Call for Workshop DLoT

1st International Workshop on Distributed Ledger of Things (DLoT) in conjunction with MobiQuitous 2018

 New York City, United States, November 5-7, 2018

The proliferation of the Internet of Things (IoT) is transforming a variety of sectors such as manufacturing, healthcare, power and energy, transportation and financial services, to name a few. With the advancement of technologies in hardware (e.g., energy-efficient computing, self-powered devices) and communications (e.g., 5G), the scale of IoT systems is expected to expand dramatically, and so is the dimension of data available to the IoT, both spatially and temporally. Such developments are bringing about unprecedented challenges to IoT system management as well as IoT data exchange and processing. While cloud computing has been widely adopted as the backend for IoT data processing, it has its own limitations including network delay and single point of failure. Security and privacy present another important problem as most IoT systems serve critical applications and involve highly sensitive and/or private data. The challenge remains to safeguard IoT systems and data while meeting the performance requirements.

Distributed Ledger (DL), recently most well known in the form of Blockchain, allows for immutable and publicly verifiable record of transactions. DL provides a unique opportunity for IoT applications to boost trust without a centralized party such as the cloud, which has been the bottleneck in terms of both performance and security. However, non-trivial challenges also exist for the synergy of IoT and DL. For example, DL or Blockchain, when applied in IoT, would demand for a high-throughput design due to the high-frequency transactions that might be generated in IoT applications. The resource constraints of IoT devices also prevent them from performing computational-intensive tasks such as proof of work or even storage-intensive tasks. The ubiquitous deployment of IoT devices may render them vulnerable to severe attacks such as tampering. How to assure DL-based IoT system security under such attacks may involve novel design not only at application level but also at hardware level.

This workshop aims to bring together the technologists and researchers who share interest in the joint areas of Distributed Ledger, IoT and novel applications based on their synergy. It will serve as the platform to explore new venues of collaboration and to discuss opportunities and challenges in the research, design, and engineering of IoT, Distributed Ledger and their applications. We plan to seek papers that address theoretical and experimental research, as well as work in-progress for related issues in DL-supported IoT or IoT-inspired DL design.

The workshop will focus on, but will not be limited to, the following topics of interest:

  • Novel IoT architecture based on distributed trust
  • Distributed IoT data management
  • Distributed IoT system management
  • High-throughput consensus protocols for IoT
  • Heterogeneous consensus for IoT
  • Incentive mechanism design for Distributed Ledger-based IoT
  • Game-theoretical study for Distributed Ledger-based IoT
  • Novel cryptographic primitives for Distributed Ledger/Blockchain in IoT
  • Novel security protocols for Distributed Ledger-based IoT
  • Novel distributed data storage techniques
  • Distributed data access control
  • Novel hardware design in Distributed Ledger-based IoT
  • Cryptocurrency in IoT scenarios
  • Security, privacy and anonymity in the synergy of Distributed Ledger and IoT
  • Attacks and cryptoanalysis
  • Re-design of cloud-based IoT with Distributed Ledger
  • Mobile cloud in Distributed Ledger-based IoT
  • Novel distributed communication protocols for IoT
  • Case study, prototype and novel applications

Instructions for Authors

Papers should be in English. Regular papers should be up to 8 pages in length (6 page is recommended). Short papers should not exceed 3 pages. Position papers and survey papers are also welcome. Previously published work may not be submitted, nor may the work be concurrently submitted to any other conference or journal. Such papers will be rejected without review. The paper submissions must follow the ACM formatting guidelines (see Author’s kit section).  Read the Publication Ethics and Malpractice Statement. Papers must be formatted using the ACM Author’s Kit. Detailed instructions and templates are available at


Extended Submission deadlineSeptember 17, 2018 (11:59PM Pacific Time)
Extended Acceptance notification: October 2, 2018
Extended Camera-ready deadline: October 10, 2018
Workshop: November 5, 2018

Workshop Co-chairs
Shucheng Yu, Stevens Institute of Technology, USA)
Xuan ‘Silvia’ Zhang, Washington University in St. Louis, USA)
Hong-Sheng Zhou, Virginia Commonwealth University, USA)

Keynote Speakers:

Wenjing Lou, Virginia Tech

Moti Yung, Columbia University & Google

Technique Committee Members:

Bo Chen, Michigan Technological University

Yu Chen, Binghamton University

Liang Cheng, Lehigh University

Xiuzhen (Susan) Cheng, George Washington University

Sherman Chow, Chinese University of Hong Kong

Song Han, University of Connecticut

Ming Li, University of Arizona

Wenjia Li, New York Institute of Technology

Yao Liu, University of South Florida

Yu Long, Shanghai JiaoTong University

Zhuo Lu, University of South Florida

Mehrdad Nojoumian, Florida Atlantic University

Mohammad Ashiqur Rahman, Tennessee Tech University

Krishnamurthy Subramani, West Virginia University

Qiang Tang, New Jersey Institute of Technology

Alvaro Velasquez, AFRL

Honggang Wang, University of Massachusetts, Dartmouth

Yongge Wang, University of North Carolina at Charlotte

Qiben Yan, University of Nebraska–Lincoln

Kan Yang, University of Memphis

Jiawei Yuan, Embry-Riddle Aeronautical University

Kai Zeng, George Mason University

Haibin Zhang, University of Maryland, Baltimore County

Yuan Zhang, Nanjing University