Fake videos generated by Artificial Intelligence (AI) are more and more convincing. If you have seen Barack Obama call Donald Trump a “complete dipshit” (BuzzFeedVideo 2018), or Mark Zuckerberg brag about having “total control of billions of people’s stolen data” (Yaeger 2019), then you have seen a deepfake. They use a form of AI called […]
The gap between the physical and the cyber world is narrowing down, and we are spending more and more time in the artificial universe. One of the most exciting new hypes is the metaverse. It is a term that is used to describe a combination of the virtual reality and mixed reality worlds, that is […]
People worldwide are discovering the convenience of having the power of the internet within reach and smartwatches and all kinds of activity trackers have become very popular. These wearable technologies can be used to control your Internet of Things (IoT) devices, such as air conditioning systems, healthcare appliances, surveillance cameras, refrigerators, and a great deal […]
Me and IoT I finally started my long journey into the world of Web of Things. I have been interested to the topic in the past, but unfortunately this technology still needs some time to get traction from the industry, and from a user standpoint this is the main reason to stay away from the […]
Standards development can take time. But depending on the standardization process, there are several potential components that can contribute to the quality and trustworthiness of a security standard, including: a transparent process, different stakeholders, domain competence, a critical mass of security experts, iterations of reviews, implementation feedback, formal verifications, and an open forum for discussion. […]
As part of the research committed in SIFIS Home, we explore the possibility to approach MUD from the opposite direction. As an example, let’s consider a situation where we have an IoT device at hand which does not support MUD.
In order for Internet of Things to function better and more securely, safety, reliability and fault tolerance must be given higher priority already at the design stage.
IFIS-Home Security Architecture, perform system tests, and verify the security not only of each component, but also interoperability, performance as well as the overall vulnerability to threats. Finally, WP5 targets to get the technology validated in an industry relevant scenario.
The first step in our journey to build reliable code starts with the developers and their tools and practices. If you want to provide something trustworthy you have to know yourself, your strengths, and your weakness.
Privacy invasion is bad, but actual home invasion is even worse. Criminals can easily figure out when the house is empty if they have access to the smart meter readings and plan according to that data.