IOTAC | SECURITY BY DESIGN IOT DEVELOPMENT AND CERTIFICATE FRAMEWORK WITH FRONT-END ACCESS CONTROL

Summary
IoTAC project aims to deliver a novel, secure and privacy-friendly IoT architecture that will facilitate the development and operation of more resilient IoT service environments through (i) monitoring and evaluation of applications security throughout the broader software development lifecycle; (ii) the introduction of an advanced access control mechanism based on new interactions and workflow using chip card and PKI technology; (iii) the runtime monitoring of the system as well as provisioning of security countermeasures that are implemented both at hardware- and at software-level and (iv) associated platforms which will provide security certification of the produced applications and system, based on international security standards, best practices and the research results of the project. The results will be demonstrated (TRL5) with four IoT use case implementations. The consortium comprises all stakeholders of the IoT ecosystem, service operators, OEMs, technology providers, developers, security experts, as well as research and academic partners. The end users will be involved by using a living lab environment. Objectives of the project will be fostered by a strong dissemination and communication program also comprising standardisation and community building, supporting the commercial and scientific exploitation of the results.
Unfold all
/
Fold all
More information & hyperlinks
Web resources: https://cordis.europa.eu/project/id/952684
Start date: 01-09-2020
End date: 31-08-2023
Total budget - Public funding: 4 999 995,00 Euro - 4 999 995,00 Euro
Cordis data

Original description

IoTAC project aims to deliver a novel, secure and privacy-friendly IoT architecture that will facilitate the development and operation of more resilient IoT service environments through (i) monitoring and evaluation of applications security throughout the broader software development lifecycle; (ii) the introduction of an advanced access control mechanism based on new interactions and workflow using chip card and PKI technology; (iii) the runtime monitoring of the system as well as provisioning of security countermeasures that are implemented both at hardware- and at software-level and (iv) associated platforms which will provide security certification of the produced applications and system, based on international security standards, best practices and the research results of the project. The results will be demonstrated (TRL5) with four IoT use case implementations. The consortium comprises all stakeholders of the IoT ecosystem, service operators, OEMs, technology providers, developers, security experts, as well as research and academic partners. The end users will be involved by using a living lab environment. Objectives of the project will be fostered by a strong dissemination and communication program also comprising standardisation and community building, supporting the commercial and scientific exploitation of the results.

Status

CLOSED

Call topic

SU-ICT-02-2020

Update Date

26-10-2022
Images
No images available.
Geographical location(s)