European Commission logo
English English
CORDIS - EU research results
CORDIS

Secure Interoperable Full-Stack Internet of Things for Smart Home

Deliverables

Refined Pilot Use Case requirements

This deliverable reports the refined requirements refined in T62 after the first deployment of the pilot use case architecture providing feedbacks to be integrated in the final deployment possibly refining also the validation strategy of T64 Report

Initial Component, Architecture, and Intercommunication Design

Initial report documenting the prescriptive component architecture and intercommunication designs that implement the best practices and mitigations for security and privacy of T13 and T14 This report shall include the design of a WoT component marketplace API designs for the apropos elements and a labelling of APIs with respect to the operations relevant to security and privacy

Final Component, Architecture, and Intercommunication Design

Final report documenting the prescriptive component architecture and intercommunication designs that implement the best practices and mitigations for security and privacy of T13 This report shall include the design of a WoT component marketplace API designs for the apropos elements and a labelling see T23 of APIs with respect to the operations relevant to security and privacy at all levels from physical to communication and data management

Initial Architecture Requirements Report

Report documenting the elicited requirements from task T11 related to security privacy functional and nonfunctional aspects

Period 1 Management Reports

Description Period 1 Management Reports including Dissemination and Exploitation Plans

Preliminary report on Network and System Security Solutions

Preliminary technical report documenting output results and achievements of WP3 activities from the first half of the project

Analyses and feedback on architecture requirements and goals

Report providing WP1 with feedback and requests for adaptations to the defined requirements and goals to ensure the designdevelopment of feasible and effective system security solutions

Final report on Network and System Security Solutions

Final technical report documenting output results and achievements of WP3 activities at the end of the project

Initial Report on Legal and Ethical Aspects

Initial report on legal and ethical aspects regarding guidelines and tools to be developed in WP2 from i GDPR ii legal techniques for managing privacy information consent and privacy pledges iii fostering compliance with license obligations

Final Standardization Report

A final report on the projects standardization activities consistently with Task T72

Preliminary Dissemination Report

A preliminary report on the projects dissemination activities consistently with Task T71

Preliminary Developer guidelines

First technical report documenting the guidelines to be used by developers to produce secure privacy aware and policybased IoT software

Final Development of Privacy Aware Analytics for Secure Services

This deliverable will contain the final implementation of the mechanisms and engines for intrusion detection voice recognition and smart services together with a demonstration of the effectiveness verified through classification experiments

Final Dissemination Report

A final report on the projects dissemination activities consistently with Task T71

Preliminary Standardization Report

A preliminary report on the projects standardization activities consistently with Task T72

Initial Design and Development of Privacy Aware Analytics for Secure Services

This deliverable will report the first research and development results for the privacy aware analytics which will be used for intrusion detection and development of privacy aware data analysis mechanisms for intrusion detection voice recognition and smart services The deliverable will also report a set of initial experiments to validate the functionality and effectiveness of developed mechanisms

Period 2 Management Reports

Description: Period 2 Management Reports (including Dissemination and Exploitation Plans).

Final Report on Legal and Ethical Aspects

Final report on legal and ethical aspects regarding guidelines and tools to be developed in WP2 from i GDPR ii legal techniques for managing privacy information consent and privacy pledges iii fostering compliance with license obligations

Initial Pilot Use Case requirements

This deliverable reports the results of the elicitation of functional nonfunctional security and privacy requirements of T61 and T62 The deliverable takes in input the results of deliverables T12 and T22 related to architecture and software requirements Report

Final Business and Exploitation Plan

A final report on the partners business and exploitation plan consistently with Task T73

Preliminary Business and Exploitation Plan

A preliminary report on the partners business and exploitation plan consistently with Task T73

Analyses, and Feedback on Architecture Requirements and Goals

This report provides WP1 with feedback and requests for adaptations to the defined requirements and goals to ensure the designdevelopment of feasible and effective security analytics services and privacy preserving analytics for intrusion detection voice recognition and smart services

Report on Security and Privacy Metrics

Technical report documenting security and privacy metrics to be used for assessing IoT software

Final Developer guidelines

Final technical report documenting the guidelines to be used by developers to produce secure privacy aware and policybased IoT software

Final Architecture Requirements Report

Final report documenting the architectural requirements elicited after receiving technical requirements of WP3 and WP4

