The Concept

The IoTAC – Security By Design IoT Development and Certificate Framework with Front-end Access Control – project aims to deliver a secure and privacy-friendly IoT architecture that will facilitate the development of more resilient IoT service environments. Our system, comprising of a secure gateway, runtime security applications and cloud-based service platforms, will provide comprehensive protection for service environments of various industry domain. The technology will not only protect new deployments but can also enhance the security level of legacy operations.

Read more

USPs outline

What is this solution offering that’s different?
Advanced security

The IoTAC architecture comprises high security level components and solutions like the use of chip cards, PKI encryption, root of trust, secure booting, audit logs and many more. Security is assured all through the design, implementation and operation phases.

Modular architecture

The IoTAC architecture comprises multiple hardware and software components which will allow flexible configuration options to support diverse service environments of various security levels. Underlying core features will be supported with optional add-ons.

Multi-layer approach

Security countermeasures will be implemented both at hardware- and at software-level, comprising a secure gateway, front-end access control, honeypots, checkpointing, AI&ML algorithms and a runtime monitoring system.

The IoTAC framework

The IoTAC framework comprises the Security Baseline as the foundation, the IoTAC Software Security by Design (SSD) principles and the Security Assurance Model (SAM) platform, which will unite in a formal Certification procedure exposed as a service.

Use Cases

Proof of domain independence 


use case

Smart home

Industrial /


use case

Terminal operation


use case

Drone operation



use case

Automated car

Latest news

Mix of research updates, blog content and white papers

FDO: The FIDO Device Onboard protocol

The FIDO Alliance launched  a new, open IoT standard that enables devices to simply and securely onboard to cloud and on-premise management platforms. IoT device onboarding involves the installation of the physical device and the setup of credentials so that it can securely communicate with its target cloud or platform. …

Fröhlich P, Gelenbe E, Fiołka J, Chęciński J, Nowak M, Filus Z. 2021. Smart SDN Management of Fog Services to Optimize QoS and Energy. Sensors. 21, 3105, 2021.

Journal: Sensors / Volume 21 / Issue 9 Authors: Fröhlich P, Gelenbe E, Fiołka J, Chęciński J, Nowak M, Filus Z. Abstract: The short latency required by IoT devices that need to access specific services have led to the development of Fog architectures that can serve as a useful intermediary between IoT systems and the…

An Introduction to IoT Architectures

In the IoTAC project, we are looking at different IoT architectures to identify best practices, potential weaknesses and to understand the difference between the various approaches. Below we give a short summary of four architectures we have analyzed.   ISO/IEC Internet of Things (IoT) Reference Architecture ISO/IEC 30141 is an…


Stay in the know and receive all the latest updates straight to your inbox.