Find in here https://datatracker.ietf.org/meeting/118/proceedings/ the proceedings of IETF 118, where you can check IoT Working Group work such as ROLL, 6Lo, IoTOps, etc. Minutes, Slides and Video Recording are available.
From Charter: "The Supply Chain Integrity, Transparency, and Trust (SCITT) WG will define a set of interoperable building blocks that will allow implementers to build integrity and accountability into software supply chain systems to help assure trustworthy operation.
we propose to raise awareness on the one hand of IoT standardization players on the energy impact in defining standards and on the other hand to developers of IoT stacks and applications. For this, we propose an approach consisting firstly of starting from the existing to highlight the energy impact in the choices of the use of a standard and its implementations and then secondly to identify a set of recommendations.
I propose to start discussing cybersecurity standardisation deliverables from the perspective of Common Criteria for Information Technology Security Evaluation (CC v3.1), in particular with respect to the EUCC - the ENISA cybersecurity certification scheme proposed for ICT products, and therefore including IoT, which is currently in preparation.
The Internet Engineering Task Force (IETF) is an international Standards Developing Organization that work in the development and standardization of Internet protocols. The IETF is open to any interested individual. The next IETF meeting is called IETF 113. The IETF 113 starts Saturday 19 March and runs through Friday afternoon, 25 March.
More Information, registration, agenda: https://www.ietf.org/how/meetings/113
Routing Over Low power and Lossy networks (roll) working group at the IETF, is the working group in charge of developing routing standards for constrained environments, oriented to use cases such as smart home, smart cities and industry 4.0. The Working Group focus on routing issues in IPv6 for Low power and Lossy networks, maintaining and improving the protocols already developed, including RPL and MPL. The Participation is open to any individual.
Charter: https://datatracker.ietf.org/wg/roll/about/
To Subscribe: http://www.ietf.org/mailman/listinfo/roll
The Internet Engineering Task Force (IETF) is an international Standards Developing Organization that work in the development and standardization of Internet protocols. The IETF is open to any interested individual. The next IETF meeting is called IETF 112. The IETF 112 will start on Monday, 8 November 2021 and run through Friday afternoon, 12 November 2021. Sessions will from 12:00-18:00 UTC each day.
More Information, registration, agenda: https://www.ietf.org/how/meetings/112/
Get to know more about how the M-Sec solution is being implemented in Fujisawa, Japan, by watching this video on our Use Case 4: https://youtu.be/XioYWKcLfhM
Are you a company, university student, researcher, data scientist, entrepreneur or a concerned citizen?
Do you have an innovative earlystage business idea that addresses a smartcity challenge? ?? Are you interested in security and privacy issues of iot devices and apps? ??
Then don't miss this chance and apply by 26 August 5pm CET to M-Sec Project Online Contest, that will run between 6-10 September ? https://lnkd.in/ecfRk7b
At the end of 2020, the M-Sec Project launched a survey to the European and Japanese IoT community, to better understand their experience when using IoT devices and applications and on their knowledge of EU & Japan’s data protection regulations. 6 months after, and with more than 450 answers, here are the first insights from our community: https://www.msecproject.eu/m-sec-eu-japanese-consultation-preliminary-results/
Get to know more about how the M-Sec solution is being implemented in Santander, Spain, by watching this video on our Use Case 1: https://youtu.be/9o5QofdWhBs
Dear community, the M-Sec Project is currently implementing 5 pilots to test, validate and showcase the impact of its cybersecurity solution. Learn more about M-Sec’s Use Case 3 to better understand how this Use Case is being implemented in the Japanese city of Fujisawa.
Get to know more about how the M-Sec solution is being implemented in Santander, Spain, by watching this video on our Use Case 2: https://youtu.be/GstjqDWPrUg
Dear community, the M-Sec Project is currently implementing 5 pilots to test, validate and showcase the impact of its cybersecurity solution. Learn more about M-Sec’s Use Case 4 to better understand how this Use Case is being implemented in the Japanese city of Fujisawa.
Dear community, the M-Sec Project is currently implementing 5 pilots to test, validate and showcase the impact of its cybersecurity solution. Learn more about M-Sec’s Use Case 2 to better understand how this Use Case is being implemented in the Spanish city of Santander.
Dear community, the M-Sec Project is currently implementing 5 pilots to test, validate and showcase the impact of its cybersecurity solution. Learn more about M-Sec’s Use Case 1 to better understand how this Use Case is being implemented in the Spanish city of Santander.
The main focus of M-Sec’s Cookbook is to introduce the M-Sec IoT security framework that has been developed by the European and Japanese consortium researchers for the past two years. Therefore, it presents techniques, methods, and design and operating principles of the M-Sec solution that those researchers believe will help other IoT developers to minimize the risk of suffering critical vulnerabilities in a wide range of IoT devices.
M-Sec is an EU-Japan collaborative Project with the main goal of developing an innovative solution that ensures a more secure data transfer between stakeholders when using IoT devices and applications in hyper-connected smart cities.
In the scope of this research, the project is now conducting an online survey to all EU and Japanese citizens and stakeholders, to collect feedback on individuals use of IoT devices and applications, and their understanding of data protection regulation.
The M-Sec Project, an EU and Japanese collaboration, released a White Paper that acts as a guide to inform readers about the main IoT security issues faced nowadays and proposes concrete solutions to these problems.
I am delighted that Sebastian Hallensleben has taken up the role of Chair of Technical Working Group (TWG) on Trusted Information. In a time when fake news can interfere in the political election process, undermine vaccination programs and cause riots in the streets ( or indeed in government buildings), access to trusted information will become a much sought after commodity.
The National Standards Authority of Ireland are launching an ISO/IEC JTC1 SC41 Internet of Things and Digital Twin mirror committee with significant interest being displayed from Academia, Research Centres, Government Agencies and Industry. More information to follow when the committee has been established.
The present draft document, elaborated by the ETSI TC CYBER, specifies a conformance assessment methodology for consumer IoT devices, their relation to associated services and corresponding relevant processes against ETSI TS 103 645 [1] / ETSI EN 303 645, Draft ETSI addressing the mandatory and recommended provisions as well as conditions and complements ETSI TS 103 645 / ETSI EN 303 645 by defining test cases and assessment criteria for each provision.