Deliverables Open Research Data Pilot (1) Test generation strategies for large-scale IoT security testing - v2 Definition and description of the three test generation strategies to derive test cases for large-scale IoT security testing (final version) Documents, reports (15) Report on collaboration and clustering activities-period2 Report on the collaboration and clustering activities (i.e. cluster and inter-cluster participation, inter-project and inter-initiative participation, etc.) Study of support for the design and secure interoperability of multiple IoT applications Analysis of the challenges and potential approaches/solutions to support design and secure interoperability of multiple IoT applications. Definition of the Large-Scale IoT Security & Trust Benchmarking Methodology The benchmarking methodology for measuring and then comparing Large-Scale IoT Security & Trust solutions. ARMOUR Experimentation approach and plans the ARMOUR systematic approach to experimentation and the experimentation plans for each of the ARMOUR experiments. Test generation strategies for large-scale IoT security testing - v1 Definition and description of the three test generation strategies to derive test cases for large-scale IoT security testing (first version) Study of security and privacy aspects in IoT application lifecycle Analysis of the challenges and potential approaches/solutions to support the lifecycle of IoT applications. Generic test patterns and test models for IoT security testing Definition and description of the input testing artefacts for IoT security testing: test pattern and test model Report on collaboration and clustering activities-period1 Report on the collaboration and clustering activities (i.e. cluster and inter-cluster participation, inter-project and inter-initiative participation, etc.) Dissemination Report - period2 Project dissemination report for second project year Includes also the new versions of the dissemination materials created up until delivery date ARMOUR testing and certification process Definition of the ARMOUR testing and certification system for labelling/certifying secure & trusted solutions proper for the large-scale Internet-of-Things. Report on testbeds integration assessment and integration improvements Report on testing and validation of the integration with IOT-LAB and FIESTA testbeds and required integration improvements. ARMOUR Experiments and Requirements the through definition of the ARMOUR experiments and their requirements for IoT Large-Scale Security & Trust experimentations Dissemination Report - period1 Project dissemination report for first project year Includes also the new versions of the dissemination materials created up until delivery date Experiments’ execution reporting and benchmarks the report on ARMOUR experiments execution and its results including the benchmarking of the ARMOUR experiments. Testbeds detailed analysis and integration guidelines Detailed analysis, practical guides, approaches, blueprints, to help integrators to put ARMOUR solutions in testbeds. Other (4) Integrated ARMOUR experimentation data and benchmarks with FIESTA testbeds Technical integration of ARMOUR experimentation data and benchmarks with the FIESTA data-driven IoT/Cloud testbed. Integrated ARMOUR experimentation services with FIT IoT-LAB testbed Technical integration of the ARMOUR Security & Trust Experimentation framework with the FIT IoT-LAB testbed. ARMOUR benchmarking & certification centre Establishment of the benchmarking and certification centre for large-scale IoT Security & Trust solutions. Dissemination Materials Report on the first kit of ARMOUR dissemination materials Publications Peer reviewed articles (8) Understanding the Limits of LoRaWAN Author(s): Ferran Adelantado, Xavier Vilajosana, Pere Tuset-Peiro, Borja Martinez, Joan Melia-Segui, Thomas Watteyne Published in: IEEE Communications Magazine, Issue 55/9, 2017, Page(s) 34-40, ISSN 0163-6804 Publisher: Institute of Electrical and Electronics Engineers DOI: 10.1109/mcom.2017.1600613 MABO-TSCH: Multihop and blacklist-based optimized time synchronized channel hopping Author(s): Pedro Henrique Gomes, Thomas Watteyne, Bhaskar Krishnamachari Published in: Transactions on Emerging Telecommunications Technologies, 2017, Page(s) e3223, ISSN 2161-3915 Publisher: John Wiley & Sons, Ltd. DOI: 10.1002/ett.3223 CCR: Cost-aware cell relocation in 6TiSCH networks Author(s): Tengfei Chang, Thomas Watteyne, Xavier Vilajosana, Qin Wang Published in: Transactions on Emerging Telecommunications Technologies, Issue 29/1, 2018, Page(s) e3211, ISSN 2161-3915 Publisher: John Wiley & Sons, Ltd. DOI: 10.1002/ett.3211 Teaching Communication Technologies and Standards for the Industrial IoT? Use 6TiSCH! Author(s): Thomas Watteyne, Pere Tuset-Peiro, Xavier Vilajosana, Sofie Pollin, Bhaskar Krishnamachari Published in: IEEE Communications Magazine, Issue 55/5, 2017, Page(s) 132-137, ISSN 0163-6804 Publisher: Institute of Electrical and Electronics Engineers DOI: 10.1109/MCOM.2017.1700013 A