Skip to main content
CORDIS - Forschungsergebnisse der EU
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

Secure Interoperable Full-Stack Internet of Things for Smart Home

Leistungen

Refined Pilot Use Case requirements

This deliverable reports the refined requirements refined in T62 after the first deployment of the pilot use case architecture providing feedbacks to be integrated in the final deployment possibly refining also the validation strategy of T64 Report

Initial Component, Architecture, and Intercommunication Design

Initial report documenting the prescriptive component architecture and intercommunication designs that implement the best practices and mitigations for security and privacy of T13 and T14 This report shall include the design of a WoT component marketplace API designs for the apropos elements and a labelling of APIs with respect to the operations relevant to security and privacy

Final Component, Architecture, and Intercommunication Design

Final report documenting the prescriptive component architecture and intercommunication designs that implement the best practices and mitigations for security and privacy of T13 This report shall include the design of a WoT component marketplace API designs for the apropos elements and a labelling see T23 of APIs with respect to the operations relevant to security and privacy at all levels from physical to communication and data management

Initial Architecture Requirements Report

Report documenting the elicited requirements from task T11 related to security privacy functional and nonfunctional aspects

Period 1 Management Reports

Description Period 1 Management Reports including Dissemination and Exploitation Plans

Preliminary report on Network and System Security Solutions

Preliminary technical report documenting output results and achievements of WP3 activities from the first half of the project

Analyses and feedback on architecture requirements and goals

Report providing WP1 with feedback and requests for adaptations to the defined requirements and goals to ensure the designdevelopment of feasible and effective system security solutions

Final report on Network and System Security Solutions

Final technical report documenting output results and achievements of WP3 activities at the end of the project

Initial Report on Legal and Ethical Aspects

Initial report on legal and ethical aspects regarding guidelines and tools to be developed in WP2 from i GDPR ii legal techniques for managing privacy information consent and privacy pledges iii fostering compliance with license obligations

Final Standardization Report

A final report on the projects standardization activities consistently with Task T72

Preliminary Dissemination Report

A preliminary report on the projects dissemination activities consistently with Task T71

Preliminary Developer guidelines

First technical report documenting the guidelines to be used by developers to produce secure privacy aware and policybased IoT software

Final Development of Privacy Aware Analytics for Secure Services

This deliverable will contain the final implementation of the mechanisms and engines for intrusion detection voice recognition and smart services together with a demonstration of the effectiveness verified through classification experiments

Final Dissemination Report

A final report on the projects dissemination activities consistently with Task T71

Preliminary Standardization Report

A preliminary report on the projects standardization activities consistently with Task T72

Initial Design and Development of Privacy Aware Analytics for Secure Services

This deliverable will report the first research and development results for the privacy aware analytics which will be used for intrusion detection and development of privacy aware data analysis mechanisms for intrusion detection voice recognition and smart services The deliverable will also report a set of initial experiments to validate the functionality and effectiveness of developed mechanisms

Period 2 Management Reports

Description: Period 2 Management Reports (including Dissemination and Exploitation Plans).

Final Report on Legal and Ethical Aspects

Final report on legal and ethical aspects regarding guidelines and tools to be developed in WP2 from i GDPR ii legal techniques for managing privacy information consent and privacy pledges iii fostering compliance with license obligations

Initial Pilot Use Case requirements

This deliverable reports the results of the elicitation of functional nonfunctional security and privacy requirements of T61 and T62 The deliverable takes in input the results of deliverables T12 and T22 related to architecture and software requirements Report

Final Business and Exploitation Plan

A final report on the partners business and exploitation plan consistently with Task T73

Preliminary Business and Exploitation Plan

A preliminary report on the partners business and exploitation plan consistently with Task T73

Analyses, and Feedback on Architecture Requirements and Goals

This report provides WP1 with feedback and requests for adaptations to the defined requirements and goals to ensure the designdevelopment of feasible and effective security analytics services and privacy preserving analytics for intrusion detection voice recognition and smart services

Report on Security and Privacy Metrics

Technical report documenting security and privacy metrics to be used for assessing IoT software

Final Developer guidelines

Final technical report documenting the guidelines to be used by developers to produce secure privacy aware and policybased IoT software

Final Architecture Requirements Report

Final report documenting the architectural requirements elicited after receiving technical requirements of WP3 and WP4

First version of SIFIS-Home testbed

This deliverable is the output of tasks T5.1 and it describes the design and the deployment of the first version of the SIFIS-Home physical testbed that will deployed to allow the use case to develop, deploy and test their applications. (Demonstrator)

