Talk Title: Rethinking Distributed Ledger Technology

The blockchain data structure was designed to solve the problem of double-spending in digital currency.  Blockchain’s desirable properties have made it attractive for distributed system applications other than cryptocurrency, but many of its features are very difficult to use for conventional applications.  As a result, much current research on blockchain is devoted to getting around its built-in properties.   This talk will present a different approach and data structure that provides useful features of blockchain, while making distributed ledger a more practical component for a broad range of distributed system applications.

Christian K. Hansen

Dr. Christian K. Hansen served as President of the IEEE Reliability Society (2014-2016) and is currently Department Chair and Professor of Statistics in the Department of Mathematics, Eastern Washington University (EWU). He is been a faculty member at EWU since 1993 and served in a variety of academic and administrative leadership positions. He has been active in the statistics and reliability engineering profession for over 30 years and published broadly on a variety of applications involving data derived from engineering systems. Over the past two decades, he has been active with the IEEE Reliability Society and has served in leadership positions that include vice-president of publications and treasurer before being elected to president in 2013. Dr. Hansen is a graduate of the Technical University of Denmark with degrees in Electrical Engineering (MS, 1988) and Statistics (PhD, 1991).

Talk Title: Managing the “PII in the Sky”. On Personally Identifiable Information, Blockchain and Internet of Things.

Abstract: Over the last few decades there has been a growing interest in protecting the security and privacy of personally identifiable information (PII), and new legislation has been passed by various governments with the intent of legally enforcing the protection of such sensitive data. With the deployment of the Internet of Things (IoT) massive volumes of “big data” are being collected continuously and stored on the cloud, and the issue of protecting the “PII in the sky” is becoming increasingly challenging. While IoT has given rise to endless opportunities for collection and sharing of data, Blockchain technologies have been successfully used to secure the authenticity of data and transactions involving the exchange of sensitive data. In this presentation we review some historical trends and challenges related to the evolution of data collection and storage and we discuss areas that will likely require the most attention over the next decades.

Xinxin Fan

Dr. Xinxin Fan is the Head of Cryptography at IoTeX, a startup focusing on building the next-generation, auto-scalable, and privacy-centric blockchain infrastructure for the Internet of Trusted Things (IoTT). He is responsible for directing the company’s strategy and product roadmaps as well as developing the core technologies and IP portfolio. Before joining IoTeX, he was a senior research scientist of Security and Privacy Group at Bosch Research Technology Center North America, where he defined and conducted innovative research on security and privacy for Internet of Things, machine-to-machine communication, cloud computing and data mining. Dr. Xinxin Fan received his Ph.D. in Electrical and Computer Engineering from the University of Waterloo in 2010. He has published 50+ referred research papers in top-tired journals, conferences and workshops in the areas of cryptography and information security and is an inventor of 15 patent filings for innovative information security and privacy-enhancing technologies. He is also a Certified Information Systems Security Professional (CISSP) from (ISC)².

Talk Title: How to Secure the Internet of Things (IoT) with Blockchain

Abstract: Internet of Things (IoT) and blockchain are two technologies that are gaining popularity since their creation. While the IoT is transforming business processes and consumer behaviors, blockchain promises a number of salient features, such as decentralization, immutability, transparency, etc., which have great potential for tackling the security challenges faced by the IoT systems. This presentation will first talk about the IoT security challenges and the key features provided by blockchain, followed by the description of the blockchain reference architecture ( developed by Trusted IoT Alliance (TIoTA). With the reference architecture in place, the focus will shift to integration of blockchain technologies into the IoT data lifecycle and discuss how to enhance its security with blockchain. The presentation will wrap up by identifying some research challenges when merging the IoT and blockchain.

Mohamad Kassab

Dr. Kassab is an associate research professor in Software Engineering at Pennsylvania State University, earned his Ph.D. and M.S. degrees in Software Engineering from Concordia University in Montreal, Canada, B.S. in Computer Science from University of Windsor and B.Eng. in Computer Engineering from the Lebanese American University. Previously, Dr. Kassab has been postdoctoral researcher at ÉTS School of Advanced Technology in Montreal and visiting scholar at Carnegie Mellon University. Kassab’s research interests include requirements engineering, system architecture, software quality and measurements, blockchain and The Internet of Things. He has published extensively in software engineering books and journals. With more than 18 years of industrial experiences, he worked in different industrial roles among which: Business Unit Manager at Soramitsu, Senior Quality Engineer at SAP, Senior Associate at Morgan Stanley, Senior Quality Assurance Specialist at NOKIA and Senior Software Developer at Positron Safety Systems.

Talk Title: Blockchain for Healthcare: Opportunities, Challenges and Roadmap to the Future.

Abstract: Blockchain technology has enjoyed substantial deliberation in recent years from the financial/banking disciplines. The technology of blockchain attracted considerable attention due to the possibility of recording all financial transactions in a secure and verifiable decentralized (peer-to-peer) fashion, without the rule from a third party to process transactions, which are then combined into blocks where each block contains a timestamp and is linked to its precedent. Once recorded, data cannot be altered, and the transactions history is combined into a chain structure without the possibility of additional branches of alternative transactions emerging or wedging into the middle of a chain. While the focus of applications of blockchain in practice has been to build distributed ledgers involving virtual tokens, the impetus of this emerging technology has now extended to the medical domain.  With the increased popularity, it is crucial to study how this technology accompanied with a system for smart contracts can support and challenge the healthcare domain for all interrelated actors (patients, physicians, insurance companies, regulators) and involved assets (e.g. patients’ data, physician’s data, equipment’s and drug’s supply chain, etc.). There are both advantages and disadvantages to centralized (traditional database management systems) vs decentralized data architectures. This will presentation will : (i) report the results of a systematic literature review conducted to identify, extract, evaluate and synthesize the studies on the symbiosis of blockchain in healthcare; (ii) summarize and categorize existing benefits/challenges on incorporating blockchain in healthcare domain; (iii) provide a framework that will facilitate new research activities; and (iv) establish the state of evidence with in-depth assessment.

Katherine Grace August

Katherine Grace August, PhD (Kit) – Stevens Institute of Technology – Research Guest – ECE Intelligent Networks, IEEE NJ Coast Section Volunteer PACE SIGHT Group Chair, History Chair, AP-VT-EMC Vice Chair, Whitaker Scholar 2009-2012, PhD Biomedical Engineering, NJIT, MSCS-MIS Marist College, BFA Communications Design Parsons The New School for Design. Current research projects involve humanitarian activities following the United Nations Sustainable Development Goals: quality education, gender equality, reduced inequalities, peace, justice, and strong institutions. Projects focus on collaborations and employing technology to reduce inequity for those with hearing loss, and promoting improved opportunity for women and girls through inventing. Research experience in neurorehabilitation with robots, haptics, and virtual reality, functional brain imaging, signal processing, wireless, systems engineering, and the like. Former Bell Labs MTS New Service Concepts Systems Engineering 1991 – 2002.  18 United States Patents; 50 International Patents.  ‘Hear, here!’ Do Good Robotics Startup Competition Finalist University of Maryland, 2019; ‘Justice for All’ Event May – June 2019; ‘Do Good Things, Justice for All,’ IEEE SIGHT Project Funding 2019 – 2020, an experiential learning system in augmented reality to improve understanding of hearing loss, accommodation, disparities, and the Americans with Disabilities Act.  Google Scholar:  LinkedIn:  Team Blog:  IEEE NJ Coast Section History Wiki:

Talk Title: IoT Accessibility, Security, and Opportunity for Inclusiveness

Abstract: IoT with powerful computing, flexible connectivity, vast sources of data and information, and billions of connected devices, promises to deliver transformational experiences to people globally. IoT Accessibility holds great potential to promote inclusiveness and reduce disparity consistent with United Nations Sustainable Development Goals (UN SDGs) through various means including connected hearing assistance and smart environments. One third of people over age 65 have hearing loss; five percent of the population of the world or 360 million people have disabling hearing loss while the majority live in developing countries. The world’s production of hearing aid devices only meets about 10% of the need. IoT Accessibility with appropriate Security features can make a significant difference through lower cost connected devices with capabilities to learn and improve solutions available thus serving a wider population with a variety of needs in many settings.

IoT Accessibility can also play a role in acoustic scene analysis, in selecting algorithms for speech, preferences, and noise processing. Hearing is a psychoacoustic experience subject to human senses, the acoustic scene, and language processing style creating a unique requirement for user selection of features that work best for speech understanding, the main goal of hearing assistance. Currently, accommodation technology solutions are standalone, expensive, developed in silos, complicated with proprietary interfaces, and are not interoperable with mainstream communication technologies while research rarely advances products. In addition, solutions often do not overcome obstacles of hearing loss, such as recognizing a person’s identity through voice, hearing an ambulance or police siren, a carbon monoxide or fire alarm, or a baby cry. As a result, people with hearing loss are at risk in various ways and existing solutions rarely address such risks of Trust, Identity, Privacy, Safety, and Security.

With the proliferation of low cost connected devices, IoT Accessibility holds potential for rapidly evolving features and solutions that were previously impractical, with data for cloud learning, individual preferences, and can accommodate distributed Security solutions for those with hearing loss. IoT Accessibility can monitor the acoustic scene for important cues not perceptible to those with hearing loss, representing the scene by alternative means, integrated with the smart environment, when noise reduction algorithms are in use, or when the person has removed the hearing aid for sleep.  IoT Accessibility and Security can bridge the gap of information otherwise provided by our human senses which inform our experiences and decisions.

IoT Accessibility in smart environments can improve Trust pinpointing Accessibility needs and resources without the individual having to announce their hearing loss status. While hearing individuals can rely on recognizing the voice or speech pattern of another individual, or cues of emotion or truthfulness, a person with hearing loss cannot, placing them at risk for fraud. IoT Accessibility can confirm Identity of the individuals communicating, employing a distributed approach for example, Blockchain to improve Security and inclusiveness for all.

