Difference between revisions of "IoTSec:WP3"

From its-wiki.no

Jump to: navigation, search
(T3.2.3 - Impact assessment)
(T3.2.1 - The IoTSec eco system)
Line 30: Line 30:
 
=== T3.2.1 - The IoTSec eco system ===
 
=== T3.2.1 - The IoTSec eco system ===
 
The objective of this subtask is to provide a common world view to ensure that those that do the research work produce results that are relevant, interesting and important to the industrial partners, and that the research partners have clearly defined ‘interfaces’ – i.e. cases and scenarios.  By ensuring that the project have a commonly understood world view of interest, we establish a solid foundation for the integration of project results.  
 
The objective of this subtask is to provide a common world view to ensure that those that do the research work produce results that are relevant, interesting and important to the industrial partners, and that the research partners have clearly defined ‘interfaces’ – i.e. cases and scenarios.  By ensuring that the project have a commonly understood world view of interest, we establish a solid foundation for the integration of project results.  
Results:  A clearly defined scope of the project in terms of stakeholders, their interests, technological components and their functionality and interconnection.  Also, a clarification of what is considered to be outside the system boundary.
+
*Results:  A clearly defined scope of the project in terms of stakeholders, their interests, technological components and their functionality and interconnection.  Also, a clarification of what is considered to be outside the system boundary.
Partners: HIG, NCE, + everybody?
+
*Partners: HIG, NCE, + everybody?
Deliverables: Technical report
+
*Deliverables: Technical report
  
 
=== T3.2.2 - Conflicting Incentives Risk Analysis for IoT ===
 
=== T3.2.2 - Conflicting Incentives Risk Analysis for IoT ===

Revision as of 14:39, 10 August 2015

Security in IoT for Smart Grids
Home Research Security Centre Publications Student corner About
English-Language-icon.png

WP3 - System versus Goal Analysis

Deliverables in IoTSec:WP3

 TitleDue monthLead partnerDissemination level
D3.1.1Multi-metrics analysis of applications on the smart-grid infrastructure (draft)M12ITSPublic
D3.1.2Application analysis on the smart-grid infrastructure (draft)M24MovationPublic
D3.2.1Psychological Profiling for Risk Analysis (draft)M24NTNUPublic
D3.2.2Incentives and Usability for IoT Security (intermediate)M36NTNUPublic

Partners in IoTSec:WP3


Tasks in IoTSec:WP3

Task 3.2 comprises the following subtasks:

  • T3.2.1 - The IoTSec eco system (IoTSec PhD NN1 + HIG researcher)
  • T3.2.2 - Conflicting Incentives Risk Analysis for IoT (IoTSec PhD NN1)
  • T3.2.3 - Impact assessment (IoTSec PostDoc NN1)


T3.2.1 - The IoTSec eco system

The objective of this subtask is to provide a common world view to ensure that those that do the research work produce results that are relevant, interesting and important to the industrial partners, and that the research partners have clearly defined ‘interfaces’ – i.e. cases and scenarios. By ensuring that the project have a commonly understood world view of interest, we establish a solid foundation for the integration of project results.

  • Results: A clearly defined scope of the project in terms of stakeholders, their interests, technological components and their functionality and interconnection. Also, a clarification of what is considered to be outside the system boundary.
  • Partners: HIG, NCE, + everybody?
  • Deliverables: Technical report

T3.2.2 - Conflicting Incentives Risk Analysis for IoT

Risk management of the interface between humans and technology in an IoT setting follows the CIRA privacy risk analysis from the PETweb II project (http://petweb2.projects.nislab.no) to the design of risk-based adaptive security and privacy. Process: Each scenario x (0 < x < 6) is addressed through the following list of subtasks: T3.2.1.x.1 Identification and analysis of privacy, cyber, information security risks for scenarios identified in T3.4. T.3.2.1.x.2 Mechanisms to modify the perceived incentive structures such as to align stakeholder interests will be developed and analysed. This task will develop a library of utility factors suitable for an IoT setting involving critical infrastructure. Furthermore, we will T3.2.1.x.3 Identify and construct stakeholder archetypes and strategy taxonomies matching the smart grid operator requirements. Results: 1. A platform for cost effective risk analysis platform based on CIRA/PETweb II results, suitable for IoT critical infrastructure projects. 2. Risk analysis of the system to be used by the infrastructure operators in their decision making. Partners: HIG Deliverables: One conference article for each of the key scenarios identified in task T.3.4. One journal article.

T3.2.3 - Impact assessment

Identification and analysis of issues that influence the impact of project results, including 1. An analysis and mapping of economic (commercial, technological, social and regulatory) incentives to invest in security controls that improve the data integrity, privacy, and service resilience in IoT for smart grids. 2. A cost-benefit analysis of smart grid technologies with respect to service resilience, security data integrity and privacy. A valuation of economic value of security measures with respect to data security and privacy at macro and micro levels. 3. An assessment of existing financial instruments and development of novel financial instruments to incentivize investments in security in IoT for smart grids and to distribute the risk among the stakeholders.

Results: A projection of the impact of technological project results, and how this impact can be achieved. Partners: HIG, NCE Deliverables: 3 technical reports, 3 conference articles, Exploitation plan