People worldwide are discovering the convenience of having the power of the internet within reach and smartwatches and all kinds of activity trackers have become very popular. These wearable technologies can be used to control your Internet of Things (IoT) devices, such as air conditioning systems, healthcare appliances, surveillance cameras, refrigerators, and a great deal […]
Standards development can take time. But depending on the standardization process, there are several potential components that can contribute to the quality and trustworthiness of a security standard, including: a transparent process, different stakeholders, domain competence, a critical mass of security experts, iterations of reviews, implementation feedback, formal verifications, and an open forum for discussion. […]
IFIS-Home Security Architecture, perform system tests, and verify the security not only of each component, but also interoperability, performance as well as the overall vulnerability to threats. Finally, WP5 targets to get the technology validated in an industry relevant scenario.
The first step in our journey to build reliable code starts with the developers and their tools and practices. If you want to provide something trustworthy you have to know yourself, your strengths, and your weakness.
Privacy invasion is bad, but actual home invasion is even worse. Criminals can easily figure out when the house is empty if they have access to the smart meter readings and plan according to that data.