Sherri Douville

Medigram’s mission is to eradicate the leading cause of preventable death, which is a delay ininformation, while at the same time improving health care systems’ finances through workflowre-engineering and improved communications between health care providers. In her role as CEOand Board Member, Sherri’s focus has been on leading and inspiring a world-class team andecosystem to execute on this mission, including technology, legal, healthcare administration,
physician, and business executives. Sherri has been published and quoted 15 times in the last two  years in healthcare industry and IT media such as, Becker’s Hospital Review, and She has contributed to a book about managing data breaches and iscurrently working on a number of chapters and books, one as editor, on the subjects of mobilecomputing in medicine, mobile security in healthcare, security in IoT, privacy law in medicine, andprinciples for ethics and trust for the application of IoT and data in medicine. Sherri is passionateabout coaching and developing leaders at Medigram. She has 15 years of experience in executivemanagement, product development, sales and marketing including with Johnson & Johnson, andas a product development and business consultant in the medical market. She has aBiophysics degree and has completed three certificates in electrical engineering, analytics, ML,and computer science through MIT. Sherri is also a member of the MIT Technology Review GlobalPanel and has served on the board of the NorCal HIMSS. Sherri is also thrilled to be part of theworking group for the IEEE P2733 Standard for Clinical Internet of Things (IoT) Data and DeviceInteroperability with TIPPSS (Trust, Identity, Privacy, Protection, Safety, Security) principles.Sherri also advises Health IT, Medical Informatics, and genetics startup companies. Sherri and herhusband, Dr. Art Douville volunteer together with a variety of non-profits including the Board ofFellows for Santa Clara University.

Talk Title: Culture Clues for TIPSS for IoT and Mobile Computing in Medicine

Abstract: Mobilizing data, devices and people to support medical practice is both a technical challenge of multiple disciplines as well as a resulting culture challenge. Physicians frequently face the worst combination of conditions for mobile computing contributing to bad connectivity, slow data, and bad application performance when working from mobile devices. Cultural challenges also hinder the collaboration required for digital transformation with IoT. The best use of IoT in HealthCare is the seamless convergence and interpretation of all available data from an IoT ecosystem. However, many dominant data standards do not adequately support the computational physics of mobile computing in the hospital and clinic settings. These are some of the reasons why physicians have actively adopted so few mobile and IoT apps. The
technical challenges span the uncoordinated reality of multiple industries including but not limited to mobile network, smartphone, chip, and wireless networking. These multi sector challenges require an unprecedented level of multidisciplinary collaboration at every level across organizations. In addition, complying with the California Consumer Privacy Act will force all technical teams to incorporate and execute on security knowledge of networking, hardware, and software. IoT devices and applications will have to become secure by design. In this session, Ms. Douville will review how to think about the industries converging into mobile computing and IoT in medicine. She will also cover some of the leading culture practices to drive the crossfunctional collaboration required for this new reality. This session will include ways to explain key parts of the new CCPA law to engineers, as well as how to explain necessary technical details to other stakeholders, such as lawyers and clinicians.

Martin M. Zoltick

Martin M. Zoltick is a shareholder with Rothwell, Figg, Ernst & Manbeck, P.C. in Washington, DC. He has been practicing in the field of technology law for more than 30 years.  His practice is focused primarily on IP matters, transactions, and privacy, data protection, and cybersecurity.  Mr. Zoltick is a Certified Information Privacy Professional in the United States (CIPP/US) and works with his clients to help them understand and navigate the rapidly evolving area of privacy and data protection law. He is working with clients to prepare, integrate, and implement best practices for CCPA, other state’s laws, and GDPR compliance. With his technical background and expertise, he is uniquely positioned to work with IT and technical teams to understand potential exposure and minimize the risks of a breach. Mr. Zoltick is currently providing thought leadership on the application of data protection laws and industry/technology-specific data privacy and security considerations for IoT devices, biometric data, and in outer space

Mr. Zoltick is a registered patent attorney, and a substantial part of his practice involves drafting and prosecuting patent applications and, along with that, developing with his clients IP strategic plans designed to maximize value and satisfy both legal and business objectives. Mr. Zoltick also has significant experience handling contested cases and disputes on behalf of his clients. He regularly serves as trial counsel in major patent disputes in the U.S. federal district courts and as lead counsel in post-grant proceedings before the U.S. Patent and Trademark Office Patent Trial and Appeal Board.

Mr. Zoltick represents a wide range of U.S.-based and international clients, including independent inventors, entrepreneurs, emerging businesses, middle market and mature companies, as well as investors and venture capitalists.

Talk Title: “Hey Siri and Alexa” – How on Earth (or, for that matter, in Outer Space) Can I Determine What Data Protection and Privacy Laws Apply and How to Comply?

Abstract: New laws are taking effect across the globe to regulate the collection, use, and protection of personal information.  At the same time, the rate of cyber attacks, data breaches and unauthorized use of personal data is growing exponentially. The massive proliferation of IoT devices and technology, now expanded even further to include space-based technologies, gives rise to unique and challenging considerations from a legal and regulatory perspective. With the autonomous data collection, transfer, tracking, analysis, and decision-making enabled by IoT and IoS technologies that will no doubt include personal information, it is more important than ever to understand the rights and obligations of individuals and organizations with respect to personal information. The rapidly evolving technology landscape and high profile data breach cases have elevated privacy, data protection, and cybersecurity to a key business risk and operational priority.

In this presentation, I will address the new data protection and privacy laws, rules and regulations that are, or soon will be, in effect, including the EU’s General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), and other similar regulations being adopted in the US and around the World. I will relate these new laws to several use cases involving IoT devices and the processing of personal information, including location, financial, health, genetic, and biometric data.  I will then address what steps are necessary to develop and implement a compliance strategy and framework for risk management to establish best practices for compliance with the evolving new data protection and privacy laws, and touch on the role of new technologies utilizing, for example, blockchain and AI techniques in mitigating risks and supporting compliance.

Joanna F. DeFranco

Joanna F. DeFranco, earned her Ph.D. in computer and information science from New Jersey Institute of Technology, M.S. in computer engineering from Villanova University, and a B.S. in Electrical Engineering and Math from Penn State University. She is an Associate Professor of Software Engineering with the Pennsylvania State University.  She has worked as an Electronics Engineer for the Navy as well as a Software Engineer at Motorola. Her research interests include software engineering teams, and Internet of Things and Blockchain.

Talk Title: How do you create an Internet of Things Workforce?

Abstract: Internet of Things (IoT) products and Cyber Physical Systems (CPS) are being utilized in almost every discipline.  According to Forbes magazine (2017) there will be a significant increase in spending on the design and development of IoT applications and analytics.  Furthermore, the most significant increase in spending will be in the business-to-business (b2b) IoT systems (e.g. manufacturing, transportation, utilities etc.) as it will reach $267B by 2020.  Accordingly, engineers and computer scientists need the appropriate training to build safe and effective IoT systems.   However, it is not sufficient to add an IoT or CPS course to a program curriculum for students to gain the knowledge necessary to build effective, efficient and safe CPS/IoT systems.   In this presentation, the results of a review of engineering and computer science programs at the top 50 ranked US based and international universities to determine how many programs had courses with a CPS/IoT focus will be discussed along with a mapping of those courses to the five NIST Network of Things primitives (NIST 800-183).   In addition, a discussion on courses in the literature that cover the design of IoT/CPS systems will be presented along with a mapping of those courses to the NIST NoT primitives and the ACM/IEEE knowledge areas.  This presentation will conclude with discussion on recommendations that academic institutions may consider to develop an IoT/CPS curriculum.

Irena Bojanova

Irena Bojanova is a computer scientist at the National Institute of Standards and Technology (NIST), leading the Bugs Framework (BF) project, and a professor at the Johns Hopkins University, Carey Business School. Previously she was a program chair and professor at the University of Maryland University College (UMUC), an academic director at JHU, Center for Talented Youth (CTY), and a co-founder of OBS Ltd. (now CSC Bulgaria). Irena earned her Ph.D. in Mathematics/ Computer Science from the Bulgarian Academy of Sciences in 1991.

Irena Bojanova serves as EIC of IEEE IT Professional magazine, co-chair of IEEE RS IoT TC and founding member of IEEE TSC on Big Data. Previously she served as the founding chair of IEEE CS Cloud Computing STC, EIC of IEEE Transactions on Cloud Computing, Committee on Integrity Chair and a Member at Large of the IEEE CS Publications Board. Irena also serves as General Co-Chair of the Software Technology Conference (STC) and the IT in Practice (ITiP) Symposium of COMPSACK. Previously she served as General Co-Chair of ISSRE and QRS.

Talk Title: IoT Vulnerabilities via NIST Bugs Framework

Abstract: The Internet of Things (IoT) has had significant impact on cybersecurity via vulnerabilities related to IoT devices access control, firmware memory use, cryptographic issues, IDs generation, power consumption, and information exposure. The Common Vulnerabilities and Exposures (CVE) repository for example lists vulnerabilities such as CVE-2015-8287, CVE-2017-3209/-8865/-8866/-8867/-12865/-14493, CVE-2019-6692/-9445/-19278/-20410, CVE-2019-8985/-9125/-10962/-11219/-11220/-13473/-13474. This presentation will analyze such known IoT vulnerabilities and will provide their clear, precise, and unambiguous descriptions via the NIST Bugs Framework (BF).

Accurate, precise, and unambiguous definitions of software weaknesses (bugs) and clear descriptions of software vulnerabilities are vital for building the foundations of cybersecurity. BF organizes software weaknesses (bugs) into distinct classes, such as Buffer Overflow (BOF), Injection (INJ), Pseudo Random Number Generation Bugs (PRN), Encryption Bugs (ENC), Verification Bugs (VRF), and Information Exposure (IEX). It is an hierarchy of abstract and concrete classes of bugs with:

  • Precise Definitions.
  • Level – either low (language-related) or high (semantic).
  • Attributes that identify or distinguish the software fault. Each attribute is an enumeration of possible values.
  • Causes that bring about faults, which include implementation mistakes, conditions, preceding weaknesses and circumstances that bring about the fault
  • Consequences faults could lead to.
  • Possible Sites in code where faults might occur under circumstances indicated by the causes.

