ReSyS 2012

ReSyS - The First Workshop on Resilient Cyber-physical SystemS, M√ľnchen, Germany

Welcome to the First Workshop on Resilient Cyber-physical SystemS

Cyber-physical systems support domains of social infrastructures in monitoring and controlling their physical environment. Context data of a physical environment is being collected by sensors, digitally processed as well as stored, and as a result processes and flows of this physical environment are controlled.

However, social infrastructures are threatened by crime, terrorism, and natural disasters.A lesson learned from latest dramatically unwanted interference - Great East Japan Earthquake and its consequences - is that Cyber-physical systems cannot be protected against failures. There is always the possibility of an unexpected interference that breaks the assumptions of current risk management guidelines and standards. Resilience aims at an equilibrium of a system in case of interferences. It is not only understood in terms of resistance against threats and attacks (prevent and protect) but also in terms of the ability to mitigate them (respond). The affected system should still deliver trusted services in an hostile environment. A resilient Cyber-physical system consists of numerous components, such as sensors, working with each other in a decentralised way such that when some components fail, the system as a whole dynamically uses equivalent ones and runs the expected service continuously while at the same time fulfilling security requirements at an acceptable degree. Objective

The workshop focuses on identifying open research questions and discussing mechanisms to establish this property. Additionally to accepted articles and their presentations, we plan to offer a combined demo, poster and video session to foster hands-on experience, discussion and collaboration among participants. Each full paper session focuses on papers with solid research results.

Topics

Topics of interest include, but are not restricted to:

Context-based security mechanisms

  • Context-based mobile wireless authentication
  • Context-based device pairing
  • Securing context-aware applications
  • Sensor-, context-, and location-based authentication
  • Spontaneous secure context-based device interactions
  • Cyber-physical security
  • Autonomic and Dependable Computing

  • Methods and Techniques for Self-Configuration, Self-Healing, Self-Protecting
  • Distributed Systems and Agents
  • Flexible and Secure Orchestration of ICT Services
  • Trustworthy Organic Computing
  • Privacy in Cyber-physical systems

  • Establishing and managing trust in cyber physical systems
  • Anonymous/pseudonymous context aware mobile computation
  • Legal and social issues of security and privacy for mobile devices
  • Perception of security and privacy in mobile computing
  • Resilient cryptography

  • Entropy of context based keys
  • Fuzzy cryptography
  • Security with noisy data
  • We are seeking unpublished and original submissions in PDF format. Submission should follow the ARCS workshop template and not exceed 6 pages. The review process is double blind and authors are asked to remove any indication to their identity from their submission.

    Submission instructions

    Authors should prepare an Adobe Acrobat PDF version of their full paper. Papers must not exceed 6 pages formatted according to the VDE formatting rules. A Latex template is available. Papers will be rigorously reviewed by an international technical program committee. Accepted submissions will be published in the ARCS Workshop Proceedings which will be indexed by IEEEexplore.