BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
DTSTART:20230312T030000
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:PDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20231105T010000
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:PST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20230718T220044Z
UID:5D9294E9-D3C3-4D42-AD8F-1BCE1F79E68D
DTSTART;TZID=America/Los_Angeles:20230718T140000
DTEND;TZID=America/Los_Angeles:20230718T150000
DESCRIPTION:Abstract:\n\nThe Global Wearable market is anticipated to rise 
 considerably in the coming years\, and communication is a fundamental bloc
 k in any wearable device. In communication\, encryption methods are being 
 used with microcontrollers or software implementations\, which are power-c
 onsuming and incorporate complex hardware implementation. Internet of Thin
 gs (IoT) devices are considered resource-constrained devices that are expe
 cted to operate with low computational power and resource utilization crit
 eria\, making the conventional security scheme not suitable for the new tr
 end of miniaturized devices. At the same time\, recent research has shown 
 that loT devices are highly vulnerable to emerging security threats\, whic
 h elevates the need for low-power and small-size hardware-based security c
 ountermeasures.\n\nWith quantum computing on the horizon\, researchers are
  also warning about the failure of our conventional encryption architectur
 es. Chaotic encryption is a method of data encryption that utilizes chaoti
 c systems and non-linear dynamics to generate secure encryption keys. In t
 his talk\, we describe the pre-quantum physical and encryption attacks on 
 resource-constrained devices and make our way into understanding the effec
 t of quantum computing on the security of our wearable and loT devices\, a
 nd propose potential solutions to keep our post-quantum era data safe.\n\n
 Speaker(s): Dr. Ava Hedayatipour\n\nVirtual: https://events.vtools.ieee.or
 g/m/364493
LOCATION:Virtual: https://events.vtools.ieee.org/m/364493
ORGANIZER:kamala@ieee.org
SEQUENCE:17
SUMMARY:Security for IoT Devices: A Discussion on Low Power &amp; Post Quantum 
 Ciphering
URL;VALUE=URI:https://events.vtools.ieee.org/m/364493
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;&lt;strong&gt;&lt;u&gt;Abstract:&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;\n&lt;p&gt;
 The Global Wearable market is anticipated to rise considerably in the comi
 ng years\, and communication is a fundamental block in any wearable device
 . In communication\, encryption methods are being used with microcontrolle
 rs or software implementations\, which are power-consuming and incorporate
  complex hardware implementation. Internet of Things (IoT) devices are con
 sidered resource-constrained devices that are expected to operate with low
  computational power and resource utilization criteria\, making the conven
 tional security scheme not suitable for the new trend of miniaturized devi
 ces. At the same time\, recent research has shown that loT devices are hig
 hly vulnerable to emerging security threats\, which elevates the need for 
 low-power and small-size hardware-based security countermeasures.&lt;/p&gt;\n&lt;p&gt;
 With quantum computing on the horizon\, researchers are also warning about
  the failure of our conventional encryption architectures. Chaotic encrypt
 ion is a method of data encryption that utilizes chaotic systems and non-l
 inear dynamics to generate secure encryption keys. In this talk\, we descr
 ibe the pre-quantum physical and encryption attacks on resource-constraine
 d devices and make our way into understanding the effect of quantum comput
 ing on the security of our wearable and loT devices\, and propose potentia
 l solutions to keep our post-quantum era data safe.&lt;/p&gt;
END:VEVENT
END:VCALENDAR