Nir Kshetri

Nir Kshetri is Professor at University of North Carolina-Greensboro and a research fellow at Kobe University. He has authored nine books, one of which has been selected as an Outstanding Academic Title by Choice Magazine. He has also published over 140 articles in various journals. Nir has been quoted/interviewed and/or his work has been featured by hundreds of media outlets worldwide such as Wall Street Journal, Foreign Policy, Scientific American, Bloomberg TV, CBS News, TV Mundo (Peru), ABF TV (Brazil), Fortune, Time, Christian Science Monitor, SF Gate, U.S. News & World Report, Asia Times, Channel News Asia, New York Daily News, New Boston Post, Observer and Salon.  His scholarly works and popular press publications have millions of readers worldwide. In March 2018, he gave a TED Talk about the potential roles of cryptocurrencies in fighting poverty.

Nir was the winner of IEEE IT Professional’s Most Popular Paper Award in 2019 and 2018 and Outstanding Contribution in Authorships award in 2019. He also won the Blockchain Connect Conference’s Most Influential Blockchain Research Paper in 2019. He was awarded Pacific Telecommunication Council’s Meheroo Jussawalla Research Paper Prize twice.

He has provided consulting services to Asian Development Bank and various UN agencies. In December 2018, he spoke at the Plenary Session, Digital Technology and Sustainable Development: South-South Cooperation in the Digital World at the Hong Kong Summit of the United Nations Office for South-South Cooperation (UNOSSC)and the Finance Center for South-South Cooperation (FCSSC), a special consultative body of the United Nations Economic and Social Council (ECOSOC).

Talk Title: Privacy and security implications of smart cities in developing countries

Abstract: Smart city technologies are rapidly diffusing in developing countries. For instance, China alone is estimated to have over 500 active smart city pilot projects. In order to improve infrastructures and the quality of services, smart cities use Internet of Things (IoT) devices such as connected sensors, lights, and meters. These devices collect and process data and take relevant actions.
The paper argues that developing countries differ from their developed counterparts in terms of economic, political, social and cultural factors, which have important implications for privacy and security issues facing smart cities and IoT devices used in such cities. For instance, smart cities in developing countries are likely to use lower cost IoT devices with weaker security than the ones used in developed countries. A large proportions of internet users in developing countries have been connected to the Internet not long ago. They are thus inexperienced and lack technological savviness and cybersecurity orientations. An additional factor that is prominent in discussions of smart city technologies and IoT in these countries is that they are characterized by weak legislation and law enforcement. A related point is that most developing countries have weak privacy laws.
A key focus of the paper is also on the internationalization of Chinese smart city technologies in developing countries as a key element of the Digital Silk Road, which aims to support the Belt and Road Initiative (BRI) through digital technologies. Critics have argued that Chinese companies such as Huawei, Hikvision, Dahua, and ZTE are exporting surveillance technologies to many developing countries’ smart city projects. Artificial intelligence (AI) surveillance technologies provided by Chinese companies are estimated to be used in sixty-three countries, most of which are developing countries and the BRI participants.
The article also delves into the deployment of surveillance technologies in smart cities in countries governed by autocratic and semi-autocratic regimes. A special focus of the article is the use of AI-based surveillance by authoritarian governments in smart cities.

Gabrielle E. Hempel

Gabrielle is a graduate of the University of Cincinnati, where she studied Neuroscience and Psychology. She started her career in regulatory compliance, and led specialized committees targeting Phase I and emergency research. Though she still serves on a board as a regulatory/genetic science consultant, she moved to cybersecurity in 2018 and works full-time as a Senior Security Analyst. She also works as a Penetration Tester for Black Mirage, LLC.

She continues to pursue education through a graduate program in Advanced Computer Security at Stanford, and has recently obtained her Certified Human Trafficking Investigator and Certified Expert in Cyber Investigations designations through the McAfee Institute. She collaborates with a variety of law enforcement entities and task forces in order to use digital forensics and offensive security to combat trafficking.

She has spoken at numerous national conferences on medical device security, webapp pentesting, and threat intelligence. Her continued areas of research include embedded/vehicle security, IoT vulnerabilities, and medical device security.

Talk Title: Hacking Humans: Addressing Vulnerabilities in the Advancing Medical Device Landscape

Abstract: As technology advances, the health care critical infrastructure sector comprises much of the potential attack surface of the national security landscape. Medical devices are being fitted with “smart” technology in order to better serve patients and stay at the forefront of health technology. However, medical devices that enable connectivity, like all other computer systems, incorporate software that is vulnerable to threats.

Medical device recalls increased 126% in the first quarter of 2018, mostly due to software issues and vulnerabilities. Abbott and Bayer, among other medical device companies, had recalls on devices based on weaknesses discovered by both government security entities and academic institutions. These devices, which included pacemakers, infusion pumps, and MRI machines, were found to have vulnerabilities ranging from buffer overflow bugs to the presence of hard-coded credentials that easily lent to unauthorized access of proprietary information.

A breach of any one of these devices could compromise data confidentiality, integrity, and availability, as well as patient safety. In order to mitigate these types of vulnerabilities, the FDA has issued a guidance, as well as a vulnerability scoring system, in order to assess impact. This system assesses the attack vector, the complexity, risk and severity of both patient harm and information compromise, and the remediation level. By utilizing a more rigid system along these guidelines, there is hope that the threat of a medical device attack will be diminished.

This talk will explore some of the past and current vulnerabilities facing the medical device industry, and the steps that the FDA and DHS are taking to mitigate these risks.

Jatinder Singh, University of Cambridge

Dr Jat Singh is based at the Dept. Computer Science & Technology, University of Cambridge. He leads the multi-disciplinary Compliant and Accountable Systems research group, which works at the intersection of computer science and law — exploring means for better aligning technology with legal concerns, and vice-versa. He also co-chairs the Cambridge Trust & Technology Initiative, which drives research exploring the dynamics of trust and distrust in relation to internet technologies, society and power. Jat is a Fellow of the Alan Turing Institute, and is active in the tech-policy space, serving on a range of advisory councils for government and regulators.

Talk Title: Supporting accountability in the Internet of Things

Abstract: As the IoT becomes increasingly ubiquitous, concerns are raised regarding how such systems are built and deployed. Things will go wrong, and when they do, how do we identify what happened, why that happened, and who is responsible? Given the complexity of such systems – where do we even begin? The grand visions of the IoT entail a ‘chain’ of interconnected systems, which come together to deliver functionality. That is, the IoT represents a system of systems, involving a data-driven assemblage including software, devices, cloud services, automation agents, and IoT platforms. As such, it can be difficult (even for experts) to uncover the series of events leading up to a particular occurrence, such as a data leak or system failure, and often even the systems and organisations that were involved. This talk describes aspects of accountability as they relate to IoT, in the context of the increasingly interconnected nature of such systems. It will highlight the need for mechanisms that capture information about IoT systems as a means for enabling systems to be better designed, engineered and deployed in accordance with legal, regulatory, and societal concerns. These aspects will only grow in importance as these connected environments increasingly pervade our world.

Emily Dillon, Information Security Consultant for CynergisTek, Inc

Emily Dillon is an Information Security Consultant for CynergisTek, Inc., who assists clients in performing risk assessments specific to biomedical devices and develops strategies for mitigating the security risks to the healthcare environment presented by these devices. Emily entered the healthcare industry working in the clinical engineering field where she focused on regulatory requirements and executed quality assurance audits. Additionally, she has also held information security operation roles with Ascension Technologies prior to CynergisTek where she regularly performed compliance and security risk assessments. Operating in these environments has provided her with a unique perspective and understanding of the two disciplines diverse qualities which is used to proficiently develop an effective medical device security program built through collaboration.

Talk Title: IoMT Security and Compliance: The Ramifications of Unmanaged Assets in the Healthcare Environment

Abstract: Today there are a large number of IoT companies making the world look smarter, smaller and very well connected. The benefits of this are not limited to the technology space alone – we see many other industries profiting from it, including the healthcare space. It’s time for us to wake up to the latest revolution in technology – the Internet of Medical Things (IoMT). And, just like any super power, with the benefits of this technology comes a great responsibility. A responsibility to ensure that IoMT devices are being used and managed in a manner that is smart, safe, and secure. Neglecting this duty can cause issues for any organization, but when it comes to healthcare, there is a human element.. the impact on patient care could become lethal. For example, malware vulnerabilities on medical devices present the opportunity for altered patient test results and manipulated clinical application settings. Unscheduled downtime or the unavailability of some essential medical devices could put a patient’s urgent care in jeopardy. Join experts on IoMT security and compliance to discuss common threats to clinical devices, real-life examples of the consequences associated with unmanaged IoMT devices, and best practices for ensuring the smart, safe, and secure use of these devices.

Trevor Pering, Google

Trevor Pering is a systems software engineer at Google, where recently he has been focusing on securing IoT systems for the built environment. He is the contributing editor for IEEE Computer’s THE IOT CONNECTION column, which exposes emerging IoT concepts to a broad audience. His career has focused on many different aspects of integrating the physical and digital worlds, all the way from mobile, pervasive, and ubiquitous computing through to interactive exhibits for experiential spaces. His current work aims to tame the decades-old “things” world of technology for office buildings (heating, lighting, etc…), and bringing it up-to-date with modern IT-centric infrastructure, with an emphasis on networking and security technologies. He received his BS and Ph.D. from the University of California, Berkeley, where he researched low power embedded operating systems for mobile devices.

Talk Title: Security and Compliance for IoT in the Built Environment

Abstract: Securing IoT in the built environment (office buildings, condominium complexes, etc…) presents a number key challenges that can be addressed by a combination of infrastructure-based techniques, rather than directly addressing the devices themselves. A three pronged approach addresses key aspects of cross-contamination, compliance, and normalization to transition a diverse ecosystem of existing devices to a secure collection of components that is suitable for operating in a modern IT environment. First, emergent Software Defined Networking systems can be used to isolate device communication patterns to a minimally required subset. Second, automated testing provides for compliance for basic security and network policies. Third, a clearly defined path for cloud-centric computing model enables the foundational security promises of a highly managed backend environment. Unlike a modern web-based or IT-based infrastructure, many building systems are running on decades old technology that was developed before “security” was a key concept. Not surprisingly, many IT departments are unwilling to bring these IoT systems online without significant improvements in how they are connected and operated.

This talk follows one key concept — “servers are bad” — and walks through a progression of techniques that mitigates the impact of any exposed service. This perspective assumes that all devices in an IoT environment are likely compromised, and potentially bad actors. Their behavior is highly restricted to what the infrastructure believes they should be doing, detects and secures misconfigured systems, and paves a path towards closing all doors that are not controlled by the governing infrastructure. By combining these techniques, the base security of the overall legacy system is immediately improved, and sets the stage for moving IoT systems in the built environment towards a setup acceptable by the modern IT ecosystem.