Machine-Learning-Based Connectivity Model for Complex Terrain Large-Scale Low-Power Wireless Deployments Author(s): Carlos A. Oroza, Ziran Zhang, Thomas Watteyne, Steven D. Glaser Published in: IEEE Transactions on Cognitive Communications and Networking, Issue 3/4, 2017, Page(s) 576-584, ISSN 2332-7731 Publisher: IEEE DOI: 10.1109/tccn.2017.2741468 A user-centric Internet of Things platform to empower users for managing security and privacy concerns in the Internet of Energy Author(s): Juan A Martínez, José L Hernández-Ramos, Victoria Beltrán, Antonio Skarmeta, Pedro M Ruiz Published in: International Journal of Distributed Sensor Networks, Issue 13/8, 2017, Page(s) 155014771772797, ISSN 1550-1477 Publisher: SAGE DOI: 10.1177/1550147717727974 Real-Time Alpine Measurement System Using Wireless Sensor Networks Author(s): Sami Malek, Francesco Avanzi, Keoma Brun-Laguna, Tessa Maurer, Carlos Oroza, Peter Hartsough, Thomas Watteyne, Steven Glaser Published in: Sensors, Issue 17/11, 2017, Page(s) 2583, ISSN 1424-8220 Publisher: Multidisciplinary Digital Publishing Institute (MDPI) DOI: 10.3390/s17112583 Broadcasting strategies in 6TiSCH networks Author(s): Mališa Vučinić, Thomas Watteyne, Xavier Vilajosana Published in: Internet Technology Letters, Issue 1/1, 2018, Page(s) e15, ISSN 2476-1508 Publisher: John Wiley & Sons Ltd DOI: 10.1002/itl2.15 Conference proceedings (10) Model-Based Testing as a Service for IoT Platforms Author(s): Abbas Ahmad, Fabrice Bouquet, Elizabeta Fourneret, Franck Le Gall, Bruno Legeard Published in: Lecture Notes in Computer Science (LNCS) - ISoLA, Issue Vol. 9953, October 10-14, 2016, 2016, Page(s) 727-742 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-47169-3_55 Preventive maintenance of critical infrastructures using 5G networks & drones Author(s): Theodore Zahariadis, Artemis Voulkidis, Panagiotis Karkazis, Panagiotis Trakadas Published in: 2017 14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), 2017, Page(s) 1-4, ISBN 978-1-5386-2939-0 Publisher: IEEE DOI: 10.1109/avss.2017.8078465 Physical layer authentication of Internet of Things wireless devices through permutation and dispersion entropy Author(s): Gianmarco Baldini, Raimondo Giuliani, Gary Steri, Ricardo Neisse Published in: 2017 Global Internet of Things Summit (GIoTS), 2017, Page(s) 1-6, ISBN 978-1-5090-5873-0 Publisher: IEEE DOI: 10.1109/giots.2017.8016272 Improving Internet of Things device certification with policy-based management Author(s): Ricardo Neisse, Gianmarco Baldini, Gary Steri, Abbas Ahmad, Elizabeta Fourneret, Bruno Legeard Published in: 2017 Global Internet of Things Summit (GIoTS), 2017, Page(s) 1-6, ISBN 978-1-5090-5873-0 Publisher: IEEE DOI: 10.1109/giots.2017.8016273 Imaging time series for internet of things radio frequency fingerprinting Author(s): Gianmarco Baldini, Gary Steri, Raimondo Giuliani, Claudio Gentile Published in: 2017 International Carnahan Conference on Security Technology (ICCST), 2017, Page(s) 1-6, ISBN 978-1-5386-1585-0 Publisher: IEEE DOI: 10.1109/ccst.2017.8167861 The identification of mobile phones through the fingerprints of their built-in magnetometer: An analysis of the portability of the fingerprints Author(s): Gianmarco Baldini, Gary Steri, Irene Amerini, Roberto Caldelli Published in: 2017 International Carnahan Conference on Security Technology (ICCST), 2017, Page(s) 1-6, ISBN 978-1-5386-1585-0 Publisher: IEEE DOI: 10.1109/ccst.2017.8167855 The application of the Symbolic Aggregate Approximation algorithm (SAX) to radio frequency fingerprinting of IoT devices Author(s): Gianmarco Baldini, Raimondo Giuliani, Gary Steri, Ignacio Sanchez, Claudio Gentile Published in: 2017 IEEE Symposium on Communications and Vehicular Technology (SCVT), 2017, Page(s) 1-6, ISBN 978-1-5386-2256-8 Publisher: IEEE DOI: 10.1109/scvt.2017.8240312 Security certification and labelling in Internet of Things Author(s): Gianmarco Baldini, Antonio Skarmeta, Elizabeta Fourneret, Ricardo Neisse, Bruno Legeard, Franck Le Gall Published in: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 2016, Page(s) 627-632, ISBN 978-1-5090-4130-5 Publisher: IEEE DOI: 10.1109/WF-IoT.2016.7845514 Insights into Frequency Diversity from Measurements on an Indoor Low Power Wireless Network Testbed Author(s): Pedro Henrique Gomes, Ying Chen, Thomas Watteyne, Bhaskar Krishnamachari Published in: 2016 IEEE Globecom Workshops (GC Wkshps), 2016, Page(s) 1-6, ISBN 978-1-5090-2482-7 Publisher: IEEE DOI: 10.1109/GLOCOMW.2016.7848933 ARMOUR: Large-scale experiments for IoT security & trust Author(s): Salvador Perez, Juan A. Martinez, Antonio F. Skarmeta, Marcio Mateus, Bruno Almeida, Pedro Malo Published in: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 2016, Page(s) 553-558, ISBN 978-1-5090-4130-5 Publisher: IEEE DOI: 10.1109/WF-IoT.2016.7845504 Other (1) Minimal Security Framework for 6TiSCH Author(s): M. Vucinic, J. Simon, K. Pister Published in: 2016 Publisher: IETF Searching for OpenAIRE data... There was an error trying to search data from OpenAIRE No results available