WP1: Use Cases – Analysis and Requirements

The objectives of the WP are twofold: identification of the use cases in more detail with the corresponding analysis of the requirements for the security and privacy aspects; and engagement of the end users that will help in a co-creation process to monitor and guide the overall piloting process.

Two main use-cases are envisaged:

  1. Cooperative Intelligent Transport Systems (both V2V and V2I), where requirements for performance, dynamicity of the context and scalability are quite important. Safety aspects can be relevant.
  2. IoT Smart City scenario where the protection of shared data and privacy rights of the user are relevant and the concept of empowering the user can be proposed. Requirements for dynamic change of the context (Smart Home, Smart Office, Industry 4.0) can also be envisaged, considering one subcase with more constrained devices and another where performance requirements are not so crucial.

WP2: Cryptographic protocols

This work package is concerned with the design and implementation of new cryptographic algorithms that meet the requirements elicited by WP1 and their refinements due to the experimental results from WP4. This includes the definition of security models for the selected use case scenarios and proving that the newly invented algorithms meet them. It further includes the implementation and optimization of the algorithms on the target hardware to ensure that all practical requirements are indeed met and that the implementation can be evaluated properly. The implementation and design of the algorithms will be made in close connection to ensure optimal results.

The work package draws on the extensive expertise by the partners on addressing similar tasks in the past, in particular the design of IBM identity mixer, group signatures, attribute- based encryption, and direct anonymous attestation (for TPMs), and on their skills for fast implementation.

WP3: Architecture, Platform & Policies

The work package defines an architecture empowering citizen centric solutions for exploiting IoT privacy and security. Specifically, it is intended to perform a systematic analysis and its technical implications to design an appropriate architecture that will support identified use cases while leveraging the existing IoT architectures to the furthest extent possible. Finally, it is focused on the definition and implementation of a policy based framework for attribute-based authentication and encryption mechanisms for the identified use cases taking in consideration results from projects, such as ABC4Trust, FutureID, Sociotal, Smartie, iCore, and others.