Raju Gottumukkala, University of Louisiana at Lafayette, USA

Dr. Raju Gottumukkala is the Director of Research of Informatics Research Institute and AAMA/LEQSF Regents Assistant Professor with the Mechanical Engineering Department at University of Louisiana at Lafayette.  His research interests are in the areas of cyber-physical systems, distributed computing, cyber-security and data mining. He has over 50 publications, and has experience leading various research & development efforts amounting to $7M in the domains of big data, disaster management and cyber-physical system security. He also serves as the associate editor for Springer’s Data-Enabled Discovery and Applications.

Talk Title: Can my charging station trust your EV? Exploring security problems & solutions to improve trusted vehicle to infrastructure communications

Abstract: The connected and autonomous vehicle technology is touted to change how people will travel and use vehicles. These vehicles have to communicate with other vehicles, external infrastructures such as Road Side Units (RSU) and charging stations. Improved connectivity and automation brings convenience and improved safety, but the lack of trusted communication mechanism can have serious negative consequences that affects the cyber-security of infrastructure and vehicles that rely on the infrastructure. In this talk, I will cover cyber-security problems with today’s vehicle identification and communication methods and ways to improve trusted communication between Vehicle to Infrastructure (V2I). I will also present our ongoing research on methods on how we improved V2I security with vehicle fingerprinting and diagnostics.

Cory Brennan

Cory Brennan is a leader in the medical device security industry with nearly a decade of experience in developing medical device security and risk management strategies and implementing advanced technology solutions in order to align key business objectives with effective tools. Cory focuses her work on advisory services related to medical device security, such as performing risk assessments specific to the medical device environment in order to create a better understanding of medical device vulnerabilities and develop strategies for risk remediation, as well as integrating the implementation of security controls into the overall lifecycle approach for medical device management. She has excelled in developing, improving and managing an effective organizational medical device security and risk management program capable of meeting compliance standards and managing the demands of clinical operations for large organizations, including a multibillion-dollar health care system serving more than 2,600 sites across 21 states. Cory has extensive practical knowledge of health care information security and compliance standards including HIPAA/HITECH, NIST and ISO and is a member of the Healthcare Technology Leadership Council for the Association for the Advancement of Medical Instrumentation (AAMI). Cory’s certifications include: HealthCare Information Security and Privacy Practitioner (HCISPP), Certified Information Systems Security Professional (CISSP), Certified Associate of Project Management (CAPM), and Certified Associate in Healthcare Information and Management Systems (CAHIMS).

Talk Title: IoMT Security and Compliance: The Ramifications of Unmanaged Assets in the Healthcare Environment

Abstract: Today there are a large number of IoT companies making the world look smarter, smaller and very well connected. The benefits of this are not limited to the technology space alone – we see many other industries profiting from it, including the healthcare space. It’s time for us to wake up to the latest revolution in technology – the Internet of Medical Things (IoMT). And, just like any super power, with the benefits of this technology comes a great responsibility. A responsibility to ensure that IoMT devices are being used and managed in a manner that is smart, safe, and secure. Neglecting this duty can cause issues for any organization, but when it comes to healthcare, there is a human element.. the impact on patient care could become lethal. For example, malware vulnerabilities on medical devices present the opportunity for altered patient test results and manipulated clinical application settings. Unscheduled downtime or the unavailability of some essential medical devices could put a patient’s urgent care in jeopardy. Join experts on IoMT security and compliance to discuss common threats to clinical devices, real-life examples of the consequences associated with unmanaged IoMT devices, and best practices for ensuring the smart, safe, and secure use of these devices.

Sri Nikhil, Pacific Northwest National Laboratory, USA

Pacific Northwest National LaboratorySri Nikhil Gupta Gourisetti is a Grid – cybersecurity research engineer at Pacific Northwest National Laboratory (PNNL). During his research engagement at PNNL, he worked on several smart grid cyber-physical security projects addressing the security and grid systems interaction challenges and needs of critical facilities and infrastructure. He has been actively involved in research projects on security engineering solutions and responses for critical infrastructure. He is the Principal Investigator (PI)/Co-PI for numerous cybersecurity research projects in the critical infrastructure domains such as the power grid and buildings. Some of the noteworthy projects include DOE Cybersecurity projects such Keyless Infrastructure Security Solution – a blockchain-based system for critical infrastructure; Mitigation of External-exposure for Energy Delivery Systems; Cybersecurity Framework; blockchain-based transactive energy systems and supply chain management. He is one of the lead authors for DOE-PNNL led buildings cybersecurity framework and the lead developer for vulnerability assessment tools. He is the PI for the development of on-going cyber-physical security non-intrusive applications. He was a technical lead for an incentive-based hardware-in-the-loop project where the grid simulation software and hardware systems interact in real-time. Under a DARPA project, he also led a team to develop red team – blue team cyber-physical attack scenarios for grid systems. In the IEEE Blockchain working group, he is the co-lead of cybersecurity task force & the lead of transactive energy task force.

Talk Title: IoT Cybersecurity and Blockchain Technology for Energy Applications: Where we are and what are the issues

Abstract: Critical infrastructure systems such as the power grid and buildings are becoming increasingly interconnected, resulting in a large landscape of data exchanges between the networked smart systems, often referred to as the industrial internet of things (IIoT). This increased observability facilitates the engineers, regulators, and operators to make critical data-driven and system-driven operational decisions pertaining to reliability and resiliency of the critical infrastructure systems. However, there remain challenges related to the appropriate confidentiality, integrity and authenticity of the information in addition to ensuring the secure operation of the systems. To address these challenges, researchers from the Pacific Northwest National Laboratory (PNNL) have been developing cyber security tools and adapting evolving technologies to the critical infrastructure space. This presentation will demonstrate some of these innovating technologies to secure complex system-of-systems, such as: using blockchain for energy markets, data integrity, device security, supply chain management, and nonrepudiation; cyber security assessment and enumeration tools and technologies that can be used to understand the security maturity of the operational technology (OT)/industrial control systems (ICS) environment. In addition, this presentation will also showcase various critical cyber security challenges and research questions that are yet to be answered.

Marcellus Buchheit, President & CEO of Wibu-Systms USA Inc. and Co-Founder, Wibu-Systems AG

Marcellus Buchheit is co-founder and Chairman of the Board of WIBU-SYSTEMS AG in Karlsruhe, Germany. He currently serves as the President and CEO of Wibu-Systems USA Inc., located in Edmonds, WA where he resides.

Marcellus earned his Master of Science degree in computing science at the University of Karlsruhe, Germany in 1989. In the same year, he co-founded Wibu-Systems together with Oliver Winzenried. As the original architect and first software developer of the company’s successful WibuKey, CodeMeter, and SmartShelter product lines, he is well known in his field for his expertise in designing innovative techniques to protect software against reverse-engineering, tampering, and debugging. The products he designed have never been cracked by hackers in multiple public global contests.

Marcellus is an active member of the international Industrial Internet Consortium (IIC), where he is involved with security, trustworthiness and monetization initiatives. He is one of the editors and authors of the Industrial Internet Security Framework document. He is a frequently invited speaker at industry events, and has accepted many industry awards on behalf of Wibu-Systems, including the CODiE awards in 2017, 2014 and 2009 in recognition by the SIAA of CodeMeter as the Best Content Rights and Entitlement Solution.

Since 1988, he has also been self-employed as a Windows development consultant. He wrote many articles in German software development magazines and was the author of a Windows programming book that became the standard for all of Germany (named as “the bible”). From 1996 thru 2004, he was an independent Microsoft Regional Director and MVP. At the age of 14, he developed his first microprocessor-based computer and wrote his first computer programs.

Talk Title: Trustworthiness: Understanding and Solving Challenges of Digital IT/OT Transformation

Abstract: Bringing the IT and OT world together in IoT (especially industrial) as part of the digital transformation process brings challenges in coordinating security and safety in combination with reliability, resiliency and privacy. The IIC (Industrial Internet Consortium) has established the Trustworthiness Model to provide better understanding of the impact of a pure technical- or business-related IoT transformation. The IIC defines trustworthiness as the degree of confidence one has that a system performs as expected, characterized by the five key elements of safety, security, reliability, resilience and privacy in the face of environmental disturbances, human errors, system faults and attacks.

The challenge of modern industrial systems design using IoT technology is that different design directions from the OT (Operation Technology) and the IT (Information Technology) clash in the IT/OT convergence. For example, OT is heavily safety/resilience-guided while IT, in regards to internet technology, is heavily security/privacy-guided. As a result, the system designs are frequently in conflict, delaying or even disrupting the overall design effort. Such conflicts can only be understood and preemptively prevented by a deeper understanding of the interaction of the five key elements of trustworthiness.

Hon. Cynthia D. Mares, District Court Judge, Colorado

Hon. Cynthia D. Mares is currently a district court judge in Colorado. Her passion is board governance and cybersecurity. She is an author of the book Women Securing the Future with TIPPSS for IoT, published in 2019. Judge Mares is a governance fellow with the National Association of Corporate Directors since 2016 and a 2018 graduate of the Colorado Women’s Foundation Board Bound program. Her specialized education includes programs at Harvard’s Kennedy School of Government, Colorado’s National Cybersecurity Center and world-wide programs hosted by the Sedona Conference, including programs in Dublin, Ireland and Budapest, Hungary as well as numerous programs across the country. Ms. Mares serves as an advisory board member for Axon global, a cybersecurity company, and FDHint, a consulting firm in Advanced Technology, Cybersecurity and Diversity and Inclusion. She is also a former member of the Colorado Gaming Commission and current board member for the Colorado Hispanic Bar Association. She is a past president of the Hispanic National Bar Association. Ms. Mares holds a bachelor’s degree in Business Administration from the University of Colorado and a juris doctorate degree from the University of Denver.

Talk Title: Your Critical Role in the World of Compliance

Abstract: As a specialist in Privacy and Security, the laws applicable to you and your company can be overwhelming but that’s not your job, right? You are not a lawyer and therefore, not trained with the skills needed to comply with all the applicable laws. So, what is your role in this complicated world of cybersecurity? In this session, we will discuss your role and how to do it in a way that will impress your entire team.

Joe Jarzombek, Synopsys, Inc.

Joe Jarzombek is Director for Government & Critical Infrastructure Programs in Synopsys, Inc., the Silicon to Software™ partner for innovative organizations developing microelectronic products and software applications.  He guides efforts to focus Synopsys’ global leadership in electronic design automation (EDA), silicon IP, and software integrity solutions in addressing technology challenges of the public sector, aerospace and defense, and critical infrastructure.   He participates in relevant consortia, public-private collaboration groups, trade associations, standards groups, and R&D projects to assist in accelerating technology adoption.

Previously, Joe served as Global Manager for Software Supply Chain Solutions in the Software Integrity Group at Synopsys.  He led efforts to enhance capabilities to mitigate software supply chain risks via software security and quality test technologies and services that integrate within acquisition and development processes; enabling detection, reporting, and remediation of defects and security vulnerabilities to gain assurance and visibility within the software supply chain. Jarzombek has more than 30 years focused on software security, safety and quality in embedded and networked systems.  He has participated in industry consortia such as ITI, SAFECode, NDIA and CISQ; test and certification organizations such as Underwriters Labs’ Cybersecurity Assurance Program, standards bodies, and government public-private collaboration forums to address software assurance and supply chain challenges.

Prior to joining Synopsys, Jarzombek served in the government public sector; collaborating with industry, federal agencies, and international allies in addressing cybersecurity challenges.  He served in the US Department of Homeland Security as the Director for Software & Supply Chain Assurance, and he served in the US Department of Defense as the Deputy Director for Information Assurance (responsible for Software Assurance) in the Office of the CIO and the Director for Software Intensive Systems in the Office of Acquisition, Technology and Logistics.  Jarzombek is a retired Lt Colonel in the US Air Force, a Certified Secure Software Lifecycle Professional (CSSLP) and project management professional. He received an MS in Computer Information Systems from the Air Force Institute of Technology, and a BA in Computer Science and BBA in Data Processing and Analysis from the University of Texas – Austin.

Talk Title: Mitigating IoT Risks by Securing Software in Network Connectable Devices

Abstract: As the cyber landscape evolves and external dependencies grow more complex, managing risks attributable to exploitable software in IoT includes requirements for security and quality with ‘sufficient’ test regimes throughout the software supply chain.  IoT is contributing to a massive proliferation of a variety of types of software-reliant, connected devices throughout critical infrastructure.  With IoT increasingly dependent upon third-party software, software composition analysis and other forms of testing are used to determine ‘fitness for use’ and trustworthiness of assets. Standards for measuring and sharing information about software security and quality are used in tools and services that detect weaknesses and vulnerabilities.  Test and certification programs provide means upon which organizations use to reduce risk exposures attributable to exploitable software.  Ultimately, addressing software supply chain dependencies and leveraging high assurance test regimes enable enterprises to provide more responsive mitigations.

Learning Objectives – Attendees will learn how:

  • External dependencies contribute risks in the form of technical debt throughout the IoT software supply chain;
  • Standards can be used to convey expectations and measure IoT software security and quality;
  • Software composition, static code analysis, fuzzing, and other forms of application security testing can be used to determine weaknesses and vulnerabilities that represent vectors for attack and exploitation;
  • Testing can support procurement and enterprise risk management to reduce risk exposures attributable to exploitable software in IoT.

Zhaojun Steven Li, Western New England University, Springfield, MA

Dr. Zhaojun Steven Li is an Associate Professor with the Department of Industrial Engineering & Engineering Management at Western New England University, Springfield, MA. Dr. Li’s research interests include IoT data analytics, applied statistics and operations research, reliability engineering, systems engineering and its applications in product design, diagnostics and prognostics of complex engineering systems. He received his PhD in Industrial Engineering from the University of Washington. He is an ASQ Certified Reliability Engineer and Caterpillar Six Sigma Black Belt. Dr. Li’s most recent industry position was a reliability team lead with Caterpillar to support the company’s new engine development. He is serving on editorial boards for IEEE Transactions on Reliability and IEEE Access. He is a senior member of IISE and IEEE. He has served as a board member of IISE Quality Control and Reliability Engineering (QCRE) Division and IEEE Reliability Society. He was  the VP for Publications of IEEE Reliability Society in 2019.

Talk Title: An IoT Perspective of Understanding the Boeing 737 MAX Crashes

Abstract: Recently, two serious airplane crashes involving Ethiopian airlines and Lion airlines have greatly impacted the aviation industry, sparked worldwide discussions as well as investigations from government agencies. Both crashed jets are brand new Boeing 737 MAX models, a derivative of the best-selling aircraft in history. This talk firstly briefly describes the key processes and highlights of the above two crashes. Then, the possible causes of the accidents are analyzed from three aspects of the design of automation software, airworthiness certification, and aircraft management, respectively. Especially, the accidents are analyzed from the IoT’s point of view. Lastly, suggestions and thoughts concerning the automation paradox and software design issues related to safety, reliability, and ethics, are discussed based on the outcomes of the multiple investigations.

Celia Paulsen, National Institute of Standards and Technology (NIST), USA

Celia Paulsen is a cybersecurity researcher at the National Institute of Standards and Technology (NIST). Her current research focuses on cyber-supply chain risk management and the intersection with tools such as blockchain and additive manufacturing. She has researched and co-authored several publications including NIST SP 800-161, Supply Chain Risk Management Practices for Federal Information Systems and Organizations and NISTIR 7621 Rev. 1, Small Business Information Security: The Fundamentals. Prior to joining NIST, Celia was an analyst for the National Security Agency in the US Army. She has an MBA in information security from California State University, San Bernardino, and bachelor’s degrees in information technology and business management.

Talk Title: Cybersecurity for IOT Supply Chains: Comparison of Emerging Types of Solutions

Abstract: As vendors investigate inserting technology into their products, they are faced with the increasing problem of ensuring that the technology is safe, secure, and sound. One aspect of this challenge is ensuring a device is developed, integrated, and delivered with cybersecurity in mind. In the current business climate, a majority of this work is outsourced to a complex and interdependent and global supply chain. This talk will examine a number of technological and policy-based approaches to gaining visibility and control over the cybersecurity of an IOT supply chain and examine where there are opportunities for additional research and development.

Preeti Chauhan, Google, USA

Dr. Preeti Chauhan is a Technical Program Manager in the Data Center Systems Quality team at Google. In her prior role, Preeti was a Quality and Reliability TPM at Intel and led the Assembly and Test certification of Foveros 3D packaging technology and Server microprocessors. She is currently serving as Vice President of Technical Activities in IEEE Reliability Society and was previously peer reviewer of journal articles for Microelectronics Reliability and Transactions on Material Device Reliability. Dr Chauhan received 2017 Early Career Award from James Clark School of Engineering at University of Maryland, College Park in recognition of her professional achievements. More recently, she received the 2019 Intel Achievement Award for her contributions to development of industry first 3D packaging technology for Intel processors.

Dr Chauhan received PhD in Mechanical Engineering from University of Maryland, where her research focused on lead-free solder interconnect reliability. She has authored a book on Copper Wire Bonding, and published 20+ articles in peer reviewed journals and conferences in the areas of electronic packaging reliability and PHM.

Talk Title: Enabling Artificial Intelligence through Next-Gen Electronic Packaging Technologies

Abstract: Artificial intelligence (AI) has become a ubiquitous technology that is already shaping the world around us. From enabling voice assistance to self-driving cars, AI technology relies heavily on processing large data sets for machine learning. This requirement drives the development of new packaging technologies to deliver high computing power, high bandwidth, low power and low latency devices. One such technology is 2.5D/3D integration wherein heterogeneous integration of logic dies with multiple technology nodes and memory dies is achieved. This presentation will cover some of the 2.5D/3D integration technologies for AI applications along with the associated challenges and growth opportunities.

John Viega, Capsule8

Capsule8 Co-founder and CEO John Viega is an expert in building defensive systems to protect against exploitation of previously unknown vulnerabilities and building successful companies to bring those systems to market. Most recently, John was EVP of cloud security provider SilverSky, successfully transforming them from a managed services provider to an innovative cloud security company. Following the successful acquisition of SilverSky by BAE Systems, John went on to serve as EVP of Product, where he also had responsibility for a portfolio of analytics products that spanned financial crime and security. Prior to SilverSky, John was SaaS CTO at McAfee. John is an award-winning author with a half dozen books to his name, including “Building Secure Software” (the first book for software engineers on how to build secure programs) and “Network Security with OpenSSL.” He also co-designed the GCM encryption mode, which is used for more than 70% of encrypted web traffic.

Talk Title: IoT in the Security Industry
Abstract: In many ways, IoT security is a massive challenge for the security industry.  Sure, embedded devices are becoming ubiquitous, and are incredibly difficult to update — that alone is a big challenge.  There’s also the physical security problem (think credit card skimmers).  But making matters worse, it’s proven particularly difficult to convince people that IoT security is worth the investment, particularly outside of the SCADA world. In this talk, we will look at how the security industry has tried to tackle the problem.  We’ll look at the technical approaches taken both by large companies and startups, and analyze what approaches are getting traction and why.  We’ll do this with examples across numerous types of IoT devices, from consumer devices, to automobiles, to ATMs and to industrial controls.  But instead of just looking at technical approaches, we will also consider what approaches are getting traction in the market, and why.

Data and Data Engineering

Data and Data Engineering Track Description

IoT is no longer the “next big thing” – it’s here, real, and transforming the world. McKinsey estimates that 127 devices are connected to the Internet every second; Statista expects 75B devices to be connected by 2025.  Yet the adoption of IoT technologies by the industry is moving slower than expected. While this can be attributed to multiple factors, the capability (or lack of) to cope with “data deluge” – how to store and manage data efficiently as well as to make sense of them – stands as a key one.

To support efficient storage and management of the vast data collected from IoT devices, the market has created solutions on two fronts: cloud infrastructure and embedded storage in edge devices. Even though, challenges still linger as for how to best distribute and process the data in the spectrum of varying computing power, storage cost, power consumption, and communication latency in the IoT networks. This has to be optimized to meet the application requirements and system constraints.

