SPITE hands-on seminars

About image

Security & Privacy in IoT Environments

The SPITE-project aims at finding appropriate solutions for realizing secure, complex and maintainable applications an Internet-of-Things (IoT) setting. The tools and mechanisms developed in this project will allow for novel authentication and authorization protocols, increased maintainability of complex IoT applications, and to facilitate the integration of context-aware access control schemes.

The SPITE projects is organizing two hands-on seminars, offering the possibility to get practical experience with two middleware frameworks developed in the project.

Hands-on Seminars

Context-Aware Access Control With IoTSEAR

IoTSEAR is a middleware for context-aware access control in IoT environments. Contextual data (e.g. time, location, current activity, …) can improve the accuracy and usability of access control systems, as authentication and authorization requirements can be precisely specified. However, certain security requirements need to be enforced to use such data in access control decision processes. In short, the data must be authentic, recent, and unforgeable. The middleware handles the collection, processing and verification of the context information. The access rules, i.e., the rules that specify who is allowed to do what under which circumstances are specified in policies. IoTSEAR supports the PACCo policy language, which can be used to express contextual access conditions as well as the security requirements for the used context data. This way, the system can guarantee a specific level of trustworthiness regarding the used context data. Finally, these security requirements can be tailored to the accompanying risk of the action, i.e. critical actions can require strong guarantees, while these guarantees can be relaxed for standard actions.

For example, a Location context gathered on, and signed by an employee’s smartphone might be suitable to consider when deciding whether the employee can enter the office building (in combination with an authentication proof, such as an RFID badge). Furthermore, to access a confidential document, a Bluetooth beacon can provide proximity context showing that the employee is in a particular room. In addition, it can be mandated that this context is confirmed by the employee’s superior (requiring the superior to be in the same room).

Seminar content

Technical background information

  • Introduction to context-aware access control
  • Concepts behind the IoTSEAR middleware

IoTSEAR middleware

  • Integrate the IoTSEAR middleware in an application
  • Use context-aware policies to secure critical actions
  • Test different policy configurations in a demo environment
iotsear image
iotsear image

Application centric development of a smart home application

SMIoT proposes a paradigm shift from sensor-centric towards application-centric IoT ecosystem design. The SMIoT architecture facilitates the latter, and supports the development of complex and maintainable IoT applications. The architectural guidance allows for dynamic and reconfigurable IoT sensor and actuator integration, and hides low-level implementation details towards application developers. Hence, the latter can focus on business logic without being expert in IoT sensor technology. The proposed architecture is especially useful for software companies focusing on complex IoT applications in a specific domain or sector. A typical example is a software integrator focusing on innovative health environments, or a company building extensible software ecosystems for fleet management. With complex, we mean that the IoT ecosystems can consist of various IoT applications used by different stakeholders in the domain. For instance, in a care environment, applications can be developed for caregivers, elderly people, family, doctors, nurses, government, insurance... Each stakeholder has a partial view on the overall IoT ecosystem. The software may evolve over time, and its lifetime is typically much longer than the lifetime of the sensor technologies that are plugged in.

This seminar gives an introduction of the SMIoT- middleware. During this session, the participant will create a smart home application in Android. A BLE (Bluetooth Low Energy) humidity and temperature sensor will be integrated. The participant will be provided with a library that contains the SMIOT framework and implementations for the devices used in this seminar. Hence, knowledge of the communication technology is not necessary as these complexities are transparent for the application developers. This seminar shows that applying the design strategies of the SMIoT framework allows for quick prototyping and development of IoT applications. Furthermore, it also demonstrates its great capability for code reusability, as many different applications can be built with the same library provided in the tutorial.

Seminar content

Technical background information

  • Introduction to IoT ecosystem architectures
  • IoT application requirements

SMIoT middleware

  • Middleware architecture and benefits
  • Smart Home Application development using SMIoT

Registration

The seminars and IAB meeting will take place on Thursday February 24th at the KU Leuven department of computer science.

Registration to one or both of the seminars is open to anyone and free. However, the number of seats is limited. Seats will be assigned in the order of registration.

You have the option to attend one or both seminars. In addition, lunch can be provided for you between 12:00-13:00. Please take care to select the lunch add-on during registration.

https://www.eventbrite.co.uk/e/spite-hands-on-seminars-tickets-224550595877