First version of SIFIS-Home testbed

This deliverable is the output of tasks T5.1 and it describes the design and the deployment of the first version of the SIFIS-Home physical testbed that will deployed to allow the use case to develop, deploy and test their applications. (Demonstrator)

Final version of SIFIS-Home testbed

This deliverable is the output of the process of refinement of the SIFIS-Home physical testbed, which concludes the activities the task of T5.1 (Demonstrator)

First version of Pilot Use Case implementation

This deliverable reports the description and actual code of the first implementation of the pilot use case, resulting from the initial deployment of the SIFIS-Home framework in the Mind platform performed in T6.3 and the related validation performed in task 6.4. (Demonstrator)

Final version of the SIFIS-Home Security Architecture Implementation

This deliverable reports the complete implementation and integration of the SIFIS-Home security architecture performed in T5.2 and the final validation results from the activities of T5.3. (Demonstrator)

First version of SIFIS-Home Security Architecture Implementation

This deliverable reports the first implementation of the SIFIS-Home security architecture performed in T5.2 and the related validation performed in T5.3. (Demonstrator)

First Version of Developer tools

First version of Code and Documentation of the developer tools created in the project that implement some of developer guidelines for assessing IoT software

Final version of Pilot Use Case implementation

This deliverable reports the description and actual code of the final implementation of the pilot use case, resulting from the final deployment of the SIFIS-Home framework in the Mind platform performed in T6.3 and the related final validation performed in task 6.4. (Demonstrator)

Final Version of Developer tools

Final version of Code and Documentation of the developer tools created in the project that implement some of developer guidelines for assessing IoT software.

Management & Quality Plan

Description Implementation of a quality assurance procedures on deliverables organisation of an efficient continuous project progress monitoring tasks milestones budget identification and analysis of risks plus suggestions for fallback solutions

SIFIS-Home Website

Public domain website for promoting SIFISHome goals and activities

Publications

Lightweight Authenticated Key Exchange With EDHOC

Author(s): Mališa Vučinić; Göran Selander; John Preuss Mattsson; Thomas Watteyne
Published in: Computer, 2022, ISSN 0018-9162
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/mc.2022.3144764

Using recurrent neural networks for continuous authentication through gait analysis

Author(s): Giacomo Giorgi, Andrea Saracino, Fabio Martinelli
Published in: Elsevier PR Letters, 2021, ISSN 0167-8655
Publisher: Elsevier BV
DOI: 10.1016/j.patrec.2021.03.010

Exploiting If This Then That and Usage Control obligations for Smart Home security and management

Author(s): Giacomo Giorgi, Antonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos, Andrea Saracino
Published in: Concurrency and Computation: Practice and Experience, 2021, ISSN 1532-0626
Publisher: John Wiley & Sons Inc.
DOI: 10.1002/cpe.6189

Vulnerabilities of the 6P protocol for the Industrial Internet of Things: Impact analysis and mitigation

Author(s): Francesca Righetti; Carlo Vallati; Marco Tiloca; Giuseppe Anastasi
Published in: Crossref, Issue 13, 2022, ISSN 0140-3664
Publisher: Elsevier BV
DOI: 10.1016/j.comcom.2022.07.054

Preserving Privacy in the Globalized Smart Home: The SIFIS-Home Project

Author(s): Luca Ardito, Luca Barbato, Paolo Mori, Andrea Saracino
Published in: IEEE Security And Privacy, 2021, ISSN 1540-7993
Publisher: IEEE Computer Society
DOI: 10.1109/msec.2021.3118561

Quality Assessment Methods for Textual Conversational Interfaces: A Multivocal Literature Review

Author(s): Riccardo Coppola; Luca Ardito
Published in: Information, Issue 1, 2021, ISSN 2078-2489
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/info12110437

Privacy preserving data sharing and analysis for edge-based architectures

Author(s): Mina Sheikhalishahi, Andrea Saracino, Fabio Martinelli, Antonio La Marra
Published in: International Journal of Information Security, 2021, ISSN 1615-5262
Publisher: Springer Verlag
DOI: 10.1007/s10207-021-00542-x

Privacy-Preserving Analysis for Remote Video Anomaly Detection in Real Life Environments

Author(s): Giacomo Giorgi, Wisam Abbasi, Andrea Saracino
Published in: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Issue Vol 13, Issue 1, 2022, ISSN 2093-5374
Publisher: Innovative Information Science & Technology Research Group (ISYOU)
DOI: 10.22667/jowua.2022.03.31.112

