Skip to main content
European Commission logo
polski polski
CORDIS - Wyniki badań wspieranych przez UE
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

Secure Interoperable Full-Stack Internet of Things for Smart Home

Rezultaty

Refined Pilot Use Case requirements

This deliverable reports the refined requirements refined in T62 after the first deployment of the pilot use case architecture providing feedbacks to be integrated in the final deployment possibly refining also the validation strategy of T64 Report

Initial Component, Architecture, and Intercommunication Design

Initial report documenting the prescriptive component architecture and intercommunication designs that implement the best practices and mitigations for security and privacy of T13 and T14 This report shall include the design of a WoT component marketplace API designs for the apropos elements and a labelling of APIs with respect to the operations relevant to security and privacy

Final Component, Architecture, and Intercommunication Design

Final report documenting the prescriptive component architecture and intercommunication designs that implement the best practices and mitigations for security and privacy of T13 This report shall include the design of a WoT component marketplace API designs for the apropos elements and a labelling see T23 of APIs with respect to the operations relevant to security and privacy at all levels from physical to communication and data management

Initial Architecture Requirements Report

Report documenting the elicited requirements from task T11 related to security privacy functional and nonfunctional aspects

Period 1 Management Reports

Description Period 1 Management Reports including Dissemination and Exploitation Plans

Preliminary report on Network and System Security Solutions

Preliminary technical report documenting output results and achievements of WP3 activities from the first half of the project

Analyses and feedback on architecture requirements and goals

Report providing WP1 with feedback and requests for adaptations to the defined requirements and goals to ensure the designdevelopment of feasible and effective system security solutions

Final report on Network and System Security Solutions

Final technical report documenting output results and achievements of WP3 activities at the end of the project

Initial Report on Legal and Ethical Aspects

Initial report on legal and ethical aspects regarding guidelines and tools to be developed in WP2 from i GDPR ii legal techniques for managing privacy information consent and privacy pledges iii fostering compliance with license obligations

Final Standardization Report

A final report on the projects standardization activities consistently with Task T72

Preliminary Dissemination Report

A preliminary report on the projects dissemination activities consistently with Task T71

Preliminary Developer guidelines

First technical report documenting the guidelines to be used by developers to produce secure privacy aware and policybased IoT software

Final Development of Privacy Aware Analytics for Secure Services

This deliverable will contain the final implementation of the mechanisms and engines for intrusion detection voice recognition and smart services together with a demonstration of the effectiveness verified through classification experiments

Final Dissemination Report

A final report on the projects dissemination activities consistently with Task T71

Preliminary Standardization Report

A preliminary report on the projects standardization activities consistently with Task T72

Initial Design and Development of Privacy Aware Analytics for Secure Services

This deliverable will report the first research and development results for the privacy aware analytics which will be used for intrusion detection and development of privacy aware data analysis mechanisms for intrusion detection voice recognition and smart services The deliverable will also report a set of initial experiments to validate the functionality and effectiveness of developed mechanisms

Period 2 Management Reports

Description: Period 2 Management Reports (including Dissemination and Exploitation Plans).

Final Report on Legal and Ethical Aspects

Final report on legal and ethical aspects regarding guidelines and tools to be developed in WP2 from i GDPR ii legal techniques for managing privacy information consent and privacy pledges iii fostering compliance with license obligations

Initial Pilot Use Case requirements

This deliverable reports the results of the elicitation of functional nonfunctional security and privacy requirements of T61 and T62 The deliverable takes in input the results of deliverables T12 and T22 related to architecture and software requirements Report

Final Business and Exploitation Plan

A final report on the partners business and exploitation plan consistently with Task T73

Preliminary Business and Exploitation Plan

A preliminary report on the partners business and exploitation plan consistently with Task T73

Analyses, and Feedback on Architecture Requirements and Goals

This report provides WP1 with feedback and requests for adaptations to the defined requirements and goals to ensure the designdevelopment of feasible and effective security analytics services and privacy preserving analytics for intrusion detection voice recognition and smart services

Report on Security and Privacy Metrics

Technical report documenting security and privacy metrics to be used for assessing IoT software

Final Developer guidelines

Final technical report documenting the guidelines to be used by developers to produce secure privacy aware and policybased IoT software

Final Architecture Requirements Report

Final report documenting the architectural requirements elicited after receiving technical requirements of WP3 and WP4

First version of SIFIS-Home testbed

This deliverable is the output of tasks T5.1 and it describes the design and the deployment of the first version of the SIFIS-Home physical testbed that will deployed to allow the use case to develop, deploy and test their applications. (Demonstrator)

