1st International Workshop on Distributed Ledger of Things (DLoT) in conjunction with MobiQuitous 2018
New York City, United States, November 5-7, 2018
The proliferation of the Internet of Things (IoT) is transforming a variety of sectors such as manufacturing, healthcare, power and energy, transportation and financial services, to name a few. With the advancement of technologies in hardware (e.g., energy-efficient computing, self-powered devices) and communications (e.g., 5G), the scale of IoT systems is expected to expand dramatically, and so is the dimension of data available to the IoT, both spatially and temporally. Such developments are bringing about unprecedented challenges to IoT system management as well as IoT data exchange and processing. While cloud computing has been widely adopted as the backend for IoT data processing, it has its own limitations including network delay and single point of failure. Security and privacy present another important problem as most IoT systems serve critical applications and involve highly sensitive and/or private data. The challenge remains to safeguard IoT systems and data while meeting the performance requirements.
Distributed Ledger (DL), recently most well known in the form of Blockchain, allows for immutable and publicly verifiable record of transactions. DL provides a unique opportunity for IoT applications to boost trust without a centralized party such as the cloud, which has been the bottleneck in terms of both performance and security. However, non-trivial challenges also exist for the synergy of IoT and DL. For example, DL or Blockchain, when applied in IoT, would demand for a high-throughput design due to the high-frequency transactions that might be generated in IoT applications. The resource constraints of IoT devices also prevent them from performing computational-intensive tasks such as proof of work or even storage-intensive tasks. The ubiquitous deployment of IoT devices may render them vulnerable to severe attacks such as tampering. How to assure DL-based IoT system security under such attacks may involve novel design not only at application level but also at hardware level.
This workshop aims to bring together the technologists and researchers who share interest in the joint areas of Distributed Ledger, IoT and novel applications based on their synergy. It will serve as the platform to explore new venues of collaboration and to discuss opportunities and challenges in the research, design, and engineering of IoT, Distributed Ledger and their applications. We plan to seek papers that address theoretical and experimental research, as well as work in-progress for related issues in DL-supported IoT or IoT-inspired DL design.
The workshop will focus on, but will not be limited to, the following topics of interest:
- Novel IoT architecture based on distributed trust
- Distributed IoT data management
- Distributed IoT system management
- High-throughput consensus protocols for IoT
- Heterogeneous consensus for IoT
- Incentive mechanism design for Distributed Ledger-based IoT
- Game-theoretical study for Distributed Ledger-based IoT
- Novel cryptographic primitives for Distributed Ledger/Blockchain in IoT
- Novel security protocols for Distributed Ledger-based IoT
- Novel distributed data storage techniques
- Distributed data access control
- Novel hardware design in Distributed Ledger-based IoT
- Cryptocurrency in IoT scenarios
- Security, privacy and anonymity in the synergy of Distributed Ledger and IoT
- Attacks and cryptoanalysis
- Re-design of cloud-based IoT with Distributed Ledger
- Mobile cloud in Distributed Ledger-based IoT
- Novel distributed communication protocols for IoT
- Case study, prototype and novel applications
Instructions for Authors
Papers should be in English. Regular papers should be up to 8 pages in length (6 page is recommended). Short papers should not exceed 3 pages. Position papers and survey papers are also welcome. Previously published work may not be submitted, nor may the work be concurrently submitted to any other conference or journal. Such papers will be rejected without review. The paper submissions must follow the ACM formatting guidelines (see Author’s kit section). Read the Publication Ethics and Malpractice Statement. Papers must be formatted using the ACM Author’s Kit. Detailed instructions and templates are available at https://mobiquitous.org/authors-kit/
Extended Submission deadline: September 17, 2018 (11:59PM Pacific Time)
Extended Acceptance notification: October 2, 2018
Extended Camera-ready deadline: October 10, 2018
Workshop: November 5, 2018
Workshop Co-chairs
Shucheng Yu, Stevens Institute of Technology, USA)
Xuan ‘Silvia’ Zhang, Washington University in St. Louis, USA)
Hong-Sheng Zhou, Virginia Commonwealth University, USA)
Keynote Speakers:
Wenjing Lou, Virginia Tech
Moti Yung, Columbia University & Google
Technique Committee Members:
Bo Chen, Michigan Technological University
Yu Chen, Binghamton University
Liang Cheng, Lehigh University
Xiuzhen (Susan) Cheng, George Washington University
Sherman Chow, Chinese University of Hong Kong
Song Han, University of Connecticut
Ming Li, University of Arizona
Wenjia Li, New York Institute of Technology
Yao Liu, University of South Florida
Yu Long, Shanghai JiaoTong University
Zhuo Lu, University of South Florida
Mehrdad Nojoumian, Florida Atlantic University
Mohammad Ashiqur Rahman, Tennessee Tech University
Krishnamurthy Subramani, West Virginia University
Qiang Tang, New Jersey Institute of Technology
Alvaro Velasquez, AFRL
Honggang Wang, University of Massachusetts, Dartmouth
Yongge Wang, University of North Carolina at Charlotte
Qiben Yan, University of Nebraska–Lincoln
Kan Yang, University of Memphis
Jiawei Yuan, Embry-Riddle Aeronautical University
Kai Zeng, George Mason University
Haibin Zhang, University of Maryland, Baltimore County
Yuan Zhang, Nanjing University