Final version of SIFIS-Home testbed

This deliverable is the output of the process of refinement of the SIFIS-Home physical testbed, which concludes the activities the task of T5.1 (Demonstrator)

First version of Pilot Use Case implementation

This deliverable reports the description and actual code of the first implementation of the pilot use case, resulting from the initial deployment of the SIFIS-Home framework in the Mind platform performed in T6.3 and the related validation performed in task 6.4. (Demonstrator)

Final version of the SIFIS-Home Security Architecture Implementation

This deliverable reports the complete implementation and integration of the SIFIS-Home security architecture performed in T5.2 and the final validation results from the activities of T5.3. (Demonstrator)

First version of SIFIS-Home Security Architecture Implementation

This deliverable reports the first implementation of the SIFIS-Home security architecture performed in T5.2 and the related validation performed in T5.3. (Demonstrator)

First Version of Developer tools

First version of Code and Documentation of the developer tools created in the project that implement some of developer guidelines for assessing IoT software

Final version of Pilot Use Case implementation

This deliverable reports the description and actual code of the final implementation of the pilot use case, resulting from the final deployment of the SIFIS-Home framework in the Mind platform performed in T6.3 and the related final validation performed in task 6.4. (Demonstrator)

Final Version of Developer tools

Final version of Code and Documentation of the developer tools created in the project that implement some of developer guidelines for assessing IoT software.

Management & Quality Plan

Description Implementation of a quality assurance procedures on deliverables organisation of an efficient continuous project progress monitoring tasks milestones budget identification and analysis of risks plus suggestions for fallback solutions

SIFIS-Home Website

Public domain website for promoting SIFISHome goals and activities

Veröffentlichungen

Lightweight Authenticated Key Exchange With EDHOC

Autoren: Mališa Vučinić; Göran Selander; John Preuss Mattsson; Thomas Watteyne
Veröffentlicht in: Computer, 2022, ISSN 0018-9162
Herausgeber: Institute of Electrical and Electronics Engineers
DOI: 10.1109/mc.2022.3144764

Using recurrent neural networks for continuous authentication through gait analysis

Autoren: Giacomo Giorgi, Andrea Saracino, Fabio Martinelli
Veröffentlicht in: Elsevier PR Letters, 2021, ISSN 0167-8655
Herausgeber: Elsevier BV
DOI: 10.1016/j.patrec.2021.03.010

Exploiting If This Then That and Usage Control obligations for Smart Home security and management

Autoren: Giacomo Giorgi, Antonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos, Andrea Saracino
Veröffentlicht in: Concurrency and Computation: Practice and Experience, 2021, ISSN 1532-0626
Herausgeber: John Wiley & Sons Inc.
DOI: 10.1002/cpe.6189

Vulnerabilities of the 6P protocol for the Industrial Internet of Things: Impact analysis and mitigation

Autoren: Francesca Righetti; Carlo Vallati; Marco Tiloca; Giuseppe Anastasi
Veröffentlicht in: Crossref, Ausgabe 13, 2022, ISSN 0140-3664
Herausgeber: Elsevier BV
DOI: 10.1016/j.comcom.2022.07.054

Preserving Privacy in the Globalized Smart Home: The SIFIS-Home Project

Autoren: Luca Ardito, Luca Barbato, Paolo Mori, Andrea Saracino
Veröffentlicht in: IEEE Security And Privacy, 2021, ISSN 1540-7993
Herausgeber: IEEE Computer Society
DOI: 10.1109/msec.2021.3118561

Quality Assessment Methods for Textual Conversational Interfaces: A Multivocal Literature Review

Autoren: Riccardo Coppola; Luca Ardito
Veröffentlicht in: Information, Ausgabe 1, 2021, ISSN 2078-2489
Herausgeber: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/info12110437

Privacy preserving data sharing and analysis for edge-based architectures

Autoren: Mina Sheikhalishahi, Andrea Saracino, Fabio Martinelli, Antonio La Marra
Veröffentlicht in: International Journal of Information Security, 2021, ISSN 1615-5262
Herausgeber: Springer Verlag
DOI: 10.1007/s10207-021-00542-x

Privacy-Preserving Analysis for Remote Video Anomaly Detection in Real Life Environments

Autoren: Giacomo Giorgi, Wisam Abbasi, Andrea Saracino
Veröffentlicht in: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Ausgabe Vol 13, Ausgabe 1, 2022, ISSN 2093-5374
Herausgeber: Innovative Information Science & Technology Research Group (ISYOU)
DOI: 10.22667/jowua.2022.03.31.112

Performance Evaluation of Group OSCORE for Secure Group Communication in the Internet of Things

