Skip to main content
Ir a la página de inicio de la Comisión Europea (se abrirá en una nueva ventana)
español es
CORDIS - Resultados de investigaciones de la UE
CORDIS

Resilient Trust- Trusted SMEs for Sustainable Growth of Europeans Economical Backbone to Strengthen the Digital Sovereignty

Periodic Reporting for period 2 - Resilient Trust (Resilient Trust- Trusted SMEs for Sustainable Growth of Europeans Economical Backbone to Strengthen the Digital Sovereignty)

Período documentado: 2024-10-01 hasta 2025-09-30

The internet of things (IoT) drives the datafication of our everyday life. Then, the IoT offers high automation potential, enabling us to improve people's live and compensate for societal problems such as the ageing population, missing high skilled labour across Europe or the efficiency limits of current production capabilities.
IoT 5.0 an Artificial Intelligence (AI) assisted Internet of Things, could even more benefit society, as the devices could learn how to provide more value. But the ubiquitous connectivity comes at a cost. Security levels have to rise tremendously to ensure a network stays secure and safe. This security effort is a burden for small and medium sized enterprises. This is especially dangerous as a single corrupted device can allow an attacker the exploitation of the entire network of connected devices.
Consequently, RESILIENT TRUST focuses on end-to-end security of IoT processing chains with a focus on exploitation for SMEs. It aims developing specialized hardware and software to establish TRUST in-between a network and RESILIENCE against attacks.

The long-term vision of Resilient Trust is to support SMEs activities, to secure their entire supply chain, in order to boost SMEs capabilities to develop secure and safe Cyber-Physical Systems. The partners of the microelectronics industry focus on creating integrity and identity in the lower levels of the chain for warranting RESILIENCE and TRUST. The hardware and software developments are performed for four application cases.

Resilient Trust is organised in 7 Work Packages and applied to 4 use cases.

WP 1: Requirements /Specifications
The objectives were to:
· Analyze the state of the art of IC development and secure firmware updates
· Describe attacker profiles and possible threats they could exploit and what risks they pose and to
· Analyze the supply chain infrastructure and main actors or entities involved in the supply chain.

Work Package 2: RF attack detection & mitigation: Chip-level Architecture, Design, and EDA Methodologies

The main objective is to develop all the needed hardware IPs necessary for the RF attack detection and mitigation demonstrator.

Work package 3: Hardware Security and Trust, uses the requirements of WP1 to define the hardware architecture of a security subsystem including a low-power processor and cryptographic extensions.

Work package 4: Software Development, which aims to define the software architecture of the secure low-power processor including the extension, security feature, interoperability,and connection to the blockchain.

Work package 5: System Integration and Demonstration. In resilient Trust a large list of demonstrator for the different use cases has to be implemented.

Worl package 6 for Dissemination, Exploitation and Standardisation.
And, finally WP7 for the project Management.
All the works and progresses are based on the requierements and specifications defined during the first year and are adapted to 4 use cases.

Use Case 1: Secured Multi-Standard IoT Communication
This Use Case aims the design and implementation of a low-power and secured reconfigurable RF transceiver operating in the frequency range from 1.9 GHz to 8.0 GHz in order to cover the DECT NR+, WiFi, and UWB in addition to Bluetooth and Zigbee. In addition to the reconfigurable RF transceiver, a tuneable receiver is also implemented to continuously scan the spectrum.

Use Case 2: Ambient Intelligence in Office Spaces
Smart environments can suffer from a breach of the weakest link. One solution is the unique identification and authentication of each IC in the system, commonly called Physically Unclonable Functions (PUFs). PUFs prevent tampering, overriding and cloning IDs and protects against ID theft.
On the base of its existing expertise to the 22nm process technology, the consortium is working on a secure supply chain from the fabless company to the end customer even in the case of insecure or breach in intermediate steps.

Use Case 3: Drone Detection, Recognition and Jamming for interception
We developed a System-on-a-Chip (SoC) that continuously scans RF communications to detect drone signals. This chip has to be generic and potentially integrated into any IoT system. It should be versatile in terms of RF protocol management and adapted to a large frequency band to include the monitoring of a large number of communication protocols.
Using machine learning algorithms, we are working on classifying RF signals to detect drone communication, to identify the drone model and design optimized jamming signals. A methodology to asses the jamming signal was developped. Finally, the IP itself has to be locked and secured against hacking.

Use Case 4: Maritime IoT GNSS Galileo devices strengthened by AI-based RF analysis
The Journal of Marine Science and Engineering reported that “Cyber–attacks on the maritime industry’s OT systems have increased by 900% over the last three years. With the ambition to develop Autonomous Vessels, cyber risks are taken into serious consideration. The objective of Resilient Trust UC 4 is to develop RF analytics for Cyber Security in Wireless devices and bring different AI approaches into RF communication security.
In the WP2, during this second year, two tasks have been finalized: Task 2.2 which is dedicated to the development of the building blocks which are the keystone of the future demonstrator and which target development beyond the state of the art and Task 2.3 in which the on-chip AI hardware accelerator for RF signal classification and malicious attack detection have been developed.
In the WP3, we describes the hardware security architecture developed and the cryptographic accelerators and the handling of key material using the SRAM PUF.
The WP4 has continued the work on developing the different software building blocks for UC2, UC3 and UC4 and an Interim Setup of Blockchain Architecture was also provided for use case 3 and 4.
In the WP5, the consortium focuses on integrating and validating the technologies developed within representative demonstrators. WP5 serves as the convergence point of the project, ensuring cross-domain validation of hardware and software components. The second year was dedicated to the demonstrator Specification and Integration Plan, clarifying the architecture, interfaces, and integration roadmap of the Resilient Trust demonstrators.
Mi folleto 0 0