European Commission logo
français français
CORDIS - Résultats de la recherche de l’UE
CORDIS

Secure management of IoT devices lifecycle through identities, trust and distributed ledgers

Livrables

Workshops and Capacity building programme - 1st version

Report on the capacity building activities. Includes also first version of workshops organization and first version of capacity material (T6.2).

Project website, social network strategy and visual identity

Website social media in place visual identity poster leaflet and logo and ERATOSTHENES branding and accompanying report task 61

H - Requirement No. 2

Copies of opinions/approvals by ethics committees and/or competent authorities for the research with humans must be obtained and kept on file.

H - Requirement No. 1

The beneficiary must submit a deliverable including:- The procedures and criteria that will be used to identify/recruit research participants.- The informed consent procedures including personal data processing that will be implemented for the participation of humans.- Templates of the informed consent/assent forms and information sheets (in language and terms intelligible to the participants) including personal data processing.- Details on an incidental findings policy.

NEC - Requirement No. 5

The beneficiary must submit a deliverable including:- Details on the materials which will be imported to/exported from the EU.- In case activities undertaken in non-EU countries involves material import/export, copies of import/export authorisations, as required by national/EU legislation must be obtained and kept on file.

Automatic deployment language and tools for trust agents

This deliverable includes the T2.3 outputs, the source code for the deployment language, local deployment engine, global fleet assignment engine, auxiliary services for building, continuous update and trustworthiness assurance of the deployed agents.

Identity Recovery Mechanism

This deliverable includes the outcomes of T3.5 regarding the development of the identity recovery after device attack or key-loss.

Trusted Execution of TBM on IoT/Edge Devices

This deliverable includes the outputs from T2.4, the security middleware to ensure the deployment of TBM in TEE and a set of key security services.

Interoperability layer with legacy infrastructure

This deliverable includes the output of task 2.7, i.e., the source code and documents for the interoperability layer.

Trust Broker Mechanism

This deliverable includes the outputs from Task 2.1 regarding the development of trust broker mechanisms and algorithms to feed the Trust Manager and Broker (TMB).

First System integration and Proof of Concept

Report on the first system integration and the release of the Proof of Concept. This task includes the initial results of T5.1.

Updated System integration

This deliverable will include the updated version of the system integration after the technical adaptations and will be the revised version of D5.1.

Automated Recovery Mechanism of Trust Manager and Broker

This deliverable includes the outputs from Task 2.5, the source code of the recovery mechanism, documents for blue-green deployment mechanisms and the recovery triggering services.

Intrusion detection for IoT-based context and networks

This deliverable includes the first version of the development of IDS as a result from Task 4.5.

Inter-ledger platform for Cyber-threat information sharing

This deliverable includes the initial outputs from Task 4.3 and 4.2 regarding the development of the inter-ledger platform for Cyber-threat information sharing to support the exchange of trust information and relevant security information.

Prototype of Context-aware identity and access manager

This deliverable includes the first outputs from T3.1 and 3.2 about the Self-Sovereign Identity (SSI) management models and mechanisms including the different components and services needed for the development of the Identity Manager.

Updated version of the identity and access manager

This deliverable includes the updated version of the context-aware identity and access manager based on the outputs of tasks T3.1 and T3.2.

Prototype of Advanced Data Protection Mechanism

This deliverable includes the initial outputs from T34 about the cryptographic protection of the identity and trust data

IoT Network Enrolment mechanism

This deliverable includes the outputs from Task 2.6, the source code of the enrolment mechanism and the algorithms for initial trust value computation.

AI Threat Analysis Models and Intrusion Detection for IoT Networks

This deliverable is the updated version of D4.4 and D4.5 and includes the AI models for risk assessment and intrusion detection.

Federated threat analysis models for continuous risk assessment

This deliverable includes the initial outcomes from Task 4.4 about the development of Federated threat analysis models for continuous assessment as the defence service for detecting different attacks and exploits inside IoT networks.

DLT-based IoT Identity Manager

This deliverable includes the first version of the DLT and privacy-preserving IoT Identity Manager as well as the applied models to the dP-ABC scheme.

Updated Threat Modelling Module

This deliverable includes the updated outputs from T2.2 about threat modelling module of TBM for dynamic end-to-end threats analysis.

Cybersecurity Exercises and Trainings

This deliverable will include the preparatory activities and the plan of the cybersecurity exercise execution and training, this report will be related with T5.6.

Plan on Standardization Activities

Plan of Standardization activities and developed material including recommendations towards standardization bodies (related to T6.6).

Quality Plan and Risks Registry v2

D7.7 will include the updated project quality control procedures to ensure high quality standards and control mechanisms (T7.3). It will also include the updated risk registry (T7.3).

Interim Report of Piloting Activities and Impact Assessment

Report on the first outcomes of the piloting activities. This deliverable will also and will provide a PIA/DPIA evaluation based on the GDPR.

Plan on Contribution to IoT Cyber Security Certification Activities

Plan of IoT Cyber Security Certification Activities (related to T6.5).

Research Agenda, IoT threat landscape and security challenges

This deliverable includes the outputs from T11 and consolidates the research agenda current stateoftheart and IoT threat landscapechallenges

Pilot 1 - PoC Evaluation

Report on the validation of the PoC and recommendations for technical improvements (related to T5.3).

Design of Physical Unclonable Functions for IdM

This deliverable includes the early outcomes of T36 about the design of PUFs and their integration for secure key generation and authentication

Secure deployment and registration of IoT devices

This deliverable includes the design and development of the mechanisms of the framework related with the secure deployment of IoT devices and its registration in the directory. This is the initial outcome of T4.6.

Data Management Plan v1

DMP initial version M3 including data definitions management procedures GDPR policies T74

Preliminary ERATOSTHENES Architecture

This deliverable describes the first highlevel release of the ERATOSTHENES architecture Output from Task 14

ERATOSTHENES Blueprint - Final Architecture

D1.4 outlines the overall solution, including its components and interfaces. Further focus is on the required components to realize the novel approaches of the solution.

Capacity Building Programme and Planning

Report on the planning and organisation of the capacity building programme capacity assessment strategy and implementation and monitoring and evaluation plan T62

Dissemination and Communication plan

Report on the ERATOSTHENES dissemination and communication strategy stakeholders and target groups identification AB formation and activities foreseen T613

Quality Plan and Risks Registry v1

D72 will include the project quality control procedures to be followed as well as all templates to ensure high quality standards and control mechanisms T73 It will also include the project risk registry that will be updated on M25 T73

Project Management Handbook

D71will include all necessary project management procedures reporting approvals risks etc T71 and a preliminary structuring of ethics legal and IPRs T71 T72

Publications

A privacy-preserving attribute-based framework for IoT identity lifecycle management

Auteurs: Jesus Garcia-Rodriguez, Antonio Skarmeta
Publié dans: Computer Networks, Numéro Volume 236, 2023
Éditeur: ELSEVIER
DOI: 10.1016/j.comnet.2023.110039

To pass or not to pass: Privacy-preserving physical access control

Auteurs: Jesus Garcia-Rodriguez, Stephan Krenn, Daniel Slamanig
Publié dans: Computers & Security, Numéro Volume 136, 2024
Éditeur: ELSEVIER
DOI: 10.1016/j.cose.2023.103566

Context-Aware Digital Twins to Support Software Management at the Edge

Auteurs: Rustem Dautov & Hui Song (SINTEF)
Publié dans: Research Challenges in Information Science: Information Science and the Connected World, Numéro Lecture Notes in Business Information Processing, vol 476., 2023, ISBN 978-3-031-33079-7
Éditeur: SPRINGER
DOI: 10.1007/978-3-031-33080-3_15

A Holistic Approach For Iot Networks' Identity And Trust Management - The ERATOSTHENES Project

Auteurs: K. Loupos, C. Kalogirou, H. Niavis, A. F. Skarmeta, E. Torroglosa-Garcia, A. Palomares, H. Song, P.E. Brun, F. Giampaolo, D. V. Landuyt, S. Michiels, B. Podgorelec, C. Xenakis, M. Bampatsikos, K. Krilakis
Publié dans: Lecture Notes in Computer Science book series (LNCS,volume 13533), 2022
Éditeur: Springer
DOI: 10.1007/978-3-031-20936-9_27

Consenseiot: A Consensus Algorithm For Secure And Scalable Blockchain In The Iot Context

Auteurs: Konstantinos Loupos, Harris Niavis
Publié dans: ICPS Proceedings - ARES '22, 2022, ISBN 9781450396707
Éditeur: ACM
DOI: 10.1145/3538969.3543811

Multi-Attribute Decision Making-based Trust Score Calculation in Trust Management in IoT

Auteurs: Michail Bampatsikos, Ilias Politis, Vaios Bolgouras, Christos Xenakis
Publié dans: IWAPS 2023 3rd International Workshop on Advances on Privacy Preserving Technologies and Solutions, Numéro August 2023, Article No: 94, 2023, Page(s) 1-8
Éditeur: ACM
DOI: 10.1145/3600160.3605074

Trust Scheme Interoperability: Connecting Heterogeneous Trust Schemes

Auteurs: Stefan More
Publié dans: SECPID: Workshop on Security, Privacy, and Identity Management in the Cloud, Numéro August 2023, Article No: 124, 2023
Éditeur: ACM
DOI: 10.1145/3600160.3605046

Adversarial Machine Learning Attacks on Multiclass Classification of IoT Network Traffic

Auteurs: Vasileios Pantelakis, Panagiotis Bountakas, Aristeidis Farao, Christos Xenakis
Publié dans: IWAPS 2023 3rd International Workshop on Advances on Privacy Preserving Technologies and Solutions, Numéro August 2023, Article No: 100, 2023, Page(s) 1-8
Éditeur: ACM
DOI: 10.1145/3600160.3605086

Towards Community-Driven Generative AI

Auteurs: Rustem Dautov, Erik Johannes Husom, Sagar Sen, Hui Song
Publié dans: 18th Conference on Computer Science and Intelligence Systems (FedCSIS 2023), Numéro ACSIS, Vol. 36, 2023, Page(s) 43–50
Éditeur: ACSIS
DOI: 10.15439/2023f5494

Towards a Model-Based Serverless Platform for the Cloud-Edge-IoT Continuum

Auteurs: Nicolas Ferry; Rustem Dautov; Hui Song
Publié dans: CCGrid 2022 - 22nd IEEE/ACM International Symposium on Cluster Computing and the Grid : Workshop on Cloud-to-Things continuum: towards the convergence of IoT, Edge and Cloud Computing, Numéro 1, 2022, Page(s) pp. 851-858
Éditeur: INRIA
DOI: 10.1109/ccgrid54584.2022.00101

Recherche de données OpenAIRE...

Une erreur s’est produite lors de la recherche de données OpenAIRE

Aucun résultat disponible