Final version of SIFIS-Home testbed

This deliverable is the output of the process of refinement of the SIFIS-Home physical testbed, which concludes the activities the task of T5.1 (Demonstrator)

First version of Pilot Use Case implementation

This deliverable reports the description and actual code of the first implementation of the pilot use case, resulting from the initial deployment of the SIFIS-Home framework in the Mind platform performed in T6.3 and the related validation performed in task 6.4. (Demonstrator)

Final version of the SIFIS-Home Security Architecture Implementation

This deliverable reports the complete implementation and integration of the SIFIS-Home security architecture performed in T5.2 and the final validation results from the activities of T5.3. (Demonstrator)

First version of SIFIS-Home Security Architecture Implementation

This deliverable reports the first implementation of the SIFIS-Home security architecture performed in T5.2 and the related validation performed in T5.3. (Demonstrator)

First Version of Developer tools

First version of Code and Documentation of the developer tools created in the project that implement some of developer guidelines for assessing IoT software

Final version of Pilot Use Case implementation

This deliverable reports the description and actual code of the final implementation of the pilot use case, resulting from the final deployment of the SIFIS-Home framework in the Mind platform performed in T6.3 and the related final validation performed in task 6.4. (Demonstrator)

Final Version of Developer tools

Final version of Code and Documentation of the developer tools created in the project that implement some of developer guidelines for assessing IoT software.

Management & Quality Plan

Description Implementation of a quality assurance procedures on deliverables organisation of an efficient continuous project progress monitoring tasks milestones budget identification and analysis of risks plus suggestions for fallback solutions

SIFIS-Home Website

Public domain website for promoting SIFISHome goals and activities

Publikacje

Lightweight Authenticated Key Exchange With EDHOC

Autorzy: Mališa Vučinić; Göran Selander; John Preuss Mattsson; Thomas Watteyne
Opublikowane w: Computer, 2022, ISSN 0018-9162
Wydawca: Institute of Electrical and Electronics Engineers
DOI: 10.1109/mc.2022.3144764

Using recurrent neural networks for continuous authentication through gait analysis

Autorzy: Giacomo Giorgi, Andrea Saracino, Fabio Martinelli
Opublikowane w: Elsevier PR Letters, 2021, ISSN 0167-8655
Wydawca: Elsevier BV
DOI: 10.1016/j.patrec.2021.03.010

Exploiting If This Then That and Usage Control obligations for Smart Home security and management

Autorzy: Giacomo Giorgi, Antonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos, Andrea Saracino
Opublikowane w: Concurrency and Computation: Practice and Experience, 2021, ISSN 1532-0626
Wydawca: John Wiley & Sons Inc.
DOI: 10.1002/cpe.6189

Vulnerabilities of the 6P protocol for the Industrial Internet of Things: Impact analysis and mitigation

Autorzy: Francesca Righetti; Carlo Vallati; Marco Tiloca; Giuseppe Anastasi
Opublikowane w: Crossref, Numer 13, 2022, ISSN 0140-3664
Wydawca: Elsevier BV
DOI: 10.1016/j.comcom.2022.07.054

Preserving Privacy in the Globalized Smart Home: The SIFIS-Home Project

Autorzy: Luca Ardito, Luca Barbato, Paolo Mori, Andrea Saracino
Opublikowane w: IEEE Security And Privacy, 2021, ISSN 1540-7993
Wydawca: IEEE Computer Society
DOI: 10.1109/msec.2021.3118561

Quality Assessment Methods for Textual Conversational Interfaces: A Multivocal Literature Review

Autorzy: Riccardo Coppola; Luca Ardito
Opublikowane w: Information, Numer 1, 2021, ISSN 2078-2489
Wydawca: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/info12110437

Privacy preserving data sharing and analysis for edge-based architectures

Autorzy: Mina Sheikhalishahi, Andrea Saracino, Fabio Martinelli, Antonio La Marra
Opublikowane w: International Journal of Information Security, 2021, ISSN 1615-5262
Wydawca: Springer Verlag
DOI: 10.1007/s10207-021-00542-x

Privacy-Preserving Analysis for Remote Video Anomaly Detection in Real Life Environments

Autorzy: Giacomo Giorgi, Wisam Abbasi, Andrea Saracino
Opublikowane w: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Numer Vol 13, Numer 1, 2022, ISSN 2093-5374
Wydawca: Innovative Information Science & Technology Research Group (ISYOU)
DOI: 10.22667/jowua.2022.03.31.112

Performance Evaluation of Group OSCORE for Secure Group Communication in the Internet of Things

