ECAI-2022: 14TH EDITION OF INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE
PROGRAM FOR FRIDAY, JULY 1ST
Days:
previous day
all days

View: session overviewtalk overview

09:30-11:00 Session 6: ECAI KEYNOTE LECTURES –II

ECAI KEYNOTE LECTURES –II

Location: Aula Room
09:30
Internet of Things: Concepts, Recent Trends and Key Challenges

ABSTRACT. Internet of Things (IoT) or Internet of Everything (IoE) is a new technological paradigm that can enable seamless interconnection of different types of diverse intelligent devices or smart sensors and smart computing systems (Edge, Mist/Fog or Cloud) by using different kinds of wireless technologies through an internet for providing innovative solutions to various challenges and issues related to the real-time accurate and reliable event detection, classification or recognition and prediction tasks in the application domains of smart healthcare, smart building, environment monitoring, surveillance, energy management and smart grid, industry automation, smart city, smart agriculture and farm, autonomous vehicles, transportation, AR/VR and so on. There are still many open research challenges and constraints that need to be addressed to alleviate major problems such as energy efficiency of connected devices, device and data security, interoperability, and communication failure and network coverage to achieve the full potential of IoT/IoE by considering resource constraints.

This talk presents the concept of IoT/IoE, basic IoT architecture (IoT reference model), and different kinds of wireless technologies that can be used for implementation of IoT enabled event monitoring system and then presents current state of research on the IoT by identifying current trends and key challenges addressed in the literature. The second part of the presentation includes the recent trends and challenges in Edge, Fog/ Mist and Cloud computing in IoT paradigms. Finally, with reference to internet of medical things (IoMT), it presents different energy reduction strategies for improving energy efficiency of IoT-Edge health monitoring systems (i.e. maximizing lifetime of battery operated devices) and also energy harvesting techniques for enabling long-term continuous monitoring of events in real-time.

10:10
Analysis of cryptographic protocols in theory of witness functions

ABSTRACT. Encrypting the messages exchanged in a protocol is not enough to guarantee the confidentiality of the data exchanged. Indeed, a man in the middle can fool the rules of the protocol to know what they are not entitled to. An appropriate method of analyzing protocols must be used. There are several effective methods such as the witness functions method developed at LSI of Laval University. We will talk about the theory of witness functions in the analysis of cryptographic protocols and the excellent results that have been achieved with these functions regarding their security.

11:00-11:30Coffee break, Discussions and Brokerage events

Coffe Break

14:00-15:30Lunch Break

Lunch Break

17:00-17:30Coffee break, Discussions and Brokerage events

Coffe Break