Skip to main content
European Commission logo print header

Large-Scale Experiments of IoT Security Trust

Resultado final

Test generation strategies for large-scale IoT security testing - v2

Definition and description of the three test generation strategies to derive test cases for large-scale IoT security testing (final version)

Report on collaboration and clustering activities-period2

Report on the collaboration and clustering activities (i.e. cluster and inter-cluster participation, inter-project and inter-initiative participation, etc.)

Study of support for the design and secure interoperability of multiple IoT applications

Analysis of the challenges and potential approaches/solutions to support design and secure interoperability of multiple IoT applications.

Definition of the Large-Scale IoT Security & Trust Benchmarking Methodology

The benchmarking methodology for measuring and then comparing Large-Scale IoT Security & Trust solutions.

ARMOUR Experimentation approach and plans

the ARMOUR systematic approach to experimentation and the experimentation plans for each of the ARMOUR experiments.

Test generation strategies for large-scale IoT security testing - v1

Definition and description of the three test generation strategies to derive test cases for large-scale IoT security testing (first version)

Study of security and privacy aspects in IoT application lifecycle

Analysis of the challenges and potential approaches/solutions to support the lifecycle of IoT applications.

Generic test patterns and test models for IoT security testing

Definition and description of the input testing artefacts for IoT security testing: test pattern and test model

Report on collaboration and clustering activities-period1

Report on the collaboration and clustering activities (i.e. cluster and inter-cluster participation, inter-project and inter-initiative participation, etc.)

Dissemination Report - period2

Project dissemination report for second project year Includes also the new versions of the dissemination materials created up until delivery date

ARMOUR testing and certification process

Definition of the ARMOUR testing and certification system for labelling/certifying secure & trusted solutions proper for the large-scale Internet-of-Things.

Report on testbeds integration assessment and integration improvements

Report on testing and validation of the integration with IOT-LAB and FIESTA testbeds and required integration improvements.

ARMOUR Experiments and Requirements

the through definition of the ARMOUR experiments and their requirements for IoT Large-Scale Security & Trust experimentations

Dissemination Report - period1

Project dissemination report for first project year Includes also the new versions of the dissemination materials created up until delivery date

Experiments’ execution reporting and benchmarks

the report on ARMOUR experiments execution and its results including the benchmarking of the ARMOUR experiments.

Testbeds detailed analysis and integration guidelines

Detailed analysis, practical guides, approaches, blueprints, to help integrators to put ARMOUR solutions in testbeds.

Integrated ARMOUR experimentation data and benchmarks with FIESTA testbeds

Technical integration of ARMOUR experimentation data and benchmarks with the FIESTA data-driven IoT/Cloud testbed.

Integrated ARMOUR experimentation services with FIT IoT-LAB testbed

Technical integration of the ARMOUR Security & Trust Experimentation framework with the FIT IoT-LAB testbed.

ARMOUR benchmarking & certification centre

Establishment of the benchmarking and certification centre for large-scale IoT Security & Trust solutions.

Dissemination Materials

Report on the first kit of ARMOUR dissemination materials

Publicaciones

Understanding the Limits of LoRaWAN

Autores: Ferran Adelantado, Xavier Vilajosana, Pere Tuset-Peiro, Borja Martinez, Joan Melia-Segui, Thomas Watteyne
Publicado en: IEEE Communications Magazine, Issue 55/9, 2017, Page(s) 34-40, ISSN 0163-6804
Editor: Institute of Electrical and Electronics Engineers
DOI: 10.1109/mcom.2017.1600613

MABO-TSCH: Multihop and blacklist-based optimized time synchronized channel hopping

Autores: Pedro Henrique Gomes, Thomas Watteyne, Bhaskar Krishnamachari
Publicado en: Transactions on Emerging Telecommunications Technologies, 2017, Page(s) e3223, ISSN 2161-3915
Editor: John Wiley & Sons, Ltd.
DOI: 10.1002/ett.3223

CCR: Cost-aware cell relocation in 6TiSCH networks

Autores: Tengfei Chang, Thomas Watteyne, Xavier Vilajosana, Qin Wang
Publicado en: Transactions on Emerging Telecommunications Technologies, Issue 29/1, 2018, Page(s) e3211, ISSN 2161-3915
Editor: John Wiley & Sons, Ltd.
DOI: 10.1002/ett.3211

Teaching Communication Technologies and Standards for the Industrial IoT? Use 6TiSCH!

Autores: Thomas Watteyne, Pere Tuset-Peiro, Xavier Vilajosana, Sofie Pollin, Bhaskar Krishnamachari
Publicado en: IEEE Communications Magazine, Issue 55/5, 2017, Page(s) 132-137, ISSN 0163-6804
Editor: Institute of Electrical and Electronics Engineers
DOI: 10.1109/MCOM.2017.1700013

A Machine-Learning-Based Connectivity Model for Complex Terrain Large-Scale Low-Power Wireless Deployments

Autores: Carlos A. Oroza, Ziran Zhang, Thomas Watteyne, Steven D. Glaser
Publicado en: IEEE Transactions on Cognitive Communications and Networking, Issue 3/4, 2017, Page(s) 576-584, ISSN 2332-7731
Editor: IEEE
DOI: 10.1109/tccn.2017.2741468

A user-centric Internet of Things platform to empower users for managing security and privacy concerns in the Internet of Energy