Data provides no value unless we transform it into actionable insights. To that end, IoT practitioners have been utilizing data analytics tools to unlock the value hidden inside the seemingly chaotic data vaults.  And let’s not lose sight of the ultimate goal of IoT – to help make better decisions, whether it’s improving user experiences, optimizing manufacturing, or personalizing marketing campaigns. The advance in data analytics, including AI, has produced early encouraging results.

In this track, we will focus on the challenges and opportunities surrounding, but not limited to, the following themes:

  • Data Analytics
    • Data Semantics : raw data to insights, including AI and ML methodologies
    • Advances in predictive and prescriptive analytics
  • Data Management and Engineering
    • Data quality and data trustworthiness (Provenance)
    • Distribution, storage and access
    • Legal and regulatory aspects, e.g. “who owns the data?”
  • Data Applications
    • Transportation, Telecom, Pharmaceuticals, Government
    • Data-driven business models (pay-per-use, etc.)

Track Co-Chairs

Chung-Min Chen, Lutron Electronics

Chung-Min Chen is currently with Lutron where he provides data science consulting in various business areas.  Prior to that he was VP of Data Science at Sidecar Interactive, a startup leveraging machine learning in digital marketing, and Sr. Director of Data Science and Analytics at iconectiv (an Ericsson company) where he helped build Ericsson’s analytics products that enable telecom carriers to better understand and manage mobile user experiences.  He had also held research and management positions with Bellcore, Telcordia, and subsequently Applied Communication Sciences.

His interests span across database systems, distributed and parallel computing, mobile computing, and machine learning. He has published over 50 papers in leading ACM and IEEE journals and conferences including JACM, TOSN, TKDE, TMC, TON, JSAC, SIGKDD, PODS, SIGMOD.  He received a PhD in CS from University of Maryland, College Park and BS in CSIE from National Taiwan University.


Chonggang Wang, Principal Engineer, InterDigital Communications, USA


Chonggang Wang received his Ph.D. degree from Beijing University of Posts and Telecommunications (BUPT) in 2002. He is currently a principal engineer at InterDigital Communications, Inc. where his research interests span quantum internet, edge computing, and Internet of Things (IoT). He was the founding Editor-in-Chief of IEEE Internet of Things Journal (2014-2016). He is a Fellow of the IEEE for his contributions to IoT enabling technologies. He is also a member of Convida Wireless, which is a joint venture partnership between InterDigital and Sony focused on IoT research and development.



Munir Cochinwala, CEO and founder of Data-Khilari

Munir Cochinwala is CEO and founder of Data-Khilari, a small company focused om advanced solutions applying data analytics and AI techniques. He was previously CTO for NJIT, College of Computing as well as Executive Director and Chief Scientist for data analytics at New Jersey Innovation Institute.  He has also at Applied Communication Sciences (ACS), previously known as Telcordia and Bellcore, where he was an AVP and Chief Scientist/Executive Director for the Information and Computer Sciences Research Lab.

He has over twenty-five years of experience and has interest and expertise on all aspects of computer sciences with a focus on databases, data analytics, distributed and mission-critical systems.


Track Speakers

Yaniv Iarovici, Director, Marketing for Industrial IoT and Edge, Western Digital

Yaniv Iarovici is the Director of Marketing for Industrial, IoT and Edge at Western Digital. A 20-year veteran with a diverse background in software, business development and product marketing in the high-tech industry, Yaniv is responsible for developing go-to-market strategies for storage solutions targeting the Industrial and IoT segments. He also oversees the ecosystem development for Mobile, Automotive, Edge Compute and Industrial/IoT markets.  Before joining Western Digital Corporation, Yaniv held engineering and management positions at M-Systems. Prior to that, he was a software engineer at IAI (Israeli Aerospace Industries) and Friendly Robotics. Yaniv holds a bachelor’s degree in Mathematics and Computer Science.

Talk Title: Storage Can No Longer Be an Afterthought in the Industrial Internet of Things

 Abstract: Industry 4.0, the fourth wave of the Industrial Revolution, is ushering in new opportunities for “connected everything,” allowing companies to utilize networked data from sensors, monitors, robots and other IoT devices to take advantage of artificial intelligence (AI) and machine learning (ML) for more efficient factories. Purpose-built solutions with storage, networking and compute – either in sensors, gateways, at the edge, in the cloud or on-premise – need to be architected in ways that are optimized for their part in the IIoT ecosystem. In the past, storage might have been acquired solely based on anticipated capacity needs or price. However, the autonomous applications in today’s Industry 4.0 elicit many more considerations. With the unique needs of IIoT, architects must proactively plan as they design for qualification, or they risk time-to-market advantage. To support IIoT’s promises to bring innovative use cases to light and new efficiencies to operations in this more connected world, you must take storage into considerations early when designing industrial applications. In this session, you will hear about the Industry 4.0 trends that are driving the need to think about storage earlier (hint: 5G, the edge, and M2M play starring roles!) and what unique considerations you must take into account when designing industrial applications.




Martin Bauer, Senior Researcher, NEC Laboratories, Europe GmbH, Germany

Martin Bauer is a Senior Researcher at the IoT research group at the NEC Laboratories Europe (NLE) in Heidelberg, Germany. He received his MSc in Computer and Information Science from the University of Oregon, USA, in 1998, and both his Dipl. Inf. and his doctorate degree from the University of Stuttgart, Germany, in 2000 and 2007 respectively. In 2005 he joined the NEC Laboratories Europe (NLE), where he has been working on context and IoT related research projects as well as standardization activities in the same areas. In particular, Martin Bauer is/has been working on a number of European research projects, most recently in the large scale pilots in IoT, Autopilot and Synchronicity, and in the EU-Japan project Fed4IoT. In standardization, he has actively contributed to OMA NGSI, oneM2M and currently ETSI ISG CIM, primarily on topics related to context management and semantics. Martin Bauer is a personal member of the FIWARE Foundation, which is managing, promoting and evolving the open source platform for smart IoT scenarios. He currently serves as a member of the FIWARE Technical Steering Committee (TSC). Furthermore, he is the AIOTI WG03 sub-group chair for the semantic interoperability topic. He has (co-) authored more than 50 technical papers and has been active as peer reviewer and program committee member for several journals, conferences and workshops. He is a member of IEEE, IEEE Computer Society, IEEE Communications Society and ACM.

Title of the Talk: Sharing IoT Information and Making it Available across IoT Platforms

Abstract: To achieve the full potential of the Internet of Things, the sharing and reuse of information in different applications and across verticals is of paramount importance. IoT information is often based on low-level data provided by sensors that it is not directly usable by applications. Thus, higher-level information or knowledge has to be derived and made available in a suitable representation. The important aspect for enabling the sharing is that there is agreement on the semantic concepts.

As a proposal on how this can be achieved, the NGSI-LD information model will be presented, which is being specified by the Context Information Management Industry Specification Group of the European Telecommunications Standards Institute (ETSI ISG CIM). NGSI-LD is based on JSON-LD and represents knowledge as a property graph. This graph enables finding relevant information on a suitable abstraction level, integrate meta-information like quality and provenance, and link to external information sources providing information not directly representable in NGSI-LD, e.g. video streams or 3D models.

NGSI-LD is used as the internal common format of an IoT virtualization platform developed in the Fed4IoT project. The idea is to provide users with a virtualized view of the information, i.e. only the relevant information in the required representation using the desired IoT platform, e.g. oneM2M or FIWARE. To enable this, information from heterogeneous source platforms is integrated into the virtualization platform, transformed into the common format, and then translated to the respective target platform. Thus information can be shared, bringing it to a common basis and then can be made available across different IoT platforms.


Jun Deguchi, Kioxia Corp. (formerly Toshiba Memory Corp.)

Jun Deguchi received the B.S. and M.S. degrees in machine intelligence and systems engineering and the Ph.D. degree in bioengineering and robotics from Tohoku University, Sendai, Japan, in 2001, 2003, and 2006, respectively. In 2004, he was a Visiting Scholar at the University of California, Santa Cruz, CA, USA. In 2006, he joined Toshiba Corporation, and was involved in design of analog/RF circuits for wireless communications, CMOS image sensors, high-speed I/O, and accelerators for deep learning. From 2014 to 2015, he was a Visiting Scientist at the MIT Media Lab, Cambridge, MA, USA, and was involved in research on brain/neuro science. In 2017, he moved to Toshiba Memory Corporation (the company name has been changed to Kioxia Corporation since Oct. 1st, 2020), and has been a Research Lead of an advanced circuit design team working on high-speed I/O, deep learning/neuromorphic accelerators and quantum annealing.

Dr. Deguchi has served as a member of the technical program committee (TPC) of IEEE International Solid-State Circuits Conference (ISSCC) since 2016, and IEEE Asian SolidState Circuits Conference (A-SSCC) since 2017. He has also served as a TPC vice-chair of IEEE A-SSCC 2019, and a review committee member of IEEE International Conference on Artificial Intelligence Circuits and Systems (AICAS) 2020.

Talk Title: Co-optimization of Hardware and Algorithm for Energy-efficient Edge Computing with Convolutional Neural Networks

Abstract: A lot of accelerators for convolutional neural networks (CNNs) have been developed and utilized in the cloud for a variety of applications such as image classification, object detection and semantic segmentation. In order to deploy CNN accelerators on edge devices, it is essential to drastically reduce memory and computational costs due to their limited battery capacity and hardware resources. Although quantization of activations, weights and their vectors is one of promising approaches to reduce the costs, recognition accuracy of CNNs tends to be degraded when neural network models are deeply quantized with e.g. single-bit representation. Therefore, in order to practically reduce the costs while maintaining recognition accuracy, co-optimization of quantization algorithms and hardware architecture of accelerators has become important recently. In this talk, co-optimization of our proposed filter-wise quantization technique and a specific hardware architecture with variable-bit-width MAC (multiply-and-accumulate) units is introduced.


