Date: November 28 – 30, 2018, Melbourne, Australia

Location: Deakin Downtown, Level 12 Tower 2 at 727 Collins Street, Melbourne, 3000.

Flyer: Demonstration Workshop IoT INSecurity registration (Docx)

Keynote Speakers:

1.  Professor Emeritus Hugh Williams was a Professor in the Department of Mathematics and Statistics at the University of Calgary, Alberta, Canada where he held the prestigious Innovation iCORE Chair in Algorithmic Number Theory and Cryptography. Hugh graduated from the University of Waterloo with Bachelor and Master’s degrees in Mathematics and a PhD in Computer Science on the topic ‘A Generalization of the Lucas Functions’. He was awarded a Killam Research Fellowship by the Canada Council for the period 1983-85, ‘designed to provide support to scholars of exceptional ability who are engaged in research projects of broad significance and widespread interests’. In 1998, Wiley-Interscience in conjunction with the Canadian Mathematical Society published his book ‘Edouard Lucas and Primality Testing’. During his career, he has published many papers on applications of number theory to cryptography. On departing the University of Calgary, he worked for several years at the Canadian Communications Security Establishment, the Government of Canada's national cryptologic agency.

2. Bart Preneel received the Doctorate in Applied Sciences from the Katholieke Universiteit Leuven (KULeuven), Belgium, where he is currently a Professor and Director of the Computer Security and Industrial Cryptography group (COSIC) which has recently officially opened its Embedded Systems Security Lab, the culmination of a five-year project sponsored by a 400k EUR grant from the Hercules Foundation for fundamental and strategic research. 

Bart is a world-renowned cryptography expert, and aside from his other responsibilities, is on the board of management of EEMA, the leading independent non-profit, European think tank focusing on identification, authentication, privacy, risk management, cyber security, the Internet of Things and mobile applications.

Bart is also a well-known saxophone player and jazz conductor. You can see Bart conducting his band in The Netherlands here: and in Rio de Janeiro on this page:



In order for small devices to communicate they must be paired by a common link or protocol; in addition, for vendors to communicate through the same device, a dedicated application is usually required. The current IoT is inherently limited in that it requires special purpose computing as opposed to general purpose computing and because it focuses on high value applications. The authors of [Andersen, M.P., Fierro, G. and Culler, D.E., 2017. Enabling synergy in iot: Platform to service and beyond. Journal of Network and Computer Applications81, pp.96-107] built their own version of a ‘Future IoT’ (FIoT) and, based on the challenges inherent in such a task, present some design criteria which are necessary to enable the world to roll out the type of FIoT they envisage. These authors explain why enclosing complex behaviour, such as device-device recognition and authentication, behind simple structures, and developing contextual relationships from metadata is critical to the success of the FIoT. They argue that software layers will need to take over from firmware, and that at runtime, applications will need to add/replace variables, and programs be modified without rebooting; devices will have to be able to broadcast their features and discover nearby services themselves, entirely unattended by humans or mediating third parties. They give (p.101) explicit reasons for why “Current discovery mechanisms are insufficient…” to achieve this functionality.In particular, authentication of multiple communicating devices based on different hardware, firmware and software and equipped with limited resources will be a major challenge to the success of the FIoT and its global economic impact.

Solutions providing the features mentioned above will revolutionize the way the world operates. This workshop focuses on and deals with potential solutions to only one of the above challenges: that of providing end-to-end cryptographic authentication for the FIoT.


Expected Outcome:

Three feasible ideas for research to be allocated to groups of people to take away for testing and implementation beyond the workshop dates; each having an identified group leader. Further information will be posted nearer the time.



Work-streams are invited to submit papers to special editions of the Journal CRYPTOGRAPHY and/or SENSORS. Click on their logos on this page for more information.


Enquiries to Lynn Batten ( or Leonie Simpson (

  • ASIACRYPT 2018: For those travelling from overseas, you may also like to attend Asiacrypt 2018 in Brisbane, December 2-6.
  • Kangacrypt 2018: For those who may like to spend some holidays in Australia over the summer time here, you may like to attend the Kangacrypt workshop planned for 7-8 December. Information will be available at, or contact Yuval Yarom (