Autorzy: M. Gunnarsson, K. M. Malarski, R. Höglund and M. Tiloca
Opublikowane w: ACM Transactions on Internet of Things, 2022, ISSN 2691-1914
Wydawca: Association for Computing Machinery
DOI: 10.1145/3523064

Evaluating the performance of the OSCORE security protocol in constrained IoT environments

Autorzy: Martin Gunnarsson, Joakim Brorsson, Francesca Palombini, Ludwig Seitz and Marco Tiloca
Opublikowane w: Internet of Things, 2021, ISSN 2542-6605
Wydawca: Internet of Things
DOI: 10.1016/j.iot.2020.100333

An Ontology-Based Approach for Setting Security Policies in Smart Homes

Autorzy: A. Monge Roffarello and L. De Russis
Opublikowane w: Emerging Technologies for Authorization and Authentication (ETAA 2022), 2022
Wydawca: ETAA2022 / ESORICS2022
DOI: 10.1007/978-3-031-25467-3_1

Privacy-Preserving Speaker Verification and Speech Recognition

Autorzy: WIsam Abbasi
Opublikowane w: ETAA2022, 2022
Wydawca: ETAA2022 / ESORICS2022
DOI: 10.1007/978-3-031-25467-3_7

Privacy vs Accuracy Trade-Off in Privacy Aware Face Recognition in Smart Systems

Autorzy: Wisam Abbasi, Paolo Mori, Andrea Saracino, Valerio Frascolla
Opublikowane w: 12th Workshop on Management of Cloud and Smart City Systems (MoCS 2022), 2022
Wydawca: IEEE ISCC Proceedings
DOI: 10.1109/iscc55528.2022.9912465

Secure Software Updates for IoT based on Industry Requirements

Autorzy: Ludwig Seitz, Marco Tiloca, Martin Gunnarsson and Rikard Höglund
Opublikowane w: 9th International Conference on Information Systems Security and Privacy (ICISSP 2023), 2023, ISBN 978-989-758-624-8
Wydawca: SCITEPRESS
DOI: 10.5220/0011790100003405

On-demand Key Distribution for Cloud Networks

Autorzy: Nicolae Paladi, Marco Tiloca, Pegah Nikbakht Bideh and Martin Hell
Opublikowane w: 24th Conference on Innovation in Clouds, Internet and Networks (ICIN 2021), Demonstration track, 2021
Wydawca: IEEE
DOI: 10.1109/icin51074.2021.9385528

A Real-Time Deep Learning Approach for Real-World Video Anomaly Detection

Autorzy: Stefano Petrocchi; Giacomo Giorgi; Mario G. C. A. Cimino
Opublikowane w: The 16th International Conference on Availability, Reliability and Security (ARES 2021), Vienna, Austria, 17-20/08/2021, Numer 15, 2021
Wydawca: Springer
DOI: 10.1145/3465481.3470099

Flowrider - Fast On-Demand Key Provisioning for Cloud Networks

Autorzy: Nicolae Paladi, Marco Tiloca, Pegah Nikbakht Bideh and Martin Hell
Opublikowane w: 17th EAI International Conference on Security and Privacy in Communication Networks (EAI SecureComm 2021), 2021
Wydawca: Springer
DOI: 10.1109/msec.2021.3118561

Key Update for the IoT Security Standard OSCORE

Autorzy: Rikard Höglund, Marco Tiloca, Simon Bouget and Shahid Raza
Opublikowane w: 2023 IEEE International Conference on Cyber Security and Resilience (CSR 2023), 2023, ISBN 979-8-3503-1170-9
Wydawca: IEEE
DOI: 10.1109/csr57506.2023.10225002

An application of Netspot to Detect Anomalies in IoT

Autorzy: Tom Tuunainen, Olli Isohanni, Mitha Jose
Opublikowane w: 2022 IEEE 8th International Conference on Network Softwarization (NetSoft), 2022, ISBN 978-1-6654-0694-9
Wydawca: IEEE
DOI: 10.1109/netsoft54395.2022.9844059

Demo: Usage Control using Controlled Privacy Aware Face Recognition

Autorzy: Arpad Müller, Wisam Abbasi
Opublikowane w: 12th Workshop on Management of Cloud and Smart City Systems (MoCS 2022), 2022
Wydawca: IEEE ISCC Proceedings
DOI: 10.1109/iscc55528.2022.9912953

Wyszukiwanie danych OpenAIRE...

Podczas wyszukiwania danych OpenAIRE wystąpił błąd

Brak wyników