From pSHIELD Wiki
Jump to: navigation, search

pSHIELD Dissemination

pSHIELD has dissemination activities towards the following main areas:

  • Targeted Industrial Dissemination
  • Scientific dissemination
  • Industrial publications
  • Workshops and Exhibitions

Targeted Industrial Dissemination

Industrial Contacts

This page summarises the feedback provided from companies and public organisations after meetings with pSHIELD participants. These meetings are established to either discuss technology, applications or aspects of the eco-system for secure sensor information. Note: The word status is used in this text as the status of December 2011 (the end of the pSHIELD project).

Poster presented at national ICT conference VerdIKT

From the Norwegian side, the main focus is on bringing pSHIELD sensors into a standardised machine-to-machine (M2M) and machine-to-business (M2B) environment. Movation is member of ETSI and Artemisia, and through these ones foster interoperability as e.g. ETSI TS102.690 "Functional architecture for an M2M platform". Movation has the main focus on bringing pSHIELD results to the sensor and Telecom industry in Norway. A close cooperation of the pSHIELD partners Movation and CWIN is established with Telenor Objects, resulting in the first implementation of a mobile IoT platform foreseen for demonstrations with the Norwegian Rail Authorities. CWIN concentrates on the extensions of the platform towards sensor description and access, both based on semantic technologies.

ABB Norway

ABB in Norway has two groups with research interests related to SHIELD issues. The security group represented by Judith Rossebø and the wireless sensor group represented by Paal Orten. ABB was one of the core developers of the WirelessHART protocoll, and expects that an industrial uptake will require SPD functionalities as indicated by pSHIELD.

Status: Ongoing communication with ABB, resulting in an invitation to the Industrial Embedded System Workshop (19.-20. October 2011) in Trondheim. Main focus is on the "measurable security" for embedded systems. Industry is not yet ready to join on a commonly identified security measure across heterogeneous platforms can be used to describe the perception of industry.

Norwegian Defence Research Establishment (FFI)

Norwegian Defence Research Establishment (FFI)

FFI is the prime institution responsible for defence-related research in Norway. The Establishment is the chief adviser on defence-related science and technology to the Ministry of Defence and the Norwegian Armed Forces’ military organization.

In the area of authentication and identity management in tactical and mobile networks, FFI is interested in a cooperation on "identity management in the internet of things", including tags (NFC), sensors and embedded systems. The challenge they are facing is to estalish an IdM which is scalable, can use non-consistent communicaiton channels such as NFC and to use cryptalgorithsm being supported by microcontrolers. pSHIELD is of interest for them, especially with respect to identity and cryptography.

Status: FFI is looking towards a strategic project in this domain.

SIMlink, security infrastructure suitable for pSHIELD
WLAN sim

SIMLink Simlink, having developed a WLAN SIM, see this element as a

  • security options with OTA (over the air application install) and controlling of devices
  • interesting technology for micro- and personal-nodes
  • several sensor applications in the market

Status: SIMlink analyses how the technology can be used to support home appliances in a secure way, e.g. heat control systems (in collaboration with Danfoss)

  • pSHIELD collaboration meeting between CWIN, Telenor Objects, JBV (the Norwegian National Rail Administration) and SINTEF, May 12 2010. The partners agree to exchange knowledge and prototypes for the exchange of information and sensors based on the Shepherd platform.
  • 9. May 2011, An example of the pSHIELD personal node platform (embedded Linux) was provided to ESIS and Telenor Objects, who used the platform within the electrical motorcycle of ESIS. This motorbike is part of the Telenor Innovation Fair at Fornebu, Norway.
Telenor Innovation Fair Opening, with the minister of economy Trond Giske
ESIS MC at the Telenor Innovation Fair, using pSHIELD platform

  • 5. April 2011, Presentation of "Security, Privacy and Dependability" of embedded systems to the National Hospital "Rikshospitalet". The goal of this meeting is to elaborate the applicability of pSHIELD integrated sensors for eHealth purposes, together with Telenor Objects.


  • need focus on standards for communication
  • apps for mobile phone available?
  • low power Bluetooth sensors and mobile phone as gateway?
  • 29. April 2011, Prototypical implementation of pSHIELD embedded platform with Telenor Objects integration was tested on a train of the National Rail Authority (Jernbaneverket). This prototypical implementation will be used to demonstrate the interworking of sensors onboard the train with the Telecom M2M platform "Shepherd" of Telenor Objects.