Autores: Juan A Martínez, José L Hernández-Ramos, Victoria Beltrán, Antonio Skarmeta, Pedro M Ruiz
Publicado en: International Journal of Distributed Sensor Networks, Issue 13/8, 2017, Page(s) 155014771772797, ISSN 1550-1477
Editor: SAGE
DOI: 10.1177/1550147717727974

Real-Time Alpine Measurement System Using Wireless Sensor Networks

Autores: Sami Malek, Francesco Avanzi, Keoma Brun-Laguna, Tessa Maurer, Carlos Oroza, Peter Hartsough, Thomas Watteyne, Steven Glaser
Publicado en: Sensors, Issue 17/11, 2017, Page(s) 2583, ISSN 1424-8220
Editor: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s17112583

Broadcasting strategies in 6TiSCH networks

Autores: Mališa Vučinić, Thomas Watteyne, Xavier Vilajosana
Publicado en: Internet Technology Letters, Issue 1/1, 2018, Page(s) e15, ISSN 2476-1508
Editor: John Wiley & Sons Ltd
DOI: 10.1002/itl2.15

Model-Based Testing as a Service for IoT Platforms

Autores: Abbas Ahmad, Fabrice Bouquet, Elizabeta Fourneret, Franck Le Gall, Bruno Legeard
Publicado en: Lecture Notes in Computer Science (LNCS) - ISoLA, Issue Vol. 9953, October 10-14, 2016, 2016, Page(s) 727-742
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-47169-3_55

Preventive maintenance of critical infrastructures using 5G networks & drones

Autores: Theodore Zahariadis, Artemis Voulkidis, Panagiotis Karkazis, Panagiotis Trakadas
Publicado en: 2017 14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), 2017, Page(s) 1-4, ISBN 978-1-5386-2939-0
Editor: IEEE
DOI: 10.1109/avss.2017.8078465

Physical layer authentication of Internet of Things wireless devices through permutation and dispersion entropy

Autores: Gianmarco Baldini, Raimondo Giuliani, Gary Steri, Ricardo Neisse
Publicado en: 2017 Global Internet of Things Summit (GIoTS), 2017, Page(s) 1-6, ISBN 978-1-5090-5873-0
Editor: IEEE
DOI: 10.1109/giots.2017.8016272

Improving Internet of Things device certification with policy-based management

Autores: Ricardo Neisse, Gianmarco Baldini, Gary Steri, Abbas Ahmad, Elizabeta Fourneret, Bruno Legeard
Publicado en: 2017 Global Internet of Things Summit (GIoTS), 2017, Page(s) 1-6, ISBN 978-1-5090-5873-0
Editor: IEEE
DOI: 10.1109/giots.2017.8016273

Imaging time series for internet of things radio frequency fingerprinting

Autores: Gianmarco Baldini, Gary Steri, Raimondo Giuliani, Claudio Gentile
Publicado en: 2017 International Carnahan Conference on Security Technology (ICCST), 2017, Page(s) 1-6, ISBN 978-1-5386-1585-0
Editor: IEEE
DOI: 10.1109/ccst.2017.8167861

The identification of mobile phones through the fingerprints of their built-in magnetometer: An analysis of the portability of the fingerprints

Autores: Gianmarco Baldini, Gary Steri, Irene Amerini, Roberto Caldelli
Publicado en: 2017 International Carnahan Conference on Security Technology (ICCST), 2017, Page(s) 1-6, ISBN 978-1-5386-1585-0
Editor: IEEE
DOI: 10.1109/ccst.2017.8167855

The application of the Symbolic Aggregate Approximation algorithm (SAX) to radio frequency fingerprinting of IoT devices

Autores: Gianmarco Baldini, Raimondo Giuliani, Gary Steri, Ignacio Sanchez, Claudio Gentile
Publicado en: 2017 IEEE Symposium on Communications and Vehicular Technology (SCVT), 2017, Page(s) 1-6, ISBN 978-1-5386-2256-8
Editor: IEEE
DOI: 10.1109/scvt.2017.8240312

Security certification and labelling in Internet of Things

Autores: Gianmarco Baldini, Antonio Skarmeta, Elizabeta Fourneret, Ricardo Neisse, Bruno Legeard, Franck Le Gall
Publicado en: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 2016, Page(s) 627-632, ISBN 978-1-5090-4130-5
Editor: IEEE
DOI: 10.1109/WF-IoT.2016.7845514

Insights into Frequency Diversity from Measurements on an Indoor Low Power Wireless Network Testbed

Autores: Pedro Henrique Gomes, Ying Chen, Thomas Watteyne, Bhaskar Krishnamachari
Publicado en: 2016 IEEE Globecom Workshops (GC Wkshps), 2016, Page(s) 1-6, ISBN 978-1-5090-2482-7
Editor: IEEE
DOI: 10.1109/GLOCOMW.2016.7848933

ARMOUR: Large-scale experiments for IoT security & trust

Autores: Salvador Perez, Juan A. Martinez, Antonio F. Skarmeta, Marcio Mateus, Bruno Almeida, Pedro Malo
Publicado en: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 2016, Page(s) 553-558, ISBN 978-1-5090-4130-5
Editor: IEEE
DOI: 10.1109/WF-IoT.2016.7845504

Minimal Security Framework for 6TiSCH

Autores: M. Vucinic, J. Simon, K. Pister
Publicado en: 2016
Editor: IETF

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles