BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
DTSTART:20230312T030000
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20231105T010000
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20231007T040212Z
UID:D58557AA-EBC8-41E8-915C-79742744D196
DTSTART;TZID=America/New_York:20231003T180000
DTEND;TZID=America/New_York:20231003T200000
DESCRIPTION:Abstract: Communication security is one of the top security cha
 llenges for connected devices\, especially for physical devices connected 
 through wireless access networks. Wireless links\, often as the last mile\
 , use un-guided medium as communication channels\, and therefore gathering
  wireless data transmission is easier when compared to traditional cable s
 ystems. Wireless communication is thus prone to security vulnerabilities f
 rom the very beginning. At the same time\, parts of device hardware are de
 signed for use by everyone\, which gives potential attackers physical acce
 ss to the system. Most current wireless access networks apply conventional
  cryptographic approaches implemented on upper-layer operations to provide
  confidentiality/authentication/data integrity. This generally requires a 
 high computational platform and managing secrets\, which may not exist in 
 all IoT devices. In this talk\, physical layer security is addressed at wa
 veform level by applying chaos theory. The cost-effective features include
  the simplicity of communication setup\, the low power-consuming devices t
 o generate and control chaotic signals\, and no need of using complicated 
 and energy consuming devices to avoid nonlinearities. The sensitivity to i
 nitial condition and complex dynamic feature make it a promising approach 
 for physical layer security.\n\nCo-sponsored by: IEEE Student Branch at LI
 U-Brooklyn\, NY IEEE Student Branch at NYU\, IEEE Student Branch at New Yo
 rk City College of Technology (CityTech)\, IEEE Computer NY Chapter\, IEEE
  Systems\, Man\, and Cybernetics (SMC) NY Chapter\, \n\nSpeaker(s): Prof. 
 Hong Zhao\, \n\nAgenda: \n- Event Agenda -\n\nEvent Agenda: 6:00 PM\n\nWel
 come Remark – IEEE NY Section Chair\, Robert M. Pellegrino\n\n6:10 ~ 7:1
 0 PM (Presentation)\n\nProviding Security for Edge Devices in Last Mile Co
 nnection\n\nHong Zhao\, Professor of Electrical and Computer Engineering\,
  Fairleigh Dickinson University\n\n7:10 PM Q/A The event is free to attend
 .\n\nALL ARE WELCOME\n\nVirtual: https://events.vtools.ieee.org/m/375815
LOCATION:Virtual: https://events.vtools.ieee.org/m/375815
ORGANIZER:ptchung@ieee.org
SEQUENCE:33
SUMMARY:NY IEEE Day 2023 Seminar - Providing Security for Edge Devices in L
 ast Mile Connection
URL;VALUE=URI:https://events.vtools.ieee.org/m/375815
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;: Communication s
 ecurity is one of the top security challenges for connected devices\, espe
 cially for physical devices connected through wireless access networks. Wi
 reless links\, often as the last mile\, use un-guided medium as communicat
 ion channels\, and therefore gathering wireless data transmission is easie
 r when compared to traditional cable systems. Wireless communication is th
 us prone to security vulnerabilities from the very beginning. At the same 
 time\, parts of device hardware are designed for use by everyone\, which g
 ives potential attackers physical access to the system. Most current wirel
 ess access networks apply conventional cryptographic approaches implemente
 d on upper-layer operations to provide confidentiality/authentication/data
  integrity. This generally requires a high computational platform and mana
 ging secrets\, which may not exist in all IoT devices. In this talk\, phys
 ical layer security is addressed at waveform level by applying chaos theor
 y. The cost-effective features include the simplicity of communication set
 up\, the low power-consuming devices to generate and control chaotic signa
 ls\, and no need of using complicated and energy consuming devices to avoi
 d nonlinearities. The sensitivity to initial condition and complex dynamic
  feature make it a promising approach for physical layer security.&lt;/p&gt;&lt;br 
 /&gt;&lt;br /&gt;Agenda: &lt;br /&gt;&lt;p&gt;&lt;strong&gt;- Event Agenda -&lt;/strong&gt;&lt;/p&gt;\n&lt;p&gt;&lt;strong
 &gt;&lt;em&gt;Event Agenda: &lt;/em&gt;&lt;/strong&gt;&lt;strong&gt;6:00 PM&lt;/strong&gt;&lt;/p&gt;\n&lt;p&gt;&lt;strong&gt;
 Welcome Remark&lt;/strong&gt;&amp;nbsp\;&amp;ndash\; IEEE NY Section Chair\, Robert M. P
 ellegrino&lt;/p&gt;\n&lt;p&gt;&lt;strong&gt;&lt;em&gt;6:10&amp;nbsp\; ~ 7:10 PM (Presentation)&lt;/em&gt;&lt;/s
 trong&gt;&lt;/p&gt;\n&lt;p&gt;&lt;strong&gt;Providing Security for Edge Devices in Last Mile Co
 nnection&lt;/strong&gt;&lt;/p&gt;\n&lt;p&gt;&lt;strong&gt;Hong Zhao\, Professor of Electrical and 
 Computer Engineering\, &lt;/strong&gt;&lt;strong&gt;Fairleigh Dickinson University&lt;/st
 rong&gt;&lt;/p&gt;\n&lt;p&gt;&lt;strong&gt;&lt;em&gt;7:10 PM Q/A&lt;/em&gt;&lt;/strong&gt;&amp;nbsp\;The event is fre
 e to attend.&lt;/p&gt;\n&lt;p&gt;&lt;strong&gt;ALL ARE WELCOME&lt;/strong&gt;&lt;/p&gt;\n&lt;p&gt;&lt;strong&gt;&lt;em&gt;
 &amp;nbsp\;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;\n&lt;p&gt;&lt;strong&gt;&lt;em&gt;&amp;nbsp\;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
END:VEVENT
END:VCALENDAR

