IoTSec:Phone 2019/09/11


Revision as of 10:59, 11 September 2019 by Cristian (Talk | contribs)

Jump to: navigation, search
Security in IoT for Smart Grids
Home Research Security Centre Publications Student corner About
Title IoTSec:Phone Meeting September2019
Phone number, info +47 21933751 725-796-213
Date, time, Duration 2019/09/11, 13:00, 60 min
Organizer Christian Johansen
Participants Christian Johansen

this page was created by Special:FormEdit/Phone_IoTSec, and can be edited by Special:FormEdit/Phone_IoTSec/IoTSec:Phone 2019/09/11

Call Info

or phone Norway: +47 21 93 37 51 Access Code: 725-796-213

More phone numbers FI: +358 923 17 0568 DE: +49 692 5736 7317 IT: +39 0 247 92 13 01 NL: +31 202 251 017 ES: +34 932 75 2004 SE: +46 853 527 827

Help on joining can be taken from IoTSec:Meetings#Help_for_using_GoToMeeting_conference_tool


  • Status from each partner (at least from PhD students including update on time-line)
  • Planning the October meeting
    • Theme, Agenda, Responsibles, Administrative aspects
  • Events organized by Partners (please add on the wiki) !
  • AOB


Minutes of the meeting IoTAdmin:20190911PhoneMeeting_Notes

short notes

  • What are the Main Takeaways from IoTSec ?
  • What are the Major achievements?

Maybe discuss in October meeting





eSmart Systems (Manish )

  • I


  • A journal paper (An Evolutionary Game for Confidentiality Attacks and Defences for Advanced Metering Infrastructure) has been submitted to Open Access MDPI journal (Games), and is under review.
  • Adaptive data collection framework for real-time security analytics, Lightweight machine learning algorithms are identified, installed and tried, training and testing learning underway.
  • Written the paper "Non-interactive privacy-preserving AMS with rekeying-free key management". It addresses two efficiency problems: 1) A problem with most AMS privacy protocols is that they are interactive, meaning that each meter needs to communicate with a group of other meters instead of only directly with the concentrator/head-end system, which causes high overhead. 2) In such protocols, group membership changes requires full rekeying. We propose a rekeying-free scheme, which reduces the overhead. Methods proposed in the mentioned paper have been implemented in C.
  • Two Workshops organized, (i) DeMessa 2019 (The International Workshop on Designing and Measuring CyberSecurity in Software Architecture - ) in Paris, France, and (ii) FINSEC'19 (1st International Workshop on Security for Critical Financial Infrastructures and Services) co-located with ESORICS'19 (, Luxembourg
  • Presentation "Evaluering av smartmålersikkerhet" by Sigurd Eskeland and Åsmund Skomedal at the sikkerhetsfestivalen 2019, Lillehammer,
  • Kick off meeting for IKTPluss HealthDemocratization project where two IoTSec partners (NTNU & NR) are involved
  • Submitted a H2020 Proposal on Cybersecurity for Healthcare 4.0 Ecosystems where two IoTSec partners (NTNU & NR) are involved

other discussion

Latest closed Action Items