People worldwide are discovering the convenience of having the power of the internet within reach and smartwatches and all kinds of activity trackers have become very popular. These wearable technologies can be used to control your Internet of Things (IoT) devices, such as air conditioning systems, healthcare appliances, surveillance cameras, refrigerators, and a great deal […]
Me and IoT I finally started my long journey into the world of Web of Things. I have been interested to the topic in the past, but unfortunately this technology still needs some time to get traction from the industry, and from a user standpoint this is the main reason to stay away from the […]
The first physical plenary meeting of the SIFIS-Home project consortium took place last week as finally the partners were able to meet in beautiful Turin, Italy. Partners who were not able to join physically, joined the plenary meeting virtually. The main agenda of the consortium meeting was to prepare for the mid-term review taking place […]
Standards development can take time. But depending on the standardization process, there are several potential components that can contribute to the quality and trustworthiness of a security standard, including: a transparent process, different stakeholders, domain competence, a critical mass of security experts, iterations of reviews, implementation feedback, formal verifications, and an open forum for discussion. […]
As part of the research committed in SIFIS Home, we explore the possibility to approach MUD from the opposite direction. As an example, let’s consider a situation where we have an IoT device at hand which does not support MUD.
In order for Internet of Things to function better and more securely, safety, reliability and fault tolerance must be given higher priority already at the design stage.
IFIS-Home Security Architecture, perform system tests, and verify the security not only of each component, but also interoperability, performance as well as the overall vulnerability to threats. Finally, WP5 targets to get the technology validated in an industry relevant scenario.
The first step in our journey to build reliable code starts with the developers and their tools and practices. If you want to provide something trustworthy you have to know yourself, your strengths, and your weakness.
The workshop workshop is organized by the CSEC lab at University of Genova. It will take place online on Google Meet. The event is completely free for the participants.
Ratatosk is a red squirrel that runs up and down the tree to quickly bring information from Mimer, the dwell of wisdom connected through the roots, to the Gods sitting in the crown of Yggdrasil and back; the same purpose as that of the context broker inYggio 3-to carry messages between connected IoT devices and applications while handling any type of context information.