Skip to main content

Safe-Guarding Home IoT Environments with Personalised Real-time Risk Control

Deliverables

Final review of real-life trials evaluation report

This final review will perform four planned trials together with all necessary steps in order to validate the GHOST solution. Trials are divided in three stages, the first stage will last one month and will contain initial set of features, mostly for getting first feedback from the end-users. The second stage will last 3 months and the intermediate prototype will be tested containing the majority of core features. The last stage has a duration of 6 months during which the fully functional stable prototype will be evaluated as defined in T7.2. This review must contain all relevant updates and improvements which were not considered in the second review report.This deliverable is related to the tasks T7.2 and T7.3

First review of human-centred approach & recommendations report

This first review ensures that the human-centred design approach activities are implemented across the different stages of the project. It takes the form of continual consultation with end-users performed: during requirement analysis and psychological experiments on end-user behaviour, design (mock-ups and core functionalities evaluated by users, etc.), development (demonstration in focused groups), trials preparation, trials implementation and final evaluation of the solution.This deliverable is related to the task T7.1

Third review of dissemination plan and year report

This third review report involves the elaboration and third year update/ review of a Dissemination Plan in line with the communication management strategy defined in WP2. This includes a clear communication policy that identifies the relevant audiences to target and the appropriate channels to use for that throughout the project duration.This deliverable is related to the task T8.1

First user needs analysis and specifications report

A comprehensive study on the needs of end-users will be performed through questionnaires, mock-ups and personal- and group- interviews. This deliverable is related to the task T3.3

Final specification of user experiments report

This Final Specification of user experiments includes the type of experiment (focus group or user study), the number of participants, the study design, the data to be collected, as well as the evaluation method. It is a review of the second specification of user experiments and must contain all relevant updates detected in all aspects taked into account to develop these user experiments.This deliverable is related to the task T3.5

Second review of user experiments evaluation report

This second review will be performed in the context of the T7.3, but focusing on user behaviour aspects. In particular, the three types of user interfaces will be evaluated (Feedback, Configuration and Usable Transparency) as defined in T3.5. The collected data will be analysed and the results will be presented for further recommendations on improvements in the subsequent iterations of GHOST platform development. This second review report is tightly coupled with the T5.3, T5.4 and T5.5 and must contain all relevant updates and improvements which were not considered in the first review report.This deliverable is related to the task T7.4

Final review of specification of real-life field trial execution and assessment protocol

The main objective of this final review is to design the trials examining issues like: analysis of available infrastructure and how the trials sites are organised. An inventory of the available resources and a specification of what needs to be added, extended or adapted for the support of the corresponding pilot will be made. The necessary documents for running the pilots, including quick guide, troubleshoot manual and informed consent documents will be developed as part of this deliverable. This review must contain all relevant updates and improvements required for the running of pilotsand informed consent documents for the users involved in the pilot experiences which were not considered in the second review.This deliverable is related to the task T7.2

Initial Gap analysis and recommendations on cyber security features report

An initial gap analysis will be conducted to specify in detail technological innovation potential for GHOST solution and propose innovative features. This deliverable is related to the task T3.1

Second specification of user experiments report

This Second Specification of user experiments includes the type of experiment (focus group or user study), the number of participants, the study design, the data to be collected, as well as the evaluation method. It is a review of the first specification of user experiments and must contain all relevant updates detected in all aspects taked into account to develop these user experiments.This deliverable is related to the task T3.5

Final review of human-centred approach & recommendations report

This final review ensures that the human-centred design approach activities are implemented across the different stages of the project. It takes the form of continual consultation with end-users performed: during requirement analysis and psychological experiments on end-user behaviour, design (mock-ups and core functionalities evaluated by users, etc.), development (demonstration in focused groups), trials preparation, trials implementation and final evaluation of the solution. This review must contain all relevant updates and improvements which were not considered in the second review. This deliverable is related to the task T7.1

Standardization report

This report will monitor the activities of standards working groups in security, privacy, trust, IoT, smart homes and data analytics.This deliverable is related to the task T8.3

First specification of user experiments report

This First Specification of user experiments includes the type of experiment (focus group or user study), the number of participants, the study design, the data to be collected, as well as the evaluation method.This deliverable is related to the task T3.5

First review of specification of real-life field trial execution and assessment protocol

The main objective of this first review is to design the trials examining issues like: analysis of available infrastructure and how the trials sites are organised. An inventory of the available resources and a specification of what needs to be added, extended or adapted for the support of the corresponding pilot will be made. The necessary documents for running the pilots, including quick guide, troubleshoot manual and informed consent documents will be developed as part of this deliverable.This deliverable is related to the task T7.2

Initial mental models report and human integration in the development phases plan

This includes an initial explorative, qualitative report at the beginning of the project to identify user’s mental models for all three phases s/he will be involved (configuration, decision making when GHOST has not enough information to decide, information about GHOST’s decision making).This deliverable is related to the task T3.2

Final mental models report and human integration in the development phases plan

This includes a final explorative, qualitative report at the beginning of the project to identify user’s mental models for all three phases s/he will be involved (configuration, decision making when GHOST has not enough information to decide, information about GHOST’s decision making). This report must contain all improvement and reviews done into the initial mental models mentioned in D3.3.This deliverable is related to the task T3.2

Second trials use cases specification and report

The Second Use Case Scenarios report will be developed and will reflect detailed realistic situations, behaviour of the end-users in their regular technological demands. The use-case scenarios will be used for WP7. The use case scenarios report will be submitted to periodical reviews and will contain every change of behaviour of end users to addapt the final solution which were not considered in D3.9.This deliverable is related to the task T3.4

Final gap analysis and recommendations on cyber security features report

A final gap analysis will be conducted to specify in detail technological innovation potential for GHOST solution and propose innovative features. It must content all reviews done into the initial gap analysis and all technological innovation potential for GHOST solution non detected in the initial steps of the project.This deliverable is related to the task T3.1

First trials use cases specification and report

The First Use Case Scenarios report will be developed and will reflect detailed realistic situations, behaviour of the end-users in their regular technological demands. The use-case scenarios will be used for WP7. The use case scenarios report will be submitted to periodical reviews.This deliverable is related to the task T3.4

Second user needs analysis and specifications report

A second review of the first comprehensive study developed in D3.5 on the needs of end-users will be performed through questionnaires, mock-ups and personal- and group- interviews.This deliverable is related to the task T3.3

Final trials use cases specification and report

The Final Use Case Scenarios report will be developed and will reflect detailed realistic situations, behaviour of the end-users in their regular technological demands. The use-case scenarios will be used for WP7. The final use case scenarios report must contain all changes of behaviour of end users which were not considered in D3.11, so that, they could contribute to addapt the final solution to the end users´ regular technological demands.This deliverable is related to the task T3.4

Final user needs analysis and specifications report

A final review of the comprehensive studies developed in D3.7 on the needs of end-users will be performed through questionnaires, mock-ups and personal- and group- interviews. This final review must contain all the needs of end users and updates which were not considered by the previous reports done.This deliverable is related to the task T3.3

Second review of human-centred approach & recommendations report

This second review ensures that the human-centred design approach activities are implemented across the different stages of the project. It takes the form of continual consultation with end-users performed: during requirement analysis and psychological experiments on end-user behaviour, design (mock-ups and core functionalities evaluated by users, etc.), development (demonstration in focused groups), trials preparation, trials implementation and final evaluation of the solution. This review must contain all relevant updates and improvements which were not considered in the first review.This deliverable is related to the task T7.1

Final review of dissemination plan and year report

This final review report involves the elaboration and final year update/ review of a Dissemination Plan in line with the communication management strategy defined in WP2. This includes a clear communication policy that identifies the relevant audiences to target and the appropriate channels to use for that throughout the project duration.This deliverable is related to the task T8.1

First review of user experiments evaluation report

This first review will be performed in the context of the T7.3, but focusing on user behaviour aspects. In particular, the three types of user interfaces will be evaluated (Feedback, Configuration and Usable Transparency) as defined in T3.5. The collected data will be analysed and the results will be presented for further recommendations on improvements in the subsequent iterations of GHOST platform development. This first review report is tightly coupled with the T5.3, T5.4 and T5.5.This deliverable is related to the task T7.4

Second review of specification of real-life field trial execution and assessment protocol

The main objective of this second review is to design the trials examining issues like: analysis of available infrastructure and how the trials sites are organised. An inventory of the available resources and a specification of what needs to be added, extended or adapted for the support of the corresponding pilot will be made. The necessary documents for running the pilots, including quick guide, troubleshoot manual and informed consent documents will be developed as part of this deliverable. This review must contain all relevant updates and improvements required for the running of pilotsand informed consent documents for the users involved in the pilot experiences which were not considered in the first review.This deliverable is related to the task T7.2

Second review of dissemination plan and year report

This second review report involves the elaboration and second year update/ review of a Dissemination Plan in line with the communication management strategy defined in WP2. This includes a clear communication policy that identifies the relevant audiences to target and the appropriate channels to use for that throughout the project duration.This deliverable is related to the task T8.1

Third trials use cases specification and report

The Third Use Case Scenarios report will be developed and will reflect detailed realistic situations, behaviour of the end-users in their regular technological demands. The use-case scenarios will be used for WP7. The use case scenarios report will be submitted to periodical reviews and must contain every change of behaviour of end users which were not considered in D3.10.This deliverable is related to the task T3.4

First review of dissemination plan and year report

This first review report involves the elaboration and first year update/ review of a Dissemination Plan in line with the communication management strategy defined in WP2. This includes a clear communication policy that identifies the relevant audiences to target and the appropriate channels to use for that throughout the project duration.This deliverable is related to the task T8.1

First review of real-life field trials evaluation report

This first review will perform four planned trials together with all necessary steps in order to validate the GHOST solution. Trials are divided in three stages, the first stage will last one month and will contain initial set of features, mostly for getting first feedback from the end-users. The second stage will last 3 months and the intermediate prototype will be tested containing the majority of core features. The last stage has a duration of 6 months during which the fully functional stable prototype will be evaluated as defined in T7.2.This deliverable is related to the tasks T7.2 and T7.3

Second review of real-life field trials evaluation report

This second review will perform four planned trials together with all necessary steps in order to validate the GHOST solution. Trials are divided in three stages, the first stage will last one month and will contain initial set of features, mostly for getting first feedback from the end-users. The second stage will last 3 months and the intermediate prototype will be tested containing the majority of core features. The last stage has a duration of 6 months during which the fully functional stable prototype will be evaluated as defined in T7.2. This review must contain all relevant updates and improvements which were not considered in the first review report.This deliverable is related to the tasks T7.2 and T7.3

Third user needs analysis and specifications report

A third review of the second comprehensive study developed in D3.6 on the needs of end-users will be performed through questionnaires, mock-ups and personal- and group- interviews.This deliverable is related to the task T3.3

Inicial functional specifications and system architecture report

All technical functionalities (hardware and software) will be identified in link with the defined user requirements. Specifications concerning desired end-user behavioural patterns and relevant triggers will also be integrated into the functional and design specifications. This deliverable is related to the task T3.6

Final functional specifications and system architecture report

All technical functionalities (hardware and software) will be identified in link with the defined user requirements. Specifications concerning desired end-user behavioural patterns and relevant triggers will also be integrated into the functional and design specifications. This final functional specifications report must contain a completed review of the inicial functional specifications report, as these specifications will serve as a main input for subsequent work packages.This deliverable is related to the task T3.6

Final review of user experiments evaluation report

This final review will be performed in the context of the T7.3, but focusing on user behaviour aspects. In particular, the three types of user interfaces will be evaluated (Feedback, Configuration and Usable Transparency) as defined in T3.5. The collected data will be analysed and the results will be presented for further recommendations on improvements in the subsequent iterations of GHOST platform development. This final review report is tightly coupled with the T5.3, T5.4 and T5.5 and must contain all relevant updates and improvements which were not considered in the second review report.This deliverable is related to the task T7.4

Initial review of projects communication platform

This initial review will focus on the creation and update of the project’s web platform which will be the convergence platform of all the activities and events in the project.This deliverable is related to the tasks T8.1 and T8.2

Final review of projects communication platform

This final review will focus on the creation and update of the project’s web platform which will be the convergence platform of all the activities and events in the project. This review must contain all relevant updates and improvements which were not considered in the initial version document about the project´s web platform.This deliverable is related to the tasks T8.1 and T8.2

Searching for OpenAIRE data...

Publications

Energy Life-Time of Wireless Nodes with Network Attacks

Author(s): E. Gelenbe and Y. M. Kadioglu
Published in: ISCIS CyberSecurity Workshop 2018, Issue 26.02.2018, 2018

Deep Learning with Dense Random Neural Networks for Detecting Attacks against IoT connected Home Environments

Author(s): Olivier Brun, Yonghua Yin, Erol Gelenbe, Javier Augusto-Gonzalez, and Manuel Ramos
Published in: ISCIS Cybersecurity Workshop 2018, Issue 26.02.2018, 2018

A Security-Enhanced Interoperability Middleware for the Internet of Things

Author(s): Hunor Sandor, Bela Genge, Piroska Haller, and Andrei Bica
Published in: INDIN2018, IEEE 16 th International Conference on Industrial Informatics, Issue 18.07.2018, 2018

Advancing Trust Visualisations for Wider Applicability and User Acceptance

Author(s): Oksana Kulyk, Benjamin Maximmilian Reinheimer, Paul Gerber, Florian Volk, Melanie Volkamer, Max Muhlhauser
Published in: 2017 IEEE Trustcom/BigDataSE/ICESS, 2017, Page(s) 562-569
DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.285

Towards Reliable Integrity in Blacklisting: Facing Malicious IPs in GHOST Smart Contracts

Author(s): Georgios Spathoulas, Anastasija Collen, Pankaj Pandey, Niels A. Nijdam, Sokratis Katsikas, Charalampos S. Kouzinopoulos, Maher Ben Moussa, Konstantinos M. Giannoutakis, Konstantinos Votis, Dimitrios Tzovaras
Published in: 2018 Innovations in Intelligent Systems and Applications (INISTA), 2018, Page(s) 1-8
DOI: 10.1109/inista.2018.8466327

Implementing a Forms of Consent Smart Contract on an IoT-based Blockchain to promote user trust

Author(s): Charalampos S. Kouzinopoulos, Konstantinos M. Giannoutakis, Konstantinos Votis, Dimitrios Tzovaras, Anastasija Collen, Niels A. Nijdam, Dimitri Konstantas, Georgios Spathoulas, Pankaj Pandey, Sokratis Katsikas
Published in: 2018 Innovations in Intelligent Systems and Applications (INISTA), 2018, Page(s) 1-6
DOI: 10.1109/inista.2018.8466268

Combining Statistical and Machine Learning Techniques in IoT Anomaly Detection for Smart Homes

Author(s): Georgios Spanos, Konstantinos M. Giannoutakis, Konstantinos Votis, Dimitrios Tzovaras
Published in: 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2019, Page(s) 1-6
DOI: 10.1109/camad.2019.8858490

Towards Automated Threat-Based Risk Assessment for Cyber Security in Smarthomes

Author(s): Pankaj Pandey; Anastasija Collen; Niels Nijdam; Marios Anagnostopoulos; Sokratis Katsikas; Dimitri Konstantas
Published in: European Conference on Cyber Warfare and Security. 2019, Issue July 2019, 2019
DOI: 10.5281/zenodo.3951468

Detection of abnormal behavior in smart-home environments

Author(s): G. Spathoulas, S. Evangelatos, M. Anagnostopoulos, G. Mema, S. Katsikas
Published in: 2019 4th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM), Issue 21.11.2019, 2019, Page(s) 1-6
DOI: 10.1109/SEEDA-CECNSM.2019.8908352

From Internet of Threats to Internet of Things: A Cyber Security Architecture for Smart Homes

Author(s): J. Augusto-Gonzalez, A. Collen, S. Evangelatos, M. Anagnostopoulos, G. Spathoulas, K. M. Giannoutakis, K. Votis, D. Tzovaras, B. Genge, E. Gelenbe, N. A. Nijdam
Published in: 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2019, Page(s) 1-6
DOI: 10.1109/camad.2019.8858493

Why Johnny Fails to Protect his Privacy



DOI: 10.1109/eurospw.2019.00019

Non-negative Autoencoder with Simplified Random Neural Network

Author(s): Yonghua Yin, Erol Gelenbe
Published in: 2019 International Joint Conference on Neural Networks (IJCNN), Issue 14-19 July 2019, 2019, Page(s) 1-6
DOI: 10.1109/IJCNN.2019.8851912

Random Neural Networks and Deep Learning for Attack Detection at the Edge

Author(s): Olivier Brun, Yonghua Yin
Published in: 2019 IEEE International Conference on Fog Computing (ICFC), Issue 24-26 June 2019, 2019, Page(s) 11-14
DOI: 10.1109/ICFC.2019.00009

Home Sweet Home? Investigating Users’ Awareness of Smart Home Privacy Threats

Author(s): Gerber, Nina; Reinheimer, Benjamin; Volkamer, Melanie
Published in: Proceedings of An Interactive Workshop on the Human aspects of Smarthome Security and Privacy (WSSP), Baltimore, MD, August 12, 2018, Issue 7, 2018
DOI: 10.5445/ir/1000083578

Does This App Respect My Privacy? Design and Evaluation of Information Materials Supporting Privacy-Related Decisions of Smartphone Users

Author(s): Kulyk, Oksana; Gerber, Paul; Marky, Karola; Beckmann, Christopher; Volkamer, Melanie
Published in: Proceedings 2019 Workshop on Usable Security, Issue 6, 2019
DOI: 10.5445/ir/1000090893

A Concept and Evaluation of Usable and Fine-Grained Privacy-Friendly Cookie Settings Interface

Author(s): Oksana Kulyk, Peter Mayer, Melanie Volkamer, Oliver Kafer
Published in: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2018, Page(s) 1058-1063
DOI: 10.1109/TrustCom/BigDataSE.2018.00148

GHOST - Safe-Guarding Home IoT Environments with Personalised Real-Time Risk Control

Author(s): A. Collen, N. A. Nijdam, J. Augusto-Gonzalez, S. K. Katsikas, K. M. Giannoutakis, G. Spathoulas, E. Gelenbe, K. Votis, D. Tzovaras, N. Ghavami, M. Volkamer, P. Haller, A. Sánchez, M. Dimas
Published in: Security in Computer and Information Sciences - First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers, Issue 821, 2018, Page(s) 68-78
DOI: 10.1007/978-3-319-95189-8_7

Using Blockchains to Strengthen the Security of Internet of Things

Author(s): Charalampos S. Kouzinopoulos, Georgios Spathoulas, Konstantinos M. Giannoutakis, Konstantinos Votis, Pankaj Pandey, Dimitrios Tzovaras, Sokratis K. Katsikas, Anastasija Collen, Niels A. Nijdam
Published in: Security in Computer and Information Sciences - First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers, Issue 821, 2018, Page(s) 90-100
DOI: 10.1007/978-3-319-95189-8_9

A Study on Security and Privacy Guidelines, Countermeasures, Threats: IoT Data at Rest Perspective

Author(s): Hezam Akram Abdulghani, Niels Alexander Nijdam, Anastasija Collen, Dimitri Konstantas
Published in: Symmetry, Issue 11/6, 2019, Page(s) 774, ISSN 2073-8994
DOI: 10.3390/sym11060774

Smart Home Security: How Safe is Your Data? [Opinion]

Author(s): Kristina Milanovic
Published in: IEEE Technology and Society Magazine, Issue 39/1, 2020, Page(s) 26-29, ISSN 0278-0097
DOI: 10.1109/MTS.2020.2967490

Investigating People’s Privacy Risk Perception

Author(s): Nina Gerber, Benjamin Reinheimer, Melanie Volkamer
Published in: Proceedings on Privacy Enhancing Technologies, Issue 2019/3, 2019, Page(s) 267-288, ISSN 2299-0984
DOI: 10.2478/popets-2019-0047