Secure and private connectivity in smart environments (SURPRISE)
Identity and credentials management
Secure and private data colection, storage, processing and dissemination
Secure and private wireless communications and networks
What is the SURPRISE project about?
The SURPRISE project provides an advanced yet pragmatic approach for practical security and privacy (S&P) for smart environments: solutions that catalyse a broad set of applications and services, relying on well-understood and rigorously evaluated components that significantly advance the state of the art.
We tackle fundamental problems with far-reaching importance and relevance to potentially any smart environment.
Trust management, including identity and credential management for S&P;
Lean, resilient S&P preserving communication and networking;
Data validation and S&P preserving processing
ScopeWe distill three key targets, three cornerstones of security and privacy for smart environments: trust management, lean and resilient communication, and data validation, storage, and analytics.
Below is a set of significant representative, across the project Work Packages, publications.
H. Jin and P. Papadimitratos, “Resilient Privacy Protection for Location-based Services through Decentralization,” ACM Transactions on Privacy and Security (ACM TOPS), 22(4), 21:1-36, 2019 [Full Text]
M. Khodaei, H. Jin, and P. Papadimitratos, “SECMACE: Scalable and Robust Identity and Credential Management Infrastructure in Vehicular Communication Systems,” IEEE Transactions on Intelligent Transportation Systems (IEEE ITS), vol. 19, no. 5, pp. 1430-1444, May 2018 [Full Text]
R. Dahlberg, T. Pulls, T. Ritter and P. Syverson, “Privacy-Preserving & Incrementally-Deployable Support for Certificate Transparency in Tor,” in Proc. of the Privacy Enhancing Technologies Symposium (PETS), PoPETS journal 2021(2), 194-213, 2021 [Full Text]
M. Akil, L. Islami, S. Fischer-Hübner, L. Martucci and A. Zuccato, “Privacy-preserving identifiers for IoT: A systematic literature review,” IEEE Access, 8, 168470-168485, 2020 [Full Text]
Q. Wang and M. Skoglund, “Symmetric private information retrieval from MDS coded distributed storage with non-colluding and colluding servers,” IEEE Transactions on Information Theory, vol. 65, no. 8, pp. 5160-5175, August 2019. [Full Text]
Q. Wang and M. Skoglund, “On PIR and symmetric PIR from colluding databases with adversaries and eavesdroppers,” IEEE Transactions on Information Theory, vol. 65, no. 5, pp. 3183-3197, May 2019. [Full Text]
Q. Wang, H. Sun and M. Skoglund, “The capacity of private information retrieval with eavesdroppers,” IEEE Transactions on Information Theory, vol. 65, no. 5, pp. 3198-3214, May 2019. [Full Text]
A. Zamani, T. Oechtering, and M. Skoglund, “A design framework for strongly Chi-squareprivate data disclosure,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2312-2325, 2021. [Full Text]
K. Zhang, E.G. Larsson, and P. Papadimitratos, “Protecting GNSS Open Service-Navigation Message Authentication against Distance-Decreasing Attacks,” IEEE Transactions on Aerospace and Electronic Systems, 2021 (to appear) [Full Text]
M. Khodaei and P. Papadimitratos, “Cooperative Location Privacy in Vehicular Networks: Why Simple Mix-zones are not Enough,” IEEE Internet Of Things Journal (IEEE IoT), March 2021. [Full Text]
Guo, Q., Johansson, T., & Nilsson, A. (2020, August). A key-recovery timing attack on postquantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM. [Full Text]