WP1: Use Cases – Analysis and Requirements
The objectives of the WP are twofold: identification of the use cases in more
detail with the corresponding analysis of the requirements for the security and privacy
aspects; and engagement of the end users that will help in a co-creation process to monitor
and guide the overall piloting process.
Two main use-cases are envisaged:
- Cooperative Intelligent Transport Systems (both V2V and V2I), where requirements for
performance, dynamicity of the context and scalability are quite important. Safety aspects
can be relevant.
- IoT Smart City scenario where the protection of shared data and privacy rights of the user
are relevant and the concept of empowering the user can be proposed. Requirements for
dynamic change of the context (Smart Home, Smart Office, Industry 4.0) can also be
envisaged, considering one subcase with more constrained devices and another where
performance requirements are not so crucial.
WP2: Cryptographic protocols
This work package is concerned with the design and implementation of new
cryptographic algorithms that meet the requirements elicited by WP1 and their refinements
due to the experimental results from WP4. This includes the definition of security models for
the selected use case scenarios and proving that the newly invented algorithms meet them.
It further includes the implementation and optimization of the algorithms on the target
hardware to ensure that all practical requirements are indeed met and that the
implementation can be evaluated properly. The implementation and design of the algorithms
will be made in close connection to ensure optimal results.
The work package draws on the extensive expertise by the partners on addressing similar
tasks in the past, in particular the design of IBM identity mixer, group signatures, attribute-
based encryption, and direct anonymous attestation (for TPMs), and on their skills for fast
implementation.
WP3: Architecture, Platform & Policies
The work package defines an architecture empowering citizen centric
solutions for exploiting IoT privacy and security. Specifically, it is intended to perform a
systematic analysis and its technical implications to design an appropriate architecture that
will support identified use cases while leveraging the existing IoT architectures to the furthest
extent possible. Finally, it is focused on the definition and implementation of a policy based
framework for attribute-based authentication and encryption mechanisms for the identified
use cases taking in consideration results from projects, such as ABC4Trust, FutureID,
Sociotal, Smartie, iCore, and others.