Security By Design IoT Development and

Certificate Framework with Front-end Access Control

The Concept

The IoTAC project aims to deliver a secure and privacy-friendly IoT architecture that will facilitate the development of more resilient IoT service environments. Our system, comprising of a secure gateway, runtime security applications and cloud-based service platforms, will provide comprehensive protection for service environments of various industry domain. The technology will not only protect new deployments but can also enhance the security level of legacy operations.

Read more

USPs outline

What is this solution offering that’s different?
Advanced security

The IoTAC architecture comprises high security level components and solutions like the use of chip cards, PKI encryption, root of trust, secure booting, audit logs and many more. Security is assured all through the design, implementation and operation phases.

Modular architecture

The IoTAC architecture comprises multiple hardware and software components which will allow flexible configuration options to support diverse service environments of various security levels. Underlying core features will be supported with optional add-ons.

Multi-layer approach

Security countermeasures will be implemented both at hardware- and at software-level, comprising a secure gateway, front-end access control, honeypots, checkpointing, AI&ML algorithms and a runtime monitoring system.

The IoTAC framework

The IoTAC framework comprises the Security Baseline as the foundation, the IoTAC Software Security by Design (SSD) principles and the Security Assurance Model (SAM) platform, which will unite in a formal Certification procedure exposed as a service.

Use Cases

Proof of domain independence 


use case

Smart home

Industrial /


use case

Terminal operation


use case

Drone operation



use case

Automated car

Latest news

Mix of research updates, blog content and white papers

Deliverable D9.1 Dissemination and Communication Strategy and Annual Plan

IoTAC_D9.1a Dissemination and Communication Strategy and Annual Plan_v1.0.pdf D9.1 provides an overview of the IoTAC project’s dissemination and communication strategy by describing the project’s major dissemination and communication goals, as well as the channels, tools, and procedures that will serve to realize them.
News & Insights

Latest IoT Threat Statistics

According to the Nokia Threat Intelligence Report 2020, IoT devices were responsible for 32.72% of all infections observed in mobile networks, up from 16.17% in 2019. This trend is in line with the growing number of IoT devices that are now connected to mobile networks. Furthermore, with the introduction of…
News & Insights

Front-End Access Control: The Capability-Based Access Control for IoT

According to a large number of research papers, legacy access control systems cannot adequately support IoT requirements. Solutions like Identity Based Access Control (IBAC), Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), Trust-Based Access Control (TBAC), just to mention the best-known ones, fall short of providing the necessary functionality and…


Stay in the know and receive all the latest updates straight to your inbox.