Date: November 28 – 30, 2018, Melbourne, Australia

Location: Deakin Downtown, Level 12 Tower 2 at 727 Collins Street, Melbourne, 3000.



In order for small devices to communicate they must be paired by a common link or protocol; in addition, for vendors to communicate through the same device, a dedicated application is usually required. The current IoT is inherently limited in that it requires special purpose computing as opposed to general purpose computing and because it focuses on high value applications. The authors of [Andersen, M.P., Fierro, G. and Culler, D.E., 2017. Enabling synergy in iot: Platform to service and beyond. Journal of Network and Computer Applications81, pp.96-107] built their own version of a ‘Future IoT’ (FIoT) and, based on the challenges inherent in such a task, present some design criteria which are necessary to enable the world to roll out the type of FIoT they envisage. These authors explain why enclosing complex behaviour, such as device-device recognition and authentication, behind simple structures, and developing contextual relationships from metadata is critical to the success of the FIoT. They argue that software layers will need to take over from firmware, and that at runtime, applications will need to add/replace variables, and programs be modified without rebooting; devices will have to be able to broadcast their features and discover nearby services themselves, entirely unattended by humans or mediating third parties. They give (p.101) explicit reasons for why “Current discovery mechanisms are insufficient…” to achieve this functionality.In particular, authentication of multiple communicating devices based on different hardware, firmware and software and equipped with limited resources will be a major challenge to the success of the FIoT and its global economic impact.

Solutions providing the features mentioned above will revolutionize the way the world operates. This workshop focuses on and deals with potential solutions to only one of the above challenges: that of providing end-to-end cryptographic authentication for the FIoT.


Expected Outcome:

Three feasible ideas for research to be allocated to groups of people to take away for testing and implementation beyond the workshop dates; each having an identified group leader. Further information will be posted nearer the time.

Keynote Speaker:

Dr. Veena Pureswaran is a Company Research Engineer at IBM, has spent more than 12 years in the Electronics industry and has held leadership positions in product development, strategy and management. She is currently the Global Electronics Industry Leader at the IBM Institute for Business Value, responsible for developing thought leadership for the industry. She is a co-author of Pureswaran, V. and Brody P. (2014) Device Democracy: Saving the Future of the Internet of Things, IBM. 25 pages. Available at:

Invited Presentations:

  • Auto-ID Labs, The University of Adelaide, represented by its Director, Damith Ranasinghe. The Lab investigates Security for IoT as well as Wearable Computing and Embedded Systems, and applications of these to health and smart cities.
  • IoT Alliance Australia represented by Matt Tett, Managing Director and also the Cyber Security and Network Resilience Workstream Chair. Matt is also Managing Director of Enex TestLabs in Melbourne. Matt will provide workshop attendees with an overview on the IoTAA Security Strategy and the IoTAA direction for the future of IoT Security in Australia.
  • IoT (Internet of Things) Security – a demonstration by Dr. Ray Hunt, University of Canterbury, NZ. This demonstration will make use of commonly available devices such as Wifi switches, Wifi lights, Wifi thermostats and music players to analysis standard techniques (or lack thereof) to secure IoT devices.
  • Prof. Michael Sheng, Department of Computing, Faculty of Science and Engineering, Macquarie University. ‘Efficient Management of Things for the Future World Wide Web’.
  • Prof. Margreta Kuijper, University of Melbourne. ‘Ensuring reliable communication’.
  • Dr. Omid Kavahei, The University of Sydney. ‘Cyber-physical systems security and what nanotechnology has to offer.’
  • Prof. Seng Loke, Deakin University, Melbourne. ‘Crowd-powered mobile computing and smart things.’
  • Prof. Lejla Batina, Radboud University, Nijmegen, The Netherlands. TOPIC: TBA


Space is limited to 50 people, so please register (for free) early. Watch this space.

Accommodation at various levels of pricing and close to the venue will be listed on our website nearer the event. .

Travel Support

Travel Support: Doctoral students are encouraged to participate and may apply for some travel support.


  1. In advance of the workshop, all major speakers will be asked to propose 2 or 3 possible research projects.
  2. All break-out groups will be led by facilitators and given detailed instructions. Facilitators and panellists will be chosen well in advance of the workshop.
  3. By the end of the workshop, we will have identified three major research projects and leading players who will carry them into the future with targets of obtaining publications and funding to meet their objectives. Every workshop participant is encouraged to join one of these teams.

Enquiries to Lynn Batten ( or Leonie Simpson (

  • ASIACRYPT 2018: For those travelling from overseas, you may also like to attend Asiacrypt 2018 in Brisbane, December 2-6.
  • Kangacrypt 2018: For those who may like to spend some holidays in Australia over the summer time here, you may like to attend the Kangacrypt workshop planned for 7-8 December. Information will be available at, or contact Yuval Yarom (