The first implementation took place, and the photos are on [[1]]. The Norwegian Rail Administration (JBV) is extremely cooperative (thanks!) and opens for having the pSHIELD equipment onboard during long-term (1-3 weeks) measurement journeys.

JBV Measurement LocomotiveUsage Example of Telenor Objects "Shepherd" platform

JBV Measurement locomotive (left) and use case for "Shepherd" platform of Telenor Objects (right)

Prototype development

pSHIELD has successfully developed and demonstrated the following prototypes

  • Middleware prototype for composability
  • FPGA Power node prototype
  • Cognitive Radio prototype
  • Heterogeneous Platform prototype
  • Rail car monitoring system

The following videos show examples of the real-world prototypes of pSHIELD.


Scientific dissemination

  • Mariana Esposito, Inaki Eguia, Francesco Flammini, Alfio Pappalardo and Erkuden Rios, "Formalizing SPD metrics for Embedded Systems Multilayer approach" Second Eastern European and Mediterranean Software Process Improvement Conference (EuroMed SPI II), Zamudio, Spain, October 6-7, 2011.
  • Josef Noll, "Security, Privacy and Dependability in the Internet of Things (IoT)", WWRF#27, invited paper to WG7, 18.-20. October 2011
  • Josef Noll, Zahid Iqbal and Mohammad M.R. Chowdhury, "Integrating context- and content-aware mobile services into the cloud", CWI/CTIF seminar on Mobile Cloud Computing and wireless applications, 24.-25. October 2011, Aalborg University in Copenhagen
  • A. V. Voyiatzis , K. Stefanidis and D. N. Serpanos: "Increasing Lifetime of Crypto Keys on Smartphone Platforms with the Controlled Randomness Protocol", In Proceedings of 6th Workshop on Embedded Systems Security WESS 2011, October 2011
  • Iñaki Garitano, Roberto Uribeetxeberria and Urko Zurutuza, “Review of SCADA Anomaly Detection Systems”, Soft Computing Models in Industrial and Environmental Applications, 6th International Conference SOCO 2011, Salamanca (Spain) in April, 2011, ISBN 9783642196447
  • Urko Zurutuza , Enaitz Ezpeleta, Álvaro Herrero and Emilio Corchado “Visualization of Misuse-based Intrusion Detection: Application to Honeynet Data”, Soft Computing Models in Industrial and Environmental Applications, 6th International Conference SOCO 2011, Salamanca (Spain) in April, 2011, ISBN 9783642196447
  • Ekhiotz Jon Vergara, Simin Nadjm-Tehrani, Mikael Asplund and Urko Zurutuza, “Resource Footprint of a Manycast Protocol Implementation on Multiple Mobile Platforms”, Fifth International Conference on Next Generation Mobile Applications, Services and Technologies,NGMAST 2011, Cardiff, Wales, UK, 14-16 September 2011.
  • Fiaschetti A., Lavorato F., Suraci V., Palo A., Taglialatela A., Morgagni A., Baldelli A., Flammini F., “On the use of semantic technologies to model and control Security, Privacy and Dependability in complex systems” Proc. Of 30th International Conference on. Computer Safety, Reliability and Security (SAFECOMP’11), Sep. 2011. Naples, Italy
  • Sarfraz Alam, Mohammad M. R. Chowdhury, Josef Noll, "Interoperability of Security-enabled Internet of Things", to appear in Wireless Personal Communication Special Issue on "Internet of Things and Future Applications", Springer-Netherland, 2011.
  • Mohammad M. R. Chowdhury, Josef Noll, "Securing Critical Infrastructure: A Semantically Enhanced Sensor Based Approach", 2nd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic System Technology, WiRELESS ViTAE 2011, Chennai, India, Feb. 28-March 2011.
  • K. Stefanidis, A. V. Voyiatzis and D. N. Serpanos: "Performance of the Controlled Randomness Protocol on .NET Compact Framework Embedded Systems", In Proceedings of 4th IFIP International Conference on New Technologies, Mobility and Security, Paris, France, February 2011
  • L. Bixio, M. Ottonello, M. Raffetto, and C.S. Regazzoni, "Comparison among Cognitive Radio Architectures for Spectrum Sensing," EURASIP Journal on Wireless Communications and Networking, vol. 2011, Article ID 749891, 18 pages, 2011. doi:10.1155/2011/749891
  • L. Bixio, L. Ciardelli, M. Ottonello, M. Raffetto, C. S. Regazzoni, Sk. S. Alam and C. Armani, "A Transmit Beamforming Technique for MIMO Cognitive Radios,", Wireless Innovation Forum Conference on Communications Technologies and Software Defined Radio, SDR'11 - WInnComm - Europe, Brussels, Belgium, June 22-24, 201
  • Sk.S. Alam, L. Marcenaro and C.S. Regazzoni, "Opportunistic Spectrum Sensing and Transmissions", in Cognitive Radio and Interference Management: Technology and Strategy, Meng-Lin Ku and Jia-Chin Lin eds, IGI Global, 2012
  • Yen N. T. Pham, "Sensor Integration into Heterogeneous Service Platform and Domain Adaptation", Master Thesis, University of Oslo, December 20, 2010.
  • Sarfraz Alam, "A Security Proxy for User-centric Internet of Things", Wireless World Research Forum (WWRF) #25, Kingston, UK, 16.-18. November 2010
  • Sarfraz Alam, Mohammad M. R. Chowdhury, Josef Noll, "An Event-driven Sensor Virtualization Approach for Internet of Things", poster, VERDIKT conference, Oslo, 1.-2. November 2010, media:PosterVerdikt.pdf