Autoren: M. Gunnarsson, K. M. Malarski, R. Höglund and M. Tiloca
Veröffentlicht in: ACM Transactions on Internet of Things, 2022, ISSN 2691-1914
Herausgeber: Association for Computing Machinery
DOI: 10.1145/3523064

Evaluating the performance of the OSCORE security protocol in constrained IoT environments

Autoren: Martin Gunnarsson, Joakim Brorsson, Francesca Palombini, Ludwig Seitz and Marco Tiloca
Veröffentlicht in: Internet of Things, 2021, ISSN 2542-6605
Herausgeber: Internet of Things
DOI: 10.1016/j.iot.2020.100333

An Ontology-Based Approach for Setting Security Policies in Smart Homes

Autoren: A. Monge Roffarello and L. De Russis
Veröffentlicht in: Emerging Technologies for Authorization and Authentication (ETAA 2022), 2022
Herausgeber: ETAA2022 / ESORICS2022
DOI: 10.1007/978-3-031-25467-3_1

Privacy-Preserving Speaker Verification and Speech Recognition

Autoren: WIsam Abbasi
Veröffentlicht in: ETAA2022, 2022
Herausgeber: ETAA2022 / ESORICS2022
DOI: 10.1007/978-3-031-25467-3_7

Privacy vs Accuracy Trade-Off in Privacy Aware Face Recognition in Smart Systems

Autoren: Wisam Abbasi, Paolo Mori, Andrea Saracino, Valerio Frascolla
Veröffentlicht in: 12th Workshop on Management of Cloud and Smart City Systems (MoCS 2022), 2022
Herausgeber: IEEE ISCC Proceedings
DOI: 10.1109/iscc55528.2022.9912465

Secure Software Updates for IoT based on Industry Requirements

Autoren: Ludwig Seitz, Marco Tiloca, Martin Gunnarsson and Rikard Höglund
Veröffentlicht in: 9th International Conference on Information Systems Security and Privacy (ICISSP 2023), 2023, ISBN 978-989-758-624-8
Herausgeber: SCITEPRESS
DOI: 10.5220/0011790100003405

On-demand Key Distribution for Cloud Networks

Autoren: Nicolae Paladi, Marco Tiloca, Pegah Nikbakht Bideh and Martin Hell
Veröffentlicht in: 24th Conference on Innovation in Clouds, Internet and Networks (ICIN 2021), Demonstration track, 2021
Herausgeber: IEEE
DOI: 10.1109/icin51074.2021.9385528

A Real-Time Deep Learning Approach for Real-World Video Anomaly Detection

Autoren: Stefano Petrocchi; Giacomo Giorgi; Mario G. C. A. Cimino
Veröffentlicht in: The 16th International Conference on Availability, Reliability and Security (ARES 2021), Vienna, Austria, 17-20/08/2021, Ausgabe 15, 2021
Herausgeber: Springer
DOI: 10.1145/3465481.3470099

Flowrider - Fast On-Demand Key Provisioning for Cloud Networks

Autoren: Nicolae Paladi, Marco Tiloca, Pegah Nikbakht Bideh and Martin Hell
Veröffentlicht in: 17th EAI International Conference on Security and Privacy in Communication Networks (EAI SecureComm 2021), 2021
Herausgeber: Springer
DOI: 10.1109/msec.2021.3118561

Key Update for the IoT Security Standard OSCORE

Autoren: Rikard Höglund, Marco Tiloca, Simon Bouget and Shahid Raza
Veröffentlicht in: 2023 IEEE International Conference on Cyber Security and Resilience (CSR 2023), 2023, ISBN 979-8-3503-1170-9
Herausgeber: IEEE
DOI: 10.1109/csr57506.2023.10225002

An application of Netspot to Detect Anomalies in IoT

Autoren: Tom Tuunainen, Olli Isohanni, Mitha Jose
Veröffentlicht in: 2022 IEEE 8th International Conference on Network Softwarization (NetSoft), 2022, ISBN 978-1-6654-0694-9
Herausgeber: IEEE
DOI: 10.1109/netsoft54395.2022.9844059

Demo: Usage Control using Controlled Privacy Aware Face Recognition

Autoren: Arpad Müller, Wisam Abbasi
Veröffentlicht in: 12th Workshop on Management of Cloud and Smart City Systems (MoCS 2022), 2022
Herausgeber: IEEE ISCC Proceedings
DOI: 10.1109/iscc55528.2022.9912953

Suche nach OpenAIRE-Daten ...

Bei der Suche nach OpenAIRE-Daten ist ein Fehler aufgetreten

Es liegen keine Ergebnisse vor