Summary
Follow
By following projects, you will receive weekly digest mails (on Friday) that provide an
overview of the tweets and news posted on this portal of the followed projects.
IoTAC project aims to deliver a novel, secure and privacy-friendly IoT architecture that will facilitate the development and operation of more resilient IoT service environments through (i) monitoring and evaluation of applications security throughout the broader software development lifecycle; (ii) the introduction of an advanced access control mechanism based on new interactions and workflow using chip card and PKI technology; (iii) the runtime monitoring of the system as well as provisioning of security countermeasures that are implemented both at hardware- and at software-level and (iv) associated platforms which will provide security certification of the produced applications and system, based on international security standards, best practices and the research results of the project. The results will be demonstrated (TRL5) with four IoT use case implementations. The consortium comprises all stakeholders of the IoT ecosystem, service operators, OEMs, technology providers, developers, security experts, as well as research and academic partners. The end users will be involved by using a living lab environment. Objectives of the project will be fostered by a strong dissemination and communication program also comprising standardisation and community building, supporting the commercial and scientific exploitation of the results.
Unfold all
/
Fold all
More information & hyperlinks
Web resources: | https://cordis.europa.eu/project/id/952684 |
Start date: | 01-09-2020 |
End date: | 31-08-2023 |
Total budget - Public funding: | 4 999 995,00 Euro - 4 999 995,00 Euro |
Cordis data
Original description
IoTAC project aims to deliver a novel, secure and privacy-friendly IoT architecture that will facilitate the development and operation of more resilient IoT service environments through (i) monitoring and evaluation of applications security throughout the broader software development lifecycle; (ii) the introduction of an advanced access control mechanism based on new interactions and workflow using chip card and PKI technology; (iii) the runtime monitoring of the system as well as provisioning of security countermeasures that are implemented both at hardware- and at software-level and (iv) associated platforms which will provide security certification of the produced applications and system, based on international security standards, best practices and the research results of the project. The results will be demonstrated (TRL5) with four IoT use case implementations. The consortium comprises all stakeholders of the IoT ecosystem, service operators, OEMs, technology providers, developers, security experts, as well as research and academic partners. The end users will be involved by using a living lab environment. Objectives of the project will be fostered by a strong dissemination and communication program also comprising standardisation and community building, supporting the commercial and scientific exploitation of the results.Status
CLOSEDCall topic
SU-ICT-02-2020Update Date
26-10-2022
Images
No images available.
Geographical location(s)