  • Josef Noll, "Security, Privacy and Dependability in the Internet of Things", tutorial at the University of Karlstad, Karlstad, Sweden, 10 October 2011, Media:SPDinIoT-Karlstad-Oct2011.pdf
  • Carlo Regazzoni, "Distributed Data Fusion Techniques for Networked Embedded Systems", lecture at the first Erasmus Mundus Joint Doctorate on Interactive and Cognitive Environments (EMJD-ICE) IEEE/ICE Summer School on Networked Embedded Systems, September 3-7, 2011, Klagenfurt, Austria

PhD and Master Education related to pSHIELD

pSHIELD has opened questions of academic requests, thus eight master/bachelor theses and six PhD theses are related to the project. The most relevant theses related to pSHIELD are included here.

  • Mariana Esposito, cicle XXVI, Ph.D. in Computer and Control Engineering (ongoing research activity).
  • Mr. Iñaki Garitano, “Metodología para el diseño, implantación y mantenimiento de sistemas de seguridad para SCADA” - foreseen PhD thesis
  • Andrea Fiaschetti, cicle XXV, Ph.D. in System Engineering (ongoing research activity).
  • Sarfraz Alam, “Secure interworking of sensor systems in heterogeneous business environments” (tentative title), PhD thesis, to be finished in Q2.2012
  • Sk. Shariful Alam, “Opportunistic Spectrum Sensing and Transmissions in Cognitive Radio” (tentative title), PhD thesis, University of Genova, to be finished in Q4.2013
  • Kresimir Dabcevic (initiated), “Security Threats and Detection Techniques in Cognitive Radio Networks” (tentative title), PhD thesis, University of Genova, to be finished in Q4.2014

Master/Bachelor thesis work related to pSHIELD:

  • Giorgia Anzidei, “Design and implementation of an architecture for the composition of security services in heterogeneous embedded systems.
    • Abstract: The purpose of this thesis has been the study of the OSGI platform and the design of a discovery/composition architecture based on this middleware
  • Tommaso Proietti, "Modeling and control of Composability in Embedded Systems by means of Hybrid Automata Theory", Bachelor Thesis, University of Rome "La Sapienza", July 2010.
    • Abstract: this thesis provides some basic investigations on the use of Hybrid Automata theory to model elementary Embedded System and build basic control schemes with them.
  • Roberto Marrocco, "Formalization of automatic mechanisms for vertical composition of security functionalities in Embedded Systems", Bachelor Thesis, University of Rome "La Sapienza", July 2010.
    • Abstract: this thesis is a preliminary investigation of modeling and control Embedded Systems with respect to "Security, Privacy and Dependability" properties.
  • Francesco Lavorato, "Study and development of a semantic framework to model and control security, privacy and dependability in Embedded Systems", Master Thesis, University of Rome "La Sapienza", May 2011. **Abstract: this thesis provides some preliminary analysis and investigation on the use of semantic technologies in the context of Embedded System and SPD issues.
  • Stefano Venturi, "Study, design and development of a framework to model and control interconnected complex systems based on Hybrid Automata Theory", Master Thesis, University of Rome "La Sapienza", July 2011.
    • Abstract: this thesis is a further investigation of the potentiality of the Hybrid Automata theory to model and control complex systems (e.g. Systems of Embedded Systems)
  • Yen N. T. Pham, "Sensor Integration into Heterogeneous Service Platform and Domain Adaptation", Master Thesis, University of Oslo, December 20, 2010.
    • Abstract: established communication module between SunSPOT and Telenor Objects platform
  • Pedro Polonia, "pSHIELD - Asymmetric Cryptography", Master Thesis, FEUP, University of Porto, June 2011. **Abstract: this thesis provides a research study of asymmetric cryptography in the context of Embedded System.
  • Fabio Pozzo, “Location aware OLSR enhanced protocol for mobile ad-hoc networks”, Master Thesis, University of Genova, October 2011.
    • Abstract: this thesis proposes a novel method for reducing packet loss in mobile ad-hoc networks. Proposed algorithm is based on the usage of an embedded localization sensor.

