Greetings from IoT Solutions World Congress & Cyber Security Congress in Barcelona! Our Dissemination, Standardization and Exploitation leader Tuuli Lindroos (F-Secure) visited Barcelona and here comes her thought directly after she landed back home in Helsinki.
People worldwide are discovering the convenience of having the power of the internet within reach and smartwatches and all kinds of activity trackers have become very popular. These wearable technologies can be used to control your Internet of Things (IoT) devices, such as air conditioning systems, healthcare appliances, surveillance cameras, refrigerators, and a great deal […]
Me and IoT I finally started my long journey into the world of Web of Things. I have been interested to the topic in the past, but unfortunately this technology still needs some time to get traction from the industry, and from a user standpoint this is the main reason to stay away from the […]
The first physical plenary meeting of the SIFIS-Home project consortium took place last week as finally the partners were able to meet in beautiful Turin, Italy. Partners who were not able to join physically, joined the plenary meeting virtually. The main agenda of the consortium meeting was to prepare for the mid-term review taking place […]
Standards development can take time. But depending on the standardization process, there are several potential components that can contribute to the quality and trustworthiness of a security standard, including: a transparent process, different stakeholders, domain competence, a critical mass of security experts, iterations of reviews, implementation feedback, formal verifications, and an open forum for discussion. […]
As part of the research committed in SIFIS Home, we explore the possibility to approach MUD from the opposite direction. As an example, let’s consider a situation where we have an IoT device at hand which does not support MUD.
In order for Internet of Things to function better and more securely, safety, reliability and fault tolerance must be given higher priority already at the design stage.
IFIS-Home Security Architecture, perform system tests, and verify the security not only of each component, but also interoperability, performance as well as the overall vulnerability to threats. Finally, WP5 targets to get the technology validated in an industry relevant scenario.
The first step in our journey to build reliable code starts with the developers and their tools and practices. If you want to provide something trustworthy you have to know yourself, your strengths, and your weakness.
The workshop workshop is organized by the CSEC lab at University of Genova. It will take place online on Google Meet. The event is completely free for the participants.