If you are a smart home device maker struggling with security vulnerabilities that lead to product recalls and brand damage — this project developed a secure-by-design software layer and developer tools that let you build security and privacy into your products from the start. The system was validated through pilot use cases deployed on the Mind platform, with 8 demonstrator deliverables proving it works across different device types. With 6 SMEs and 11 industry partners in the consortium, the tools were built with real product constraints in mind.
Built-In Cybersecurity and Privacy Protection for Smart Home Devices and Apps
Imagine every smart device in your home — thermostat, camera, door lock — was built by a different company, each with its own security approach, and none of them really talk to each other about threats. SIFIS-HOME built a shared security layer that sits underneath all these devices, so they can automatically detect break-in attempts and protect your personal data without you having to be a tech expert. Think of it like a building-wide fire alarm system instead of each apartment having its own incompatible smoke detector. The project also created developer tools so that people building smart home apps can bake in security from day one, rather than bolting it on as an afterthought.
What needed solving
Smart home devices from different manufacturers each use their own proprietary security, creating a patchwork of vulnerabilities that hackers exploit. When one device gets compromised, there is no shared defense system to protect the rest of the home network, and developers building smart home apps have no easy way to build in proper security from the start. This leaves device makers, telecom providers, and property managers exposed to data breaches, compliance failures, and costly recalls.
What was built
The project delivered a complete secure-by-design software architecture for smart homes with working implementations: a validated security architecture that detects and reacts to cyber-attacks in real time, a physical testbed for testing IoT security, developer tools with guidelines for assessing IoT software security, and a fully implemented pilot use case deployed and validated on the Mind platform — all in final versions across 35 deliverables including 8 demonstrators.
Who needs this
Who can put this to work
If you are a telecom provider bundling smart home services with your broadband packages and facing customer complaints about hacked devices or privacy breaches — this project created a security architecture that dynamically reacts to cyber-attacks and enforces user-defined privacy policies across all connected devices. The complete testbed and security architecture were validated through final versions of both, giving you a ready-to-integrate protection layer. The consortium included leading telecom and cybersecurity industry players across 5 European countries.
If you are a property management company rolling out smart apartment technology but worried about tenant data privacy and liability from security breaches — this project built a consistent security layer that detects intrusion attempts and enforces privacy policies across all smart home devices in your buildings. The pilot use case was fully implemented and validated on a real platform, with 35 deliverables covering everything from architecture to developer guidelines. The tools help your tech team audit IoT software for security before deployment.
Quick answers
What would it cost to integrate this into our products?
The project produced open-source developer tools and guidelines for assessing IoT software security. The consortium included contributors to the Open Source community, which suggests licensing costs could be minimal. Based on available project data, specific licensing fees or integration costs are not disclosed — you would need to contact the coordinator to discuss commercial terms.
Can this scale to thousands of devices in a large deployment?
The security architecture was designed to handle interconnected smart home systems with multiple devices cooperating across different types and manufacturers. The testbed went through two iterations (first and final versions) with validation. However, the pilot was demonstrated on a single platform (Mind), so scaling to thousands of simultaneous deployments would need further validation.
Who owns the intellectual property and how is it licensed?
The project was coordinated by Consiglio Nazionale delle Ricerche (Italy's national research council) with 15 partners across 5 countries. The consortium included Open Source community contributors, suggesting at least some components may be available under open-source licenses. Specific IP arrangements would need to be clarified with the coordinator, as the 11 industry partners likely retain rights to their contributions.
Does this help with GDPR and EU cybersecurity regulations?
Yes — the project was specifically designed to address privacy and security compliance. It enables privacy-aware applications, enforces user-defined privacy policies, and includes cybersecurity and privacy audit capabilities. Consortium members were key contributors to international standardisation bodies including IETF, and had leading roles in SPARTA, CONCORDIA, and CyberSec4Europe projects of the European Cyber Competence Network.
How long would it take to go from evaluation to deployment?
The project ran from October 2020 to September 2023 and produced final versions of all key components: security architecture, testbed, developer tools, and pilot use case. Since the tools include developer guidelines and assessment capabilities, evaluation could begin relatively quickly. Based on available project data, integration timeline would depend on your existing architecture and the scope of deployment.
Will this work with our existing smart home devices and platforms?
The project was specifically designed to address the problem of smart home devices using custom and proprietary security solutions that don't account for interactions with other devices. The architecture works across the full stack — from hardware to software — and was built to help developers create applications adaptable to different systems and architectures. The pilot was validated on the Mind platform as a proof of interoperability.
Is there ongoing support or has the project ended?
The project officially closed in September 2023. However, the consortium of 15 partners across 5 countries includes 11 industry players and 6 SMEs who may continue to develop and support the technology commercially. The developer tools and guidelines were delivered in final versions, suggesting they are in a mature state. Contact the coordinator for information on post-project support and commercial offerings.
Who built it
This is a strong, industry-heavy consortium with 11 out of 15 partners (73%) coming from industry, including 6 SMEs — a clear signal that the project was built with commercial viability in mind, not just academic research. The 15 partners span 5 countries (Germany, Finland, Italy, Luxembourg, Sweden), giving good coverage of key European IoT and cybersecurity markets. The coordinator, Italy's National Research Council (CNR), brings institutional credibility, while consortium members hold leading positions in IETF standardisation and three major EU cybersecurity projects (SPARTA, CONCORDIA, CyberSec4Europe). With EUR 4,754,875 in EU funding and 35 deliverables including 8 working demonstrators, this consortium delivered substantial, testable output rather than just papers.
- CONSIGLIO NAZIONALE DELLE RICERCHECoordinator · IT
- CENTRIA-AMMATTIKORKEAKOULU OYparticipant · FI
- SENSATIVE ABparticipant · SE
- INTELLIGENTSIA CONSULTANTS SARLparticipant · LU
- INTEL DEUTSCHLAND GMBHparticipant · DE
- RISE RESEARCH INSTITUTES OF SWEDEN ABparticipant · SE
- ERICSSON ABparticipant · SE
- MZ DENMARK GMBHparticipant · DE
- F-SECURE OYJparticipant · FI
- POLITECNICO DI TORINOparticipant · IT
- WITHSECURE OYJparticipant · FI
Consiglio Nazionale delle Ricerche (CNR), Italy — reach out through their IoT or cybersecurity research division
Talk to the team behind this work.
Want an introduction to the SIFIS-HOME team to discuss licensing their security tools or integrating their architecture into your smart home products? SciTransfer can arrange a direct meeting with the right technical contact.