Resultado final Open Research Data Pilot (1) Test generation strategies for large-scale IoT security testing - v2 Definition and description of the three test generation strategies to derive test cases for large-scale IoT security testing (final version) Documents, reports (15) Report on collaboration and clustering activities-period2 Report on the collaboration and clustering activities (i.e. cluster and inter-cluster participation, inter-project and inter-initiative participation, etc.) Study of support for the design and secure interoperability of multiple IoT applications Analysis of the challenges and potential approaches/solutions to support design and secure interoperability of multiple IoT applications. Definition of the Large-Scale IoT Security & Trust Benchmarking Methodology The benchmarking methodology for measuring and then comparing Large-Scale IoT Security & Trust solutions. ARMOUR Experimentation approach and plans the ARMOUR systematic approach to experimentation and the experimentation plans for each of the ARMOUR experiments. Test generation strategies for large-scale IoT security testing - v1 Definition and description of the three test generation strategies to derive test cases for large-scale IoT security testing (first version) Study of security and privacy aspects in IoT application lifecycle Analysis of the challenges and potential approaches/solutions to support the lifecycle of IoT applications. Generic test patterns and test models for IoT security testing Definition and description of the input testing artefacts for IoT security testing: test pattern and test model Report on collaboration and clustering activities-period1 Report on the collaboration and clustering activities (i.e. cluster and inter-cluster participation, inter-project and inter-initiative participation, etc.) Dissemination Report - period2 Project dissemination report for second project year Includes also the new versions of the dissemination materials created up until delivery date ARMOUR testing and certification process Definition of the ARMOUR testing and certification system for labelling/certifying secure & trusted solutions proper for the large-scale Internet-of-Things. Report on testbeds integration assessment and integration improvements Report on testing and validation of the integration with IOT-LAB and FIESTA testbeds and required integration improvements. ARMOUR Experiments and Requirements the through definition of the ARMOUR experiments and their requirements for IoT Large-Scale Security & Trust experimentations Dissemination Report - period1 Project dissemination report for first project year Includes also the new versions of the dissemination materials created up until delivery date Experiments’ execution reporting and benchmarks the report on ARMOUR experiments execution and its results including the benchmarking of the ARMOUR experiments. Testbeds detailed analysis and integration guidelines Detailed analysis, practical guides, approaches, blueprints, to help integrators to put ARMOUR solutions in testbeds. Other (4) Integrated ARMOUR experimentation data and benchmarks with FIESTA testbeds Technical integration of ARMOUR experimentation data and benchmarks with the FIESTA data-driven IoT/Cloud testbed. Integrated ARMOUR experimentation services with FIT IoT-LAB testbed Technical integration of the ARMOUR Security & Trust Experimentation framework with the FIT IoT-LAB testbed. ARMOUR benchmarking & certification centre Establishment of the benchmarking and certification centre for large-scale IoT Security & Trust solutions. Dissemination Materials Report on the first kit of ARMOUR dissemination materials Publicaciones Peer reviewed articles (8) Understanding the Limits of LoRaWAN Autores: Ferran Adelantado, Xavier Vilajosana, Pere Tuset-Peiro, Borja Martinez, Joan Melia-Segui, Thomas Watteyne Publicado en: IEEE Communications Magazine, Issue 55/9, 2017, Page(s) 34-40, ISSN 0163-6804 Editor: Institute of Electrical and Electronics Engineers DOI: 10.1109/mcom.2017.1600613 MABO-TSCH: Multihop and blacklist-based optimized time synchronized channel hopping Autores: Pedro Henrique Gomes, Thomas Watteyne, Bhaskar Krishnamachari Publicado en: Transactions on Emerging Telecommunications Technologies, 2017, Page(s) e3223, ISSN 2161-3915 Editor: John Wiley & Sons, Ltd. DOI: 10.1002/ett.3223 CCR: Cost-aware cell relocation in 6TiSCH networks Autores: Tengfei Chang, Thomas Watteyne, Xavier Vilajosana, Qin Wang Publicado en: Transactions on Emerging Telecommunications Technologies, Issue 29/1, 2018, Page(s) e3211, ISSN 2161-3915 Editor: John Wiley & Sons, Ltd. DOI: 10.1002/ett.3211 Teaching Communication Technologies and Standards for the Industrial IoT? Use 6TiSCH! Autores: Thomas Watteyne, Pere Tuset-Peiro, Xavier Vilajosana, Sofie Pollin, Bhaskar Krishnamachari Publicado en: IEEE Communications Magazine, Issue 55/5, 2017, Page(s) 132-137, ISSN 0163-6804 Editor: Institute of Electrical and Electronics Engineers DOI: 10.1109/MCOM.2017.1700013 