People worldwide are discovering the convenience of having the power of the internet within reach and smartwatches and all kinds of activity trackers have become very popular. These wearable technologies can be used to control your Internet of Things (IoT) devices, such as air conditioning systems, healthcare appliances, surveillance cameras, refrigerators, and a great deal […]
Me and IoT I finally started my long journey into the world of Web of Things. I have been interested to the topic in the past, but unfortunately this technology still needs some time to get traction from the industry, and from a user standpoint this is the main reason to stay away from the […]
Standards development can take time. But depending on the standardization process, there are several potential components that can contribute to the quality and trustworthiness of a security standard, including: a transparent process, different stakeholders, domain competence, a critical mass of security experts, iterations of reviews, implementation feedback, formal verifications, and an open forum for discussion. […]
As part of the research committed in SIFIS Home, we explore the possibility to approach MUD from the opposite direction. As an example, let’s consider a situation where we have an IoT device at hand which does not support MUD.
In order for Internet of Things to function better and more securely, safety, reliability and fault tolerance must be given higher priority already at the design stage.
IFIS-Home Security Architecture, perform system tests, and verify the security not only of each component, but also interoperability, performance as well as the overall vulnerability to threats. Finally, WP5 targets to get the technology validated in an industry relevant scenario.
The first step in our journey to build reliable code starts with the developers and their tools and practices. If you want to provide something trustworthy you have to know yourself, your strengths, and your weakness.
Privacy invasion is bad, but actual home invasion is even worse. Criminals can easily figure out when the house is empty if they have access to the smart meter readings and plan according to that data.
Since the start of the industrial revolution, systems and solutions developed in different technical areas quickly became more and more complex and composite. It did not take long for engineers as well as industrial and commercial players to agree on the importance of having shared guidelines to follow during the design process. This has become even clearer and widely accepted throughout the following decades all the way up to our modern era that features pervasive information technology and the Internet of Things.
Ratatosk is a red squirrel that runs up and down the tree to quickly bring information from Mimer, the dwell of wisdom connected through the roots, to the Gods sitting in the crown of Yggdrasil and back; the same purpose as that of the context broker inYggio 3-to carry messages between connected IoT devices and applications while handling any type of context information.