Abstract

Past Proceedings

Keynote

Welcome

Vinayak Hegde, President, IIESoc

Welcome

Please reload

IETF

Fred Baker, USA

Fred Baker, who has been involved and worked in the IETF for years, will introduce the community, the organization, and their approach to the Internet. This will necessarily involve structure and cross-area activities, but will also discuss the group-think and objectives of IETF participants.

Please reload

The IETF Security Area

Paul Wouters, RedHat, Canada

There are two dozen Working Groups in the Security Area. This talk will
give an overview of recently published RFCs and current draft documents
that are being discussed, such as TLS 1.3, TLS SNI, IPsec extensions and
updated and PostQuantum Cryptography.

Please reload

Standardization Approach

Pradeep Kathail, Cisco, USA

IETF standardisation strategy/best practices and Cisco approach

Please reload

IoT Track

Introduction

Krishnananda Shenoy, Infosys

Introduction to the IoT Track

IoT Landscape in IETF

Carsten Bormann, TZI, Germany

Interconnecting "things" with each other as well as the Internet is one of the most important technology trend. Carsten will first introduce the concept behind the internet of things and then give an overview of the various IoT related work that has been going on in the IETF in the recent past as well upcoming work. 

Securing the IoT Networks: issues and possibly solutions.

Syam Madanapalli, NTT DATA Services, India

As world becomes more and more connected, the hackers are finding more ways to steal our data and threatening our lives. This slows the adoption of IoT in critical applications that involves humans lives such healthcare, industrial and other applications that involve remote control in the physical world. Securing IoT applications is different from cyber security of information systems and require a new thinking to come up with new Security Models. During this Talk, Syam will discuss the following:

- How the IoT Security is different from cyber security

- Why a new thinking is required to secure the Internet of Things

- The need for the ability to prosecute the hackers

- Design thinking and new models for securing the Internet of Things

- How IETF RFCs (related to IPSec, PKI, ACE WG etc.) would support these security models

State of compression in IoT Protocols

Rahul Arvind Jadhav, Huawei, India

In IoT, the networks and devices are more constrained than ever before, thus protocols are undergoing an overhaul to accommodate such needs. The talk presents, mostly the ongoing work in IETF, about various efforts to compress the protocols so as to reduce the network usage. Why RoHC was not the right candidate and the emergence of 6lo-over-foo standards, to the recent addition of SCHC (pronounced SCHIC) for LPWAN deployments. The protocols have undergone changes at different layers including networks (6lo adaptation) and applications (CoAP). I will present the rationale for introducing such changes and will specifically talk about:

1. RoHC and why it was not suited

2. 6lo-over-foo (6loWPAN, 6loBLE, 6loMSTP, 6loNFC) compression... The assumptions on the underlying L2. Best-case, worst-case compression efficiency.

3. Why 6lo was not good enough for LPWANs ? Introducing SCHC with its assumption set.

4. GHC (Generic Header Compression) and its use-cases

5. Control plane compression. Source routing header compression.

6.Compression of application payloads namely, HTTP to COAP, JSON to CBOR, use of SIDs etc.

Evolving IoT security and management standards for the enterprise

Elliot Lear, Cisco, Switzerland

Between the number of total devices and the number of types of devices that are being used by enterprises, in short order there will not be enough people on the Earth to administer them.  New means of scale are required.  In addition, other challenges face us.  Do old assumptions,  hold?  We'll survey some of the emerging standards like Manufacturer Usage Descriptions and CoAP while examining some old ones, like DNS and NTP to have some sense of how they fit in the picture (if at all) when they are part of critical infrastructure.

Please reload

SDN Track

Introduction

Sujay Gupta, IP Infusion

Introduction to the SDN track