Khalil Drira, Research Director, CNRS, France

Khalil Drira is Research Director at CNRS, the French National Center for Scientific Research. He obtained the Computer Science Engineer degree from ENSEEIHT/INP Toulouse in 1988, and the PhD degree in 1992, and Research Habilitation in 2005 from Univ. Toulouse 3. He joined CNRS, the French National Center for Scientific Research, in 1993 as a Tenure Researcher. He was the head of the Network and Communication Department at LAAS-CNRS, from 2012 to 2015, and the head of the research team SARA at LAAS-CNRS ( His research interests include design, modelling, analysis, implementation, and provisioning of smart networked services for IoT platforms and applications. He is author of more than 200 papers in international journals and conferences. His is involved in standardisation activities in IoT/M2M services platforms. He is expert for the European Telecommunications Standards Institute (ETSI), and served as member of the Specialist Task Force 547 “Security/Privacy and Interoperability of standardized IoT Platforms”.  He is or has been involved in different European and French R&D projects (FP6, FP7, ITEA, H2020, PIA) in the field of distributed systems and IoT/M2M and software architectures. He serve as Associate Editor for several international journals including: IEEE IoT journal, Internet Technology Letters, and smart science journal. He has been guest editor of  Special Issues in international journals including recently JSS, CCPE, FGCS, IST.  He was co-editor of the following SPRINGER volumes: LNCS 11895, LNCS 2236, LNCS 7957. He was co-editor of over 20 international conferences and workshops proceedings. He chaired several international conferences including : ICSOC 2019,  ECSA 2013, IEEE-WETICE 2012, 2015, 2020 and SERA 2015.  He has co-organized international workshops and tracks including: ASOCA@ICSOC;  SISOS@ACM-SAC. He has served in the Steering Committee of the international conferences IEEE-WETICE and ECSA.  He has served in the Program Committee of over 100 international conferences.

Talk Title: Semantic Interoperability for IoT Service Platforms

Abstract: The focus of interoperability has been initially on technical interoperability (basic connectivity, network interoperability) and syntactic interoperability (Common Information Models with static information based on a pre-defined syntax). This was reflected in the work of standardisation with many great achievements.  However, as soon as the requirement on the information exchanged become more complex (e.g., systems from different sectors), static information is no longer sufficient, and the need arise for basing the exchange of information on its meaning (independently of underlying protocols). This is the role of Semantic Interoperability: making sure that the meaning of semantics can be understandable and processed by machines, and the most common way to achieve this is by using an ontology which is “an explicit specification of a shared conceptualization”. One of the main objectives of the standardization and research activities for the last decade was to enable the transition from the Internet of Things (IoT) to the so-called “Web of Things” (WoT). The ultimate objective for the next decade is to enable the transition from the Web of Things (WoT) to the so-called “Semantic Web of Things” (SWoT). This talk will investigate the challenges for semantic interoperability and autonomic management in IoT service platforms.   The landscape of standardisation and research initiatives will be explored. The hindering and enabling factors for architecting interoperable IoT applications will be discussed.


Bin Xie, Founder & CEO, InfoBeyond Technology, USA

Dr. Bin Xie is the founder & CEO of the InfoBeyond Technology (2008). He conducted substantial R&D works in the areas of Networks, Machine Learning, and Security. His R&D of Security Policy Tool technology is awarded as a Successful SBIR Story by NIST in 2018.  His R&D of Cyber Security Architecture Tool is also awarded by NIST. As a PI, he has received 8 million of R&D grants for DoD (e.g., Naval Research Laboratory, Air Force Research Laboratory, Missile Defense, and Marine Corps), DoEOffice of Science, NIST, and DoT. Some of his R&D technologies are transferred into the governments and commercial domains.

Dr. Xie has published 70+ articles. He is the co-editor/author of books titled Handbook/Encyclopedia of Ad Hoc and Ubiquitous Computing (World Scientific: ISBN-10: 981283348X, World Scientific Publisher) (Best Selling in 2012 &2013), Handbook of Applications and Services for Mobile Systems (Auerbach Publication, Taylor and Francis Group, ISBN: 9781439801529) and Heterogeneous Wireless Networks- Networking Protocol to Security, (VDM Publishing House: ISBN: 3836419270, 2007).

Dr. Xie severed as a member of NIH Special Emphasis Panel on System Science and Health in the Behavioral and Social Sciences, ZRG1 HDM-Q (50), 2012-2017.

Talk Title: DiagSoftfailure: Soft-failure Diagnosis for High-throughput IoT Network by Learning

Abstract: Many IoT applications (e.g., emergency cares) rely on low-latency or/and high throughput data delivery. However, performance diagnosis in an IOT network comes to a challenge due to a complex networking environment, especially at the bottleneck (i.e., edge) of the IoT network. A network soft-failure (e.g., an insufficient buffer in an edge device) is characterized by the degraded performance. This is different than a hard-failure that is an issue of network disconnection or function loss. Current soft-failure diagnosis highly depends on an expert to analyze the performance symptoms and from which to track down the cause and source of the failure. This results in a high time and labor cost for accurate diagnosis and troubleshooting. On the other hand, current approaches are not only limited to distinguish soft-failures accurately but also unable to identify the root cause of the soft-failure in the complex network. Powered by advanced Big Data machine learning technology, DiagSoftfailure is a novel approach in attempt to address the diagnosis challenges in a way to provide an intelligent and automated diagnosis tool that can be used for IoT edge devices. For such a purpose, DiagSoftfailure is trained by combining supervised and unsupervised machine learning to accurately identify both known and unknown soft-failures in a network. Substantial machine learning results will be demonstrated in this talk.

Communications, Connectivity, and Networking (Including RFID)

Track Description

The co-evolution of the Internet of Things (IoT) and communication systems has only compounded interest in and growth of technologies in this area. While sensing techniques and methods have evolved as has data intelligence through machine learning, the benefits of the IoT will mean little without having a fast, efficient and robust network with which to move this data around. Will the data from the mushrooming collection of ‘things’ overwhelm networks? How will different connectivity solutions suit different application areas with differing requirements for bandwidth, latency and energy efficiency? With 5G technology now deploying, there are new opportunities for both industry and government to leverage this increase in connectivity to better distribute data among many different types of networks up and into the cloud. This track seeks to address the challenges in technology and policy related to moving data throughout the IoT as well as note novel applications.

Some particular themes of this track include, but are not limited to the following:

  • Communication Networks for IoT
  • Physical Layer communication protocols
  • Radio-frequency Identification (RFID) technology
  • Policy
  • What’s after 5G?

Track Co-Chairs

Jacqueline Walker University of Limerick, Limerick Ireland

Dr Jacqueline Walker is a lecturer in the Department of Electronic and Computer Engineering at the University of Limerick, Ireland where she teaches in Cloud Computing,and Mobile Wireless Communications. Dr Walker gained her BE degree with first class honours from The University of Western Australia and her PhD degree from Curtin University of Technology where she made significant contributions to time transfer and synchronization in communications networks. She has also published in biomedical, speech and music signal processing and is currently pursuing research in software radio for a variety of satellite applications and also for use in engineering education.



Christopher R. Valenta, Georgia Tech, Atlanta, GA

Christopher R. Valenta is currently a senior research engineer at the Georgia Tech Research Institute Electro-optical Systems Laboratory where he acts as the EO Systems Innovation Division Associate Chief and Opto-Electronics branch chief. His research interests lay in wireless power, radio frequency identification, remote sensing, active-passive electro-optics, optical system design, microwave and milli-meter wave sensing, and digital signal processing. Dr. Valenta is also an adjunct professor in the Georgia Tech School of Electrical and Computer Engineering, the winner of the 2015 IEEE Microwave Magazine Best Paper Award, and a registered professional engineer in the state of Georgia.



Narang N. Kishor, Narnix Technolabs Pvt. Ltd, India

Kishor is Technology Consultant, Mentor & Design Architect in Electrical, Electronics & ICT with over 40 years of professional experience in education, research, design and consulting. Over 30 years of hardcore Research and Design Development Experience in Solutions, Systems, Products, Hardware, Software & Firmware (Embedded Software) in fields of Industrial, Power, IT, Telecom, Medical, Energy and Environment, and over 10 years of Consultancy Experience to different segments of business & industry. He has over 200 Research & Design Mentees in the Electronics, ICT & STI Ecosystems. Professionally, he is an Electronics Design Engineer practicing design & development of a wide spectrum of Products, Systems & Solutions as an Independent Design House – NARNIX since 1981.

For last 10 years, deeply involved in Standardization in the Electrical, Electronics, Communication and Information Technology Domains with focus on Identifying Gaps in Standards to address Interoperable Systems & Solutions Deployments and bring Harmonization by defining standardized interfaces to ensure End-to-End Interoperability. Currently leading the Standardization activities as the Chairman of Smart Infrastructure Sectional Committee LITD 28 in BIS the Indian National Standards Body, Vice Chair – Strategy & Convenor – Reference Architecture WG in IEC Systems Committee on Smart Cities, Project Leader – IEC TS 63188 ED1 – Smart Cities Reference Architecture Methodology, Project Leader – IEC 63205 ED1 – Smart Cities Reference Architecture, Member Steering Committee – OCEANIS (The Open Community for Ethics in Autonomous and Intelligent Systems) & Co-Editor – ISO 30145 on Smart City ICT Reference Frameworks…

Currently, Kishor is developing a Comprehensive “5G inclusive ICT Architecture for Critical Infrastructure” and leading the 5G Application Layer Standards development in India.


Latif Ladid, University of Luxembourg, Luxembourg

Prof. Latif Ladid holds the following positions:

Founder & President, IPv6 FORUM,

Emeritus Trustee, Internet Society

Board Member IPv6 Ready & Enabled Logos Program

Member of 3GPP PCG (Board) (

Member of IEEE 5G Initiative Steering Committee (Future Networks Initiative) and IEEE IoT Steering Committee.

Vice-Chair, ETSI IPv6 Industry Specification Group :

Member of Future Internet Forum EU Member States (representing Luxembourg).

IPv6 Forum Internet Pioneer Award, 2002IPv6 Life Time Achievement Award, 2016.

Research Fellow @ University of Luxembourg ( since 2006) on multiple European Commission Next Generation Technologies Projects.


Gürkan Solmaz, IoT Research Group, NEC Laboratories Europe, Germany

Gürkan Solmaz is a Senior Researcher in the IoT Research group at NEC Laboratories Europe in Heidelberg, Germany. His research interests include mobile computing/networking, mobility, and cloud-edge systems aspects of IoT with a particular focus on crowd mobility in smart cities as well as autonomous vehicles/drones in IoT applications. He received his BS degree in Computer Engineering from Middle East Technical University (METU) in Turkey and his MS and Ph.D. degrees in Computer Science from the University of Central Florida (UCF) in the USA. He co-authored more than 30 papers and he was co-recipient of two best paper awards and the UCF Computer Science Ph.D. Student of the Year First Runner-up award. He has been a regular member of the technical program committees of IEEE conferences and a member of IEEE, Communications Society (ComSoc), ACM, SIGMOBILE, and ACM Future of Computing Academy (FCA).


Ori Mor, Co-Founder and Vice President of Research & Development Wi-Charge

Ori – a serial entrepreneur who’s served in an elite unit of the Israeli defense forces for years – is the Co-Founder and Vice President of Research & Development of Wi-Charge. Wi-charge is the world leader in wireless power, providing long-distance wireless charging technology through focused infrared beams. Prior to Wi-Charge, Ori was the Founder and CEO of Appoxee Mobile Technologies, a leading SaaS mobile engagement platform that was sold to Teradata (NYSE:TDC). Before Appoxee, Ori held a series of leadership positions at the Electronic Research Department (ERD), the top research and development unit of the Israel Defense Forces. Ori has shared his powerful insights and sense of humor to engage audiences in venues such as CES, the World Mobile Congress, the AWS Innovate Online Conference, and others. He is also a frequent contributor to several publications including Forbes, Electronic 360, Digital Trends, Evaluation Engineering, and Inverse. Ori holds a master’s degree as well as a bachelor’s degree in electrical engineering – Magna Cum Laude – from the Tel-Aviv University. He is the laureate of the Israel Defense Award (2008).


Bala Krishna Maddali, GGS Indraprastha University, New Delhi, India

Bala Krishna Maddali (M. Bala Krishna) received Bachelor of Engineering (B.E.) Degree in Computer Engineering from Delhi Institute of Technology (presently Netaji Subhas University of Technology and formerly Netaji Subhas Institute of Technology), University of Delhi, Delhi, India and Master of Technology (M.Tech.) Degree in Information Technology from University School of Information Technology (presently University School of Information and Communication Technology), Guru Gobind Singh Indraprastha University, Delhi, India. He received Doctor of Philosophy (Ph.D.) Degree in Computer Engineering from JMI Central University, New Delhi, India. He had worked as Senior Research Associate and Project Associate with the Indian Institute Technology, Delhi, India. He worked as Research Associate with the University School of Information Technology, Guru Gobind Singh Indraprastha University, Delhi, India. He is presently working as Assistant Professor in University School of Information and Communication Technology, Guru Gobind Singh Indraprastha University, New Delhi, India. His areas of interest include computer networks, wireless networks, mobile communication networks, network security and Internet of Things. He has publications in International Journals, Conferences, and Book Chapters. He is IEEE Senior Member. He has served as the Workshop Co-Chair and Tutorial Chair/Co-Chair for IEEE Conferences. He has organized the IEEE and ACM Workshops. He is Technical Program Committee (TPC) member for IEEE Conferences.


Talk Title: Participatory Data Sensing for IoT Networks

Abstract: Participatory Sensing comprises of entities and groups that sense the attributed task and contributes for cooperative and collective communication in the network. Smart embedded devices sense the surrounding, initiate the data forwarding process and create new tasks for the neighborhood nodes. Historical data combined with current location-aware sensing considerably reduce the sensing cost. Smart phone users intentionally increase the sensing cost to maximize the incentives, hence location-aware data sharing approach is used to restrict the coverage cost in the network. Mobile crowd sensing based on sensing environment, network topology and current social requirements address the tasks such as data collection and sensing by router nodes and server nodes. The context awareness focuses on specified targets and improves the user participation in the network.


Artificial Intelligence and Machine Learning


The continued integration of Internet of Things (IoT) applications have become more prevalent, due to the improved development in hardware, software, and communication technologies.  This year’s World Forum topical track will discuss how Artificial Intelligence and Machine Learning (AI/ML) can be employed as an enabler for many different IoT applications to advance the society. The emergence of connected devices that provide observations and data measurements from the physical world have facilitated the increase in volume of collected data. AI/ML can provide insights from the data to further enhance the intelligence and the capabilities of IoT applications.

AI/ML approaches are revolutionizing the exploitation of data in products, processes, and services to make it possible to find important patterns and perform complex analysis.  Within the session we will discuss technologies and applications of how AI/ML techniques can be applied to further enhance the intelligence and the capabilities of IoT applications.

Some particular areas of interest include, but are not limited to:

  1. AI for Edge Computing
  2. AI and IoT in a 5G context
  3. AI based Recommender Systems
  4. Distributed Machine Learning
  5. Interpretable Machine Learning
  6. Deep Learning for IoT applications
  7. Reinforcement Learning for IoT applications
  8. Optimization Methods for Machine Learning

Track Co-Chairs

Anthony Smith, Florida Institute of Technology (FIT), Melbourne, Florida, USA

Dr. Anthony Smith holds a MS in Computer Science, a MS in Engineering, and graduated with his PhD from the University of Florida in Computer Engineering.  He is currently a practicing professional Data Scientist and an Assistant Professor of Computer Engineering and Sciences at Florida Institute of Technology (FIT).  Dr. Smith has over 19 years of system/software engineering, and research experience, where he has served as a Principal Investigator and Research Scientist on various industry projects at Harris Corporation, as well as other DoD and government contract organizations. He has an extensive background in the design and development of complex algorithms for various data types (e.g. time-series, video, LiDAR, electro-optical).  Dr. Smith currently holds 16 patents in the areas of advance image and signal processing, and high performance computing. His professional affiliations include The National Academy of Inventors, SPIE, and IEEE.  Dr. Smith is a Co-director of the Information Characterization ad Exploitation (ICE) Lab at FIT.  He has established research in the areas of data science, machine learning, computer vision, and high performance computing.

Mingming Liu, Dublin City University, Ireland

Dr. Mingming Liu is currently an Assistant Professor in the School of Electronic Engineering. He received his B.Eng. degree with first class honours from the Department of Electronic Engineering at the National University of Ireland Maynooth in 2011, and then the PhD degree from the Hamilton Institute from the same university in 2015 with his thesis entitled “Topics in Electromobility and Related Applications”. After that, he joined University College Dublin as a postdoctoral researcher then a senior postdoctoral researcher with the Control Engineering and Decision Science Research Group within the School of Electrical and Electronic Engineering, where he spent almost three years working on both EU and SFI funded projects, including Green Transportation and Networks (SFI) and Enable-S3 (H2020), with strong collaborations with both academia and industry. Before joining DCU, he worked at IBM Ireland lab as a data scientist, applied researcher, and H2020 project lead (5G Solutions), where his main focus was to leverage the state-of-the-art machine learning and applied optimisation techniques for practical and challenging problems arising in the industry. His current research interests include machine/deep learning, data science, centralised & distributed control and optimisation theories with links to electric, hybrid vehicles and IoT in the context of smart grids, intelligent transportation systems and smart cities.



Ziran Wang, InfoTech Labs

Ziran Wang is a research scientist at InfoTech Labs, Toyota Motor North America R&D, Mountain View, CA. Dr. Wang received Ph.D. in mechanical engineering from University of California, Riverside. His research interests include cooperative automation and digital twin of intelligent vehicles.




Takl Title: Artificial Intelligence of Things (AIoT) in Intelligent Vehicles

Abstract: AIoT, a combination of artificial intelligence (AI) and Internet of Things (IoT), has recently become a new trend in the industry. In this talk, an application of AIoT in the automotive industry is presented as an advanced driver assistance system (ADAS) on intelligent vehicles. Drivers of intelligent vehicles are characterized and modelled using a learning approach to enable personalized advisory feature. Meanwhile, all related models in this ADAS are computed on the cloud server, and executed through vehicle-to-cloud communication. Results of human-in-the-loop simulation in Unity game engine, and field implementation on real passenger vehicles are shown.


Yingqi Gu, Dublin City University, Ireland

Yingqi Gu is currently a postdoc research fellow with the Insight Centre for Data Analytics at Dublin City University, and an adjunct lecturer at National University of Ireland Maynooth. Dr. Gu received her Master of Science from School of Engineering, the University of Edinburgh and the Ph.D. in Control Engineering and Decision Science from School of Electrical and Electronic Engineering, University College Dublin. Her current research interests include AI & machine learning, control and optimisation theories with applications to electric vehicles, smart intelligent systems, and healthcare systems.

Talk Title: Leveraging Machine Learning Technologies for Improved Healthcare Systems

Abstract: Medication non-adherence is a widespread problem affecting over 50% of people who have chronic illness and need chronic treatment. Non-adherence exacerbates health risks and drives significant increases in treatment costs. In order to address these challenges, the importance of predicting patients’ adherence has been recognised. In this talk, an approach to predict the injectable medication adherence by using a digital IoT device and machine learning models will be presented. The newly invented ‘smart sharps bin’ and the end-to-end machine learning pipeline will be discussed in great details. Promising predictive performance on patients’ adherence will be demonstrated in this talk.


Mohammad Asad Rehman Chaudhry, Texas A&M University, USA

Mohammad Asad Rehman Chaudhry (PhD Electrical & Computer Engineering, Texas A&M University; MBA University of Toronto-Rotman School of Management) is a seasoned professional and thought-leader spearheading multi-disciplinary projects in Digital Disruption and Future-Tech.

He Chairs IEEE Working Group for the Standards for Software-Defined and Virtualized Ecosystems Performance. He is a cofounder of two companies Soptimizer, and Karbonbloc. He also serves on the Advisory Board of FBIT at Ontario Tech. He previously held industrial and faculty positions at IBM Research, the Hamilton Institute, University of Toronto, DARPA System F6, and the University of Calgary. He received several honors and accolades including a Fulbright Fellowship, and Peter. F Drucker Effective Executive Scholarship.


Talk Title: Blockchain, AI, 5G, IoT: A Marriage Made in Heaven

Abstract: IDC forecasts that there would be more than 41.6 billion connected IoT devices, generating 79.4 zettabytes of data in 2025. On one hand these devices are expected to bring revolutionary comfort to our lives, but on the other hand there would be enormous challenges faced in terms of storage, transmission, privacy, security, authenticity, and meaning of the data generated by these devices. This talk will discuss how Blockchain, AI, and 5G can work together with IoT to tackle these challenges.