Periodic Reporting for period 2 - Resilient Trust (Resilient Trust- Trusted SMEs for Sustainable Growth of Europeans Economical Backbone to Strengthen the Digital Sovereignty)
Período documentado: 2024-10-01 hasta 2025-09-30
IoT 5.0 an Artificial Intelligence (AI) assisted Internet of Things, could even more benefit society, as the devices could learn how to provide more value. But the ubiquitous connectivity comes at a cost. Security levels have to rise tremendously to ensure a network stays secure and safe. This security effort is a burden for small and medium sized enterprises. This is especially dangerous as a single corrupted device can allow an attacker the exploitation of the entire network of connected devices.
Consequently, RESILIENT TRUST focuses on end-to-end security of IoT processing chains with a focus on exploitation for SMEs. It aims developing specialized hardware and software to establish TRUST in-between a network and RESILIENCE against attacks.
The long-term vision of Resilient Trust is to support SMEs activities, to secure their entire supply chain, in order to boost SMEs capabilities to develop secure and safe Cyber-Physical Systems. The partners of the microelectronics industry focus on creating integrity and identity in the lower levels of the chain for warranting RESILIENCE and TRUST. The hardware and software developments are performed for four application cases.
Resilient Trust is organised in 7 Work Packages and applied to 4 use cases.
WP 1: Requirements /Specifications
The objectives were to:
· Analyze the state of the art of IC development and secure firmware updates
· Describe attacker profiles and possible threats they could exploit and what risks they pose and to
· Analyze the supply chain infrastructure and main actors or entities involved in the supply chain.
Work Package 2: RF attack detection & mitigation: Chip-level Architecture, Design, and EDA Methodologies
The main objective is to develop all the needed hardware IPs necessary for the RF attack detection and mitigation demonstrator.
Work package 3: Hardware Security and Trust, uses the requirements of WP1 to define the hardware architecture of a security subsystem including a low-power processor and cryptographic extensions.
Work package 4: Software Development, which aims to define the software architecture of the secure low-power processor including the extension, security feature, interoperability,and connection to the blockchain.
Work package 5: System Integration and Demonstration. In resilient Trust a large list of demonstrator for the different use cases has to be implemented.
Worl package 6 for Dissemination, Exploitation and Standardisation.
And, finally WP7 for the project Management.
Use Case 1: Secured Multi-Standard IoT Communication
This Use Case aims the design and implementation of a low-power and secured reconfigurable RF transceiver operating in the frequency range from 1.9 GHz to 8.0 GHz in order to cover the DECT NR+, WiFi, and UWB in addition to Bluetooth and Zigbee. In addition to the reconfigurable RF transceiver, a tuneable receiver is also implemented to continuously scan the spectrum.
Use Case 2: Ambient Intelligence in Office Spaces
Smart environments can suffer from a breach of the weakest link. One solution is the unique identification and authentication of each IC in the system, commonly called Physically Unclonable Functions (PUFs). PUFs prevent tampering, overriding and cloning IDs and protects against ID theft.
On the base of its existing expertise to the 22nm process technology, the consortium is working on a secure supply chain from the fabless company to the end customer even in the case of insecure or breach in intermediate steps.
Use Case 3: Drone Detection, Recognition and Jamming for interception
We developed a System-on-a-Chip (SoC) that continuously scans RF communications to detect drone signals. This chip has to be generic and potentially integrated into any IoT system. It should be versatile in terms of RF protocol management and adapted to a large frequency band to include the monitoring of a large number of communication protocols.
Using machine learning algorithms, we are working on classifying RF signals to detect drone communication, to identify the drone model and design optimized jamming signals. A methodology to asses the jamming signal was developped. Finally, the IP itself has to be locked and secured against hacking.
Use Case 4: Maritime IoT GNSS Galileo devices strengthened by AI-based RF analysis
The Journal of Marine Science and Engineering reported that “Cyber–attacks on the maritime industry’s OT systems have increased by 900% over the last three years. With the ambition to develop Autonomous Vessels, cyber risks are taken into serious consideration. The objective of Resilient Trust UC 4 is to develop RF analytics for Cyber Security in Wireless devices and bring different AI approaches into RF communication security.
In the WP3, we describes the hardware security architecture developed and the cryptographic accelerators and the handling of key material using the SRAM PUF.
The WP4 has continued the work on developing the different software building blocks for UC2, UC3 and UC4 and an Interim Setup of Blockchain Architecture was also provided for use case 3 and 4.
In the WP5, the consortium focuses on integrating and validating the technologies developed within representative demonstrators. WP5 serves as the convergence point of the project, ensuring cross-domain validation of hardware and software components. The second year was dedicