Skip to main content
European Commission logo print header

Large-Scale Experiments of IoT Security Trust

Deliverables

Test generation strategies for large-scale IoT security testing - v2

Definition and description of the three test generation strategies to derive test cases for large-scale IoT security testing (final version)

Report on collaboration and clustering activities-period2

Report on the collaboration and clustering activities (i.e. cluster and inter-cluster participation, inter-project and inter-initiative participation, etc.)

Study of support for the design and secure interoperability of multiple IoT applications

Analysis of the challenges and potential approaches/solutions to support design and secure interoperability of multiple IoT applications.

Definition of the Large-Scale IoT Security & Trust Benchmarking Methodology

The benchmarking methodology for measuring and then comparing Large-Scale IoT Security & Trust solutions.

ARMOUR Experimentation approach and plans

the ARMOUR systematic approach to experimentation and the experimentation plans for each of the ARMOUR experiments.

Test generation strategies for large-scale IoT security testing - v1

Definition and description of the three test generation strategies to derive test cases for large-scale IoT security testing (first version)

Study of security and privacy aspects in IoT application lifecycle

Analysis of the challenges and potential approaches/solutions to support the lifecycle of IoT applications.

Generic test patterns and test models for IoT security testing

Definition and description of the input testing artefacts for IoT security testing: test pattern and test model

Report on collaboration and clustering activities-period1

Report on the collaboration and clustering activities (i.e. cluster and inter-cluster participation, inter-project and inter-initiative participation, etc.)

Dissemination Report - period2

Project dissemination report for second project year Includes also the new versions of the dissemination materials created up until delivery date

ARMOUR testing and certification process

Definition of the ARMOUR testing and certification system for labelling/certifying secure & trusted solutions proper for the large-scale Internet-of-Things.

Report on testbeds integration assessment and integration improvements

Report on testing and validation of the integration with IOT-LAB and FIESTA testbeds and required integration improvements.

ARMOUR Experiments and Requirements

the through definition of the ARMOUR experiments and their requirements for IoT Large-Scale Security & Trust experimentations

Dissemination Report - period1

Project dissemination report for first project year Includes also the new versions of the dissemination materials created up until delivery date

Experiments’ execution reporting and benchmarks

the report on ARMOUR experiments execution and its results including the benchmarking of the ARMOUR experiments.

Testbeds detailed analysis and integration guidelines

Detailed analysis, practical guides, approaches, blueprints, to help integrators to put ARMOUR solutions in testbeds.

Integrated ARMOUR experimentation data and benchmarks with FIESTA testbeds

Technical integration of ARMOUR experimentation data and benchmarks with the FIESTA data-driven IoT/Cloud testbed.

Integrated ARMOUR experimentation services with FIT IoT-LAB testbed

Technical integration of the ARMOUR Security & Trust Experimentation framework with the FIT IoT-LAB testbed.

ARMOUR benchmarking & certification centre

Establishment of the benchmarking and certification centre for large-scale IoT Security & Trust solutions.

Dissemination Materials

Report on the first kit of ARMOUR dissemination materials

Publications

Understanding the Limits of LoRaWAN

Author(s): Ferran Adelantado, Xavier Vilajosana, Pere Tuset-Peiro, Borja Martinez, Joan Melia-Segui, Thomas Watteyne
Published in: IEEE Communications Magazine, Issue 55/9, 2017, Page(s) 34-40, ISSN 0163-6804
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/mcom.2017.1600613

MABO-TSCH: Multihop and blacklist-based optimized time synchronized channel hopping

Author(s): Pedro Henrique Gomes, Thomas Watteyne, Bhaskar Krishnamachari
Published in: Transactions on Emerging Telecommunications Technologies, 2017, Page(s) e3223, ISSN 2161-3915
Publisher: John Wiley & Sons, Ltd.
DOI: 10.1002/ett.3223

CCR: Cost-aware cell relocation in 6TiSCH networks

Author(s): Tengfei Chang, Thomas Watteyne, Xavier Vilajosana, Qin Wang
Published in: Transactions on Emerging Telecommunications Technologies, Issue 29/1, 2018, Page(s) e3211, ISSN 2161-3915
Publisher: John Wiley & Sons, Ltd.
DOI: 10.1002/ett.3211

Teaching Communication Technologies and Standards for the Industrial IoT? Use 6TiSCH!

Author(s): Thomas Watteyne, Pere Tuset-Peiro, Xavier Vilajosana, Sofie Pollin, Bhaskar Krishnamachari
Published in: IEEE Communications Magazine, Issue 55/5, 2017, Page(s) 132-137, ISSN 0163-6804
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/MCOM.2017.1700013

A Machine-Learning-Based Connectivity Model for Complex Terrain Large-Scale Low-Power Wireless Deployments

Author(s): Carlos A. Oroza, Ziran Zhang, Thomas Watteyne, Steven D. Glaser
Published in: IEEE Transactions on Cognitive Communications and Networking, Issue 3/4, 2017, Page(s) 576-584, ISSN 2332-7731
Publisher: IEEE
DOI: 10.1109/tccn.2017.2741468

A user-centric Internet of Things platform to empower users for managing security and privacy concerns in the Internet of Energy

