IoTSec:T2.1

From its-wiki.no

Revision as of 14:18, 17 August 2015 by Josef.Noll (Talk | contribs)

Jump to: navigation, search
Security in IoT for Smart Grids
Home Research Security Centre Publications Student corner About
English-Language-icon.png

T2.1 Privacy-aware models

Task Title Development of privacy-aware models and measures
WP IoTSec:WP2
Lead partner Simula
Leader
Contributors UNIK, NR, NCE Smart, Simula
edit this task

Objective

This task will establish privacy-aware models and related measures of privacy

Category:Task


Deliverables in T2.1 Privacy-aware models

 TitleDue monthLead partnerEditorDissemination level
D2.1.1Technical Report - Privacy Awareness (draft)M12NRHabtamu AbieRestricted
D2.1.2Privacy-preservation frameworkM12SIMULAYan ZhangPublic
D2.1.3Technical Report - Privacy Awareness (final)M24NRHabtamu AbiePublic
D2.1.4Privacy-preservation yet accountable frameworkM36SIMULAYan ZhangPublic

Add Deliverable

Contributions

Yosh: Two challenges:

  • To establish secure communication among the customers and the service providers
  • To build privacy preserving yet accountable authentication framework among the entities in a distributed manner without relying on a trusted third party

Approaches

  • Utilize competition between the service providers to build a reputation scheme and enforce cooperation among the providers to attract a larger number of consumers
  • Study competition and cooperation between the service providers
  • Develop analytical modeling focusing on the security and privacy issues in the smart grid, exploiting both cooperative and competitive frameworks.

Subtasks

T2.1.1 Research (xx pm), 1 year Post Doc

Analyse and specify how to design and build privacy designs for metering and control of grid-connected devices and protocols with privacy design patterns; how to carry out risk analysis, privacy impact analysis, and how to deploy user-centric privacy technology.

Deliverables

  • D1.1 and D2.1: The outcome will be construction of privacy by Design patterns for IoT applications and will be contributions to D1.1 and D2.1 as technical reports and 1 conference paper.
T2.1.2 Research (xx pm),

Analyse and specify security technology task-technology-fit which deals with the alignment of technology, business model, security model, and privacy requirements into processes such that they overlap sufficiently with business model and the economic constraints.

Deliverables

  • D3.1 and D4.1: The outcome will be contributions to D3.1 and D4.1 as technical reports and 3 conference paper.