Performance Evaluation of Group OSCORE for Secure Group Communication in the Internet of Things

Author(s): M. Gunnarsson, K. M. Malarski, R. Höglund and M. Tiloca
Published in: ACM Transactions on Internet of Things, 2022, ISSN 2691-1914
Publisher: Association for Computing Machinery
DOI: 10.1145/3523064

Evaluating the performance of the OSCORE security protocol in constrained IoT environments

Author(s): Martin Gunnarsson, Joakim Brorsson, Francesca Palombini, Ludwig Seitz and Marco Tiloca
Published in: Internet of Things, 2021, ISSN 2542-6605
Publisher: Internet of Things
DOI: 10.1016/j.iot.2020.100333

An Ontology-Based Approach for Setting Security Policies in Smart Homes

Author(s): A. Monge Roffarello and L. De Russis
Published in: Emerging Technologies for Authorization and Authentication (ETAA 2022), 2022
Publisher: ETAA2022 / ESORICS2022
DOI: 10.1007/978-3-031-25467-3_1

Privacy-Preserving Speaker Verification and Speech Recognition

Author(s): WIsam Abbasi
Published in: ETAA2022, 2022
Publisher: ETAA2022 / ESORICS2022
DOI: 10.1007/978-3-031-25467-3_7

Privacy vs Accuracy Trade-Off in Privacy Aware Face Recognition in Smart Systems

Author(s): Wisam Abbasi, Paolo Mori, Andrea Saracino, Valerio Frascolla
Published in: 12th Workshop on Management of Cloud and Smart City Systems (MoCS 2022), 2022
Publisher: IEEE ISCC Proceedings
DOI: 10.1109/iscc55528.2022.9912465

Secure Software Updates for IoT based on Industry Requirements

Author(s): Ludwig Seitz, Marco Tiloca, Martin Gunnarsson and Rikard Höglund
Published in: 9th International Conference on Information Systems Security and Privacy (ICISSP 2023), 2023, ISBN 978-989-758-624-8
Publisher: SCITEPRESS
DOI: 10.5220/0011790100003405

On-demand Key Distribution for Cloud Networks

Author(s): Nicolae Paladi, Marco Tiloca, Pegah Nikbakht Bideh and Martin Hell
Published in: 24th Conference on Innovation in Clouds, Internet and Networks (ICIN 2021), Demonstration track, 2021
Publisher: IEEE
DOI: 10.1109/icin51074.2021.9385528

A Real-Time Deep Learning Approach for Real-World Video Anomaly Detection

Author(s): Stefano Petrocchi; Giacomo Giorgi; Mario G. C. A. Cimino
Published in: The 16th International Conference on Availability, Reliability and Security (ARES 2021), Vienna, Austria, 17-20/08/2021, Issue 15, 2021
Publisher: Springer
DOI: 10.1145/3465481.3470099

Flowrider - Fast On-Demand Key Provisioning for Cloud Networks

Author(s): Nicolae Paladi, Marco Tiloca, Pegah Nikbakht Bideh and Martin Hell
Published in: 17th EAI International Conference on Security and Privacy in Communication Networks (EAI SecureComm 2021), 2021
Publisher: Springer
DOI: 10.1109/msec.2021.3118561

Key Update for the IoT Security Standard OSCORE

Author(s): Rikard Höglund, Marco Tiloca, Simon Bouget and Shahid Raza
Published in: 2023 IEEE International Conference on Cyber Security and Resilience (CSR 2023), 2023, ISBN 979-8-3503-1170-9
Publisher: IEEE
DOI: 10.1109/csr57506.2023.10225002

An application of Netspot to Detect Anomalies in IoT

Author(s): Tom Tuunainen, Olli Isohanni, Mitha Jose
Published in: 2022 IEEE 8th International Conference on Network Softwarization (NetSoft), 2022, ISBN 978-1-6654-0694-9
Publisher: IEEE
DOI: 10.1109/netsoft54395.2022.9844059

Demo: Usage Control using Controlled Privacy Aware Face Recognition

Author(s): Arpad Müller, Wisam Abbasi
Published in: 12th Workshop on Management of Cloud and Smart City Systems (MoCS 2022), 2022
Publisher: IEEE ISCC Proceedings
DOI: 10.1109/iscc55528.2022.9912953

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available