Industrial publications

  • Giuseppe Martufi, Fabrizio de Seta, "pSHIELD for Embedded System Security", EDlink 37 (Elsag Datamat Company Magazine), Rome, 2010.

Workshops and Exhibitions

  • Valentina Casola, Mariana Esposito, Francesco Flammini, and Nicola Mazzocca, "Monitoring railway infrastructures, a case-study for the pShield project" The 2nd International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security 2012 at IMIS 2012.(UNDER REVISION)
Panel Presentation ITEA2/Artemis Co-Summit
Panel Presentation
  • Przemyslaw Osocha, João Carlos Cunha, "SPD Power Node ES solution in pSHIELD framework", ERCIM/EWICS/Cyberphysical Systems Workshop at SAFECOMP 2011, 22 September 2011, Naples, Italy
  • Przemyslaw Osocha, "Standardization of future European Embedded Systems solutions", Marie Curie Researchers Symposium „SCIENCE – Passion, Mission, Responsibilities”, Polish Presidency of the EU Council, 25-27 September 2011, Warsaw, Poland
  • Przemyslaw Osocha (SESM), Yen Pham (CWIN), "pSHIELD-pilot embedded Systems arcHItecturE for multi-Layer Dependable solutions", ARTEMIS Spring Event at Embedded World 2011, 1-3 March 2011, Nuremberg, Germany
  • Przemyslaw Osocha (SESM), Yen Pham (CWIN), "Demonstrating Security, Privacy and Dependability for Sensors to Systems", ARTEMIS IA Co-summit 2010 Project Exhibition, 26-27 October 2010, Ghent, Belgium
  • "pSHIELD and security in embedded systems", Internal Seminar, Critical Software, 08 October 2010, Coimbra, Portugal

pSHIELD Public Deliverables

Public Deliverables page is available here

  • D1.1.5 Quality Control Report, M19, Movation
  • D1.2.1 Liaisons Report, M19, SESM
File:PSHIELD D1.2.1 Liaisons Report.pdf
  • D2.1.1 System Requirements and Specifications, M10, ASTS
  • D2.1.2 System Requirements and Specifications - Next Realize, M15, ASTS
  • D2.2.2 SPD metrics specifications, M15, TEC
  • D2.3.2 System architecture design, M15, HAI
  • D3.2 SPD nano micro or personal node technologies prototype report, M16, THYIA
  • D3.3 SPD power node technologies prototype report, M17, ETH
File:PSHIELD D3.3 SPD power node technologies prototype report.pdf
  • D3.4 SPD self-x and cryptographic technologies prototype report, M16, AS
  • D4.2 SPD network technologies prototype report, M16, MGEP
  • D5.3 pSHIELD semantic models report, M16, SE
  • D5.4 SPD middleware and overlay functionality report, M16, SE
  • D6.1 Platform integration report, M17, HAI
File:PSHIELD D6.1 Platform integration report.pdf
  • D6.2 Platform validation and verification, M18, SE
  • D6.3 pSHIELD pilot demonstrators, M18, ASTS
  • D6.4 Real world requirements for SPD-based systems, M19, ASTS
  • D7.1.1 The Project Website, M09, SESM
  • D7.1.2 Dissemination Report, M19, SESM
  • D7.2.1 Exploitation Plan, M19, Movation