The 8th IFIP International Conference on New Technologies, Mobility and Security was held between 21st and 23rd November 2016 in Larnaca, Cyprus. NTMS’2016 aimed at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provided a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas. The event was combined with tutorial sessions and workshops. The NTMS 2016 conference was co-sponsored by IEEE, IEEE COMSOC & IFIP TC6.5 working groups, making if of great relevance to the UMI consortium and the UMI themes.
The project presentation, entitled “Exploiting Ubiquitous Computing, Mobile Computing and the Internet of Things to Promote Science Education”, was organized by the Computer and Technology Institute & Press from Greece. It was included in the conference technical program as a part of a special workshop on “Innovative Projects”.
The main goal of this workshop was to enable industrial partners and academics to present their latest innovations and technological developments, as well as to exchange ideas and facilitate the collaboration between community members. Detailed information about the project goals, partners, division of work and plans was shared by the presenter Nicolas Sklavos.
Tutorial on “Cryptography and Security in Internet of Things”
UMI also played a role among tutorials that preceded the main Conference. After an invitation of NTMS 2016 committee, Nicolas Sklavos and I. D. Zaharakis of CTI organized a tutorial on “Cryptography and Security in Internet of Things (IoTs): Models, Schemes, and Implementations”.
Internet of Things (IoT) has become one of the hottest topics for academia and industry alike over the past few years. Specifically, security and privacy issues around IoT are of great importance. This tutorial combined models, schemes and implementation aspects, regarding the alternative technologies and devices of IoT. It focussed on the knowledge of the implementation efficiency, basically in hardware aspects, of communications confidentiality, user authentication, data integrity and services availability. Attacks and modern threats, as well as to countermeasures against them, were considered. Different IoT infrastructures were presented and alternative trust models were illustrated. Policy issues were also discussed.