Author(s): Juan A Martínez, José L Hernández-Ramos, Victoria Beltrán, Antonio Skarmeta, Pedro M Ruiz
Published in: International Journal of Distributed Sensor Networks, Issue 13/8, 2017, Page(s) 155014771772797, ISSN 1550-1477
Publisher: SAGE
DOI: 10.1177/1550147717727974

Real-Time Alpine Measurement System Using Wireless Sensor Networks

Author(s): Sami Malek, Francesco Avanzi, Keoma Brun-Laguna, Tessa Maurer, Carlos Oroza, Peter Hartsough, Thomas Watteyne, Steven Glaser
Published in: Sensors, Issue 17/11, 2017, Page(s) 2583, ISSN 1424-8220
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s17112583

Broadcasting strategies in 6TiSCH networks

Author(s): Mališa Vučinić, Thomas Watteyne, Xavier Vilajosana
Published in: Internet Technology Letters, Issue 1/1, 2018, Page(s) e15, ISSN 2476-1508
Publisher: John Wiley & Sons Ltd
DOI: 10.1002/itl2.15

Model-Based Testing as a Service for IoT Platforms

Author(s): Abbas Ahmad, Fabrice Bouquet, Elizabeta Fourneret, Franck Le Gall, Bruno Legeard
Published in: Lecture Notes in Computer Science (LNCS) - ISoLA, Issue Vol. 9953, October 10-14, 2016, 2016, Page(s) 727-742
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-47169-3_55

Preventive maintenance of critical infrastructures using 5G networks & drones

Author(s): Theodore Zahariadis, Artemis Voulkidis, Panagiotis Karkazis, Panagiotis Trakadas
Published in: 2017 14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), 2017, Page(s) 1-4, ISBN 978-1-5386-2939-0
Publisher: IEEE
DOI: 10.1109/avss.2017.8078465

Physical layer authentication of Internet of Things wireless devices through permutation and dispersion entropy

Author(s): Gianmarco Baldini, Raimondo Giuliani, Gary Steri, Ricardo Neisse
Published in: 2017 Global Internet of Things Summit (GIoTS), 2017, Page(s) 1-6, ISBN 978-1-5090-5873-0
Publisher: IEEE
DOI: 10.1109/giots.2017.8016272

Improving Internet of Things device certification with policy-based management

Author(s): Ricardo Neisse, Gianmarco Baldini, Gary Steri, Abbas Ahmad, Elizabeta Fourneret, Bruno Legeard
Published in: 2017 Global Internet of Things Summit (GIoTS), 2017, Page(s) 1-6, ISBN 978-1-5090-5873-0
Publisher: IEEE
DOI: 10.1109/giots.2017.8016273

Imaging time series for internet of things radio frequency fingerprinting

Author(s): Gianmarco Baldini, Gary Steri, Raimondo Giuliani, Claudio Gentile
Published in: 2017 International Carnahan Conference on Security Technology (ICCST), 2017, Page(s) 1-6, ISBN 978-1-5386-1585-0
Publisher: IEEE
DOI: 10.1109/ccst.2017.8167861

The identification of mobile phones through the fingerprints of their built-in magnetometer: An analysis of the portability of the fingerprints

Author(s): Gianmarco Baldini, Gary Steri, Irene Amerini, Roberto Caldelli
Published in: 2017 International Carnahan Conference on Security Technology (ICCST), 2017, Page(s) 1-6, ISBN 978-1-5386-1585-0
Publisher: IEEE
DOI: 10.1109/ccst.2017.8167855

The application of the Symbolic Aggregate Approximation algorithm (SAX) to radio frequency fingerprinting of IoT devices

Author(s): Gianmarco Baldini, Raimondo Giuliani, Gary Steri, Ignacio Sanchez, Claudio Gentile
Published in: 2017 IEEE Symposium on Communications and Vehicular Technology (SCVT), 2017, Page(s) 1-6, ISBN 978-1-5386-2256-8
Publisher: IEEE
DOI: 10.1109/scvt.2017.8240312

Security certification and labelling in Internet of Things

Author(s): Gianmarco Baldini, Antonio Skarmeta, Elizabeta Fourneret, Ricardo Neisse, Bruno Legeard, Franck Le Gall
Published in: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 2016, Page(s) 627-632, ISBN 978-1-5090-4130-5
Publisher: IEEE
DOI: 10.1109/WF-IoT.2016.7845514

Insights into Frequency Diversity from Measurements on an Indoor Low Power Wireless Network Testbed

Author(s): Pedro Henrique Gomes, Ying Chen, Thomas Watteyne, Bhaskar Krishnamachari
Published in: 2016 IEEE Globecom Workshops (GC Wkshps), 2016, Page(s) 1-6, ISBN 978-1-5090-2482-7
Publisher: IEEE
DOI: 10.1109/GLOCOMW.2016.7848933

ARMOUR: Large-scale experiments for IoT security & trust

Author(s): Salvador Perez, Juan A. Martinez, Antonio F. Skarmeta, Marcio Mateus, Bruno Almeida, Pedro Malo
Published in: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 2016, Page(s) 553-558, ISBN 978-1-5090-4130-5
Publisher: IEEE
DOI: 10.1109/WF-IoT.2016.7845504

Minimal Security Framework for 6TiSCH

Author(s): M. Vucinic, J. Simon, K. Pister
Published in: 2016
Publisher: IETF

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available