IoTSec:T2.1

= Detailed objectives= In this task, we will build privacy-preserving yet accountable authentication framework among the key entities in a distributed manner without relying on a trusted their party. We will also design and build privacy designs for metering and control of grid-connected devices and protocols with privacy design patterns. In addition, ww will carry out risk analysis, privacy impact analysis, and deploy user-centric privacy technology. This will
 * establish secure communication among the customers and the service providers, and also key players
 * protect end users private information. Here, end users can be residential users, electric vehicle drivers, and business users in large office.
 * efficiently handle communication failures while ensuring privacy
 * build secure processes for business model, security model, and requirements

= Expected Results = The task expects to deliver
 * has result::construction of privacy by Design patterns for IoT applications and the deployment of user-centric privacy technology (M12)
 * has result:: processes integrating technology, business model, security model and privacy reqyirements (M24)
 * has result::cooperation and competition framework among different players in the smart grid (M12)
 * Trust scheme based privacy and security solutions for the smart grid (M36)
 * 4 conference papers (M6-M36) and 3 journal papers (1 paper per year)

For the a more detailed approach, see IoTAdmin:T2.1