PIVOT: Privacy-Integrated design and Validation in the constrained IoT
Funding
- German Federal Ministry of Education and Research (BMBF)
- Agence nationale de la recherche (ANR)
Partners
- HAW Hamburg
- Lobaro GmbH, Hamburg
- INSA de Lyon, Villeurbanne (partner in France)
- Association Française pour le Nommage Internet en Coopération (Afnic), Montigny-le-Bretonneux (partner in France)
PIVOT: Privacy-Integrated design and Validation in the constrained IoT
In PIVOT, we start from two fundamental observations. First, a privacy-friendly IoT requires to protect content objects by themselves, in addition to commonly deployed channel encryption. Content disclosure can thus be attributed to designated receivers. Second, names can serve as the principle interface to access IoT data, eliding source identities. Hence, individual end point identifiers will disappear from public Internet metadata.
The innovation in PIVOT is to address the prevalent privacy and security issues in IoT by proposing content object security principles that build on privacy-friendly names, while remaining globally and seamlessly interoperable between IoT devices regardless of networks to which they may connect.