IFIS-Home Security Architecture, perform system tests, and verify the security not only of each component, but also interoperability, performance as well as the overall vulnerability to threats. Finally, WP5 targets to get the technology validated in an industry relevant scenario.
The first step in our journey to build reliable code starts with the developers and their tools and practices. If you want to provide something trustworthy you have to know yourself, your strengths, and your weakness.
Privacy invasion is bad, but actual home invasion is even worse. Criminals can easily figure out when the house is empty if they have access to the smart meter readings and plan according to that data.
Since the start of the industrial revolution, systems and solutions developed in different technical areas quickly became more and more complex and composite. It did not take long for engineers as well as industrial and commercial players to agree on the importance of having shared guidelines to follow during the design process. This has become even clearer and widely accepted throughout the following decades all the way up to our modern era that features pervasive information technology and the Internet of Things.
Ratatosk is a red squirrel that runs up and down the tree to quickly bring information from Mimer, the dwell of wisdom connected through the roots, to the Gods sitting in the crown of Yggdrasil and back; the same purpose as that of the context broker inYggio 3-to carry messages between connected IoT devices and applications while handling any type of context information.
Reading these words, we already feel in the house of the future. Knowing that we can now implement this “house of the future” with a relatively low cost, should make us feel that we can all have a real smart home.