A Machine-Learning-Based Connectivity Model for Complex Terrain Large-Scale Low-Power Wireless Deployments Autores: Carlos A. Oroza, Ziran Zhang, Thomas Watteyne, Steven D. Glaser Publicado en: IEEE Transactions on Cognitive Communications and Networking, Issue 3/4, 2017, Page(s) 576-584, ISSN 2332-7731 Editor: IEEE DOI: 10.1109/tccn.2017.2741468 A user-centric Internet of Things platform to empower users for managing security and privacy concerns in the Internet of Energy Autores: Juan A Martínez, José L Hernández-Ramos, Victoria Beltrán, Antonio Skarmeta, Pedro M Ruiz Publicado en: International Journal of Distributed Sensor Networks, Issue 13/8, 2017, Page(s) 155014771772797, ISSN 1550-1477 Editor: SAGE DOI: 10.1177/1550147717727974 Real-Time Alpine Measurement System Using Wireless Sensor Networks Autores: Sami Malek, Francesco Avanzi, Keoma Brun-Laguna, Tessa Maurer, Carlos Oroza, Peter Hartsough, Thomas Watteyne, Steven Glaser Publicado en: Sensors, Issue 17/11, 2017, Page(s) 2583, ISSN 1424-8220 Editor: Multidisciplinary Digital Publishing Institute (MDPI) DOI: 10.3390/s17112583 Broadcasting strategies in 6TiSCH networks Autores: Mališa Vučinić, Thomas Watteyne, Xavier Vilajosana Publicado en: Internet Technology Letters, Issue 1/1, 2018, Page(s) e15, ISSN 2476-1508 Editor: John Wiley & Sons Ltd DOI: 10.1002/itl2.15 Conference proceedings (10) Model-Based Testing as a Service for IoT Platforms Autores: Abbas Ahmad, Fabrice Bouquet, Elizabeta Fourneret, Franck Le Gall, Bruno Legeard Publicado en: Lecture Notes in Computer Science (LNCS) - ISoLA, Issue Vol. 9953, October 10-14, 2016, 2016, Page(s) 727-742 Editor: Springer International Publishing DOI: 10.1007/978-3-319-47169-3_55 Preventive maintenance of critical infrastructures using 5G networks & drones Autores: Theodore Zahariadis, Artemis Voulkidis, Panagiotis Karkazis, Panagiotis Trakadas Publicado en: 2017 14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), 2017, Page(s) 1-4, ISBN 978-1-5386-2939-0 Editor: IEEE DOI: 10.1109/avss.2017.8078465 Physical layer authentication of Internet of Things wireless devices through permutation and dispersion entropy Autores: Gianmarco Baldini, Raimondo Giuliani, Gary Steri, Ricardo Neisse Publicado en: 2017 Global Internet of Things Summit (GIoTS), 2017, Page(s) 1-6, ISBN 978-1-5090-5873-0 Editor: IEEE DOI: 10.1109/giots.2017.8016272 Improving Internet of Things device certification with policy-based management Autores: Ricardo Neisse, Gianmarco Baldini, Gary Steri, Abbas Ahmad, Elizabeta Fourneret, Bruno Legeard Publicado en: 2017 Global Internet of Things Summit (GIoTS), 2017, Page(s) 1-6, ISBN 978-1-5090-5873-0 Editor: IEEE DOI: 10.1109/giots.2017.8016273 Imaging time series for internet of things radio frequency fingerprinting Autores: Gianmarco Baldini, Gary Steri, Raimondo Giuliani, Claudio Gentile Publicado en: 2017 International Carnahan Conference on Security Technology (ICCST), 2017, Page(s) 1-6, ISBN 978-1-5386-1585-0 Editor: IEEE DOI: 10.1109/ccst.2017.8167861 The identification of mobile phones through the fingerprints of their built-in magnetometer: An analysis of the portability of the fingerprints Autores: Gianmarco Baldini, Gary Steri, Irene Amerini, Roberto Caldelli Publicado en: 2017 International Carnahan Conference on Security Technology (ICCST), 2017, Page(s) 1-6, ISBN 978-1-5386-1585-0 Editor: IEEE DOI: 10.1109/ccst.2017.8167855 The application of the Symbolic Aggregate Approximation algorithm (SAX) to radio frequency fingerprinting of IoT devices Autores: Gianmarco Baldini, Raimondo Giuliani, Gary Steri, Ignacio Sanchez, Claudio Gentile Publicado en: 2017 IEEE Symposium on Communications and Vehicular Technology (SCVT), 2017, Page(s) 1-6, ISBN 978-1-5386-2256-8 Editor: IEEE DOI: 10.1109/scvt.2017.8240312 Security certification and labelling in Internet of Things Autores: Gianmarco Baldini, Antonio Skarmeta, Elizabeta Fourneret, Ricardo Neisse, Bruno Legeard, Franck Le Gall Publicado en: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 2016, Page(s) 627-632, ISBN 978-1-5090-4130-5 Editor: IEEE DOI: 10.1109/WF-IoT.2016.7845514 Insights into Frequency Diversity from Measurements on an Indoor Low Power Wireless Network Testbed Autores: Pedro Henrique Gomes, Ying Chen, Thomas Watteyne, Bhaskar Krishnamachari Publicado en: 2016 IEEE Globecom Workshops (GC Wkshps), 2016, Page(s) 1-6, ISBN 978-1-5090-2482-7 Editor: IEEE DOI: 10.1109/GLOCOMW.2016.7848933 ARMOUR: Large-scale experiments for IoT security & trust Autores: Salvador Perez, Juan A. Martinez, Antonio F. Skarmeta, Marcio Mateus, Bruno Almeida, Pedro Malo Publicado en: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 2016, Page(s) 553-558, ISBN 978-1-5090-4130-5 Editor: IEEE DOI: 10.1109/WF-IoT.2016.7845504 Other (1) Minimal Security Framework for 6TiSCH Autores: M. Vucinic, J. Simon, K. Pister Publicado en: 2016 Editor: IETF Buscando datos de OpenAIRE... Se ha producido un error en la búsqueda de datos de OpenAIRE No hay resultados disponibles