IDEE-FEDER project planning: Difference between revisions

From UNamur InfoSec
Jump to navigation Jump to search
No edit summary
No edit summary
Line 25: Line 25:
**State of the arts of IoTs: risks and security assessment: IoTs system allows different devices (things) to be connected through different communication medias (e.g.Internet, wifi, etc.). This opens an opportunity of larger attack. Thus, Identifying the risk and finding the solution to address such risk is important.
**State of the arts of IoTs: risks and security assessment: IoTs system allows different devices (things) to be connected through different communication medias (e.g.Internet, wifi, etc.). This opens an opportunity of larger attack. Thus, Identifying the risk and finding the solution to address such risk is important.
** State of the arts of access control in IoTs: In any data processing system, ensuring the access is granted to right person is important in order to provide the trusting environment for people involved. Study the existing access control model for IoT system is important in order to identify the strength and weakness of the model.  
** State of the arts of access control in IoTs: In any data processing system, ensuring the access is granted to right person is important in order to provide the trusting environment for people involved. Study the existing access control model for IoT system is important in order to identify the strength and weakness of the model.  
**
** Network Technologies and micro-controller studies: Things in IoTs are devices controlled by the micro-controller, which are able to connect to network (Internet) and operate according to the user's command or in the automatic way. There are number of brands producing different type of micro-controllers that can be used in IoTs context. Study their specifications provide us some insides based on which we can choose the devices based on our requirement. We investigated two network technologies: WiFi and Lora network. For micro-controllers, we studied ESP8266 and LoPy of Pycom.
*From January 2017 to April 2017
*From January 2017 to April 2017
*From April 2017 to July 2017
*From April 2017 to July 2017

Revision as of 16:42, 22 March 2017


IDEE-FEDER Project: task T1.3.4 description

The objective of task (T1.3.4) is to define the access control model, which can be used to express the access control policies in the wide range of access scenarios in IoTs system infrastructure. The works included:

  • Modelling an IoT infrastructure and defining the requirements needed for the development and deployment of such infrastructure.
  • Defining the access scenarios in IoT for different domains such as, smart home and healthcare system, then, the IoT system architecture taking into account the defined scenarios and requirements
  • Based on the defined IoT infrastructure and defined scenarios, define the access control requirements based upon which access control model is derived.
  • Developing the access control system, based on the defined model, which can be used to express the access control policies in IoT system with the defined access scenarios and requirements.
  • Developing the IoT system based on the define IoT architecture. The development of access control module is also included in this task.
  • Integrating/incorporating access control module to IoT system.
  • Testing and validating the IoT system against the identified requirements and scenarios.
  • Meeting and scientific dissemination:
    • Project follow-up meeting
    • Project report and result dissemination
    • Meeting with project partners and scientific communities.
    • Participating the scientific conferences and seminars

Project Planning

The project is for 2 years periods started from first of October 2016 to 30th September 2018. The entire project is broken down into small tasks as shown in the figure below. Project planning copy.png

  • From October 2016 to January 2017: This phase focuses on building up the knowledge in the field of IoTs and most importantly the security issues in such system. We studies different areas under the IoT context.
    • Existing IoTs infrastructure studies: The idea is to look at different existing IoT system across domain from infrastructure/building to smart home and healthcare system. Different sources of information are considered both in research communities and private sectors.
    • State of the arts of IoTs: risks and security assessment: IoTs system allows different devices (things) to be connected through different communication medias (e.g.Internet, wifi, etc.). This opens an opportunity of larger attack. Thus, Identifying the risk and finding the solution to address such risk is important.
    • State of the arts of access control in IoTs: In any data processing system, ensuring the access is granted to right person is important in order to provide the trusting environment for people involved. Study the existing access control model for IoT system is important in order to identify the strength and weakness of the model.
    • Network Technologies and micro-controller studies: Things in IoTs are devices controlled by the micro-controller, which are able to connect to network (Internet) and operate according to the user's command or in the automatic way. There are number of brands producing different type of micro-controllers that can be used in IoTs context. Study their specifications provide us some insides based on which we can choose the devices based on our requirement. We investigated two network technologies: WiFi and Lora network. For micro-controllers, we studied ESP8266 and LoPy of Pycom.
  • From January 2017 to April 2017
  • From April 2017 to July 2017
  • From July 2017 to September 2017
  • From September 2017 to December 2017
  • From December 2017 to March 2018
  • From March 2018 to to June 2018
  • From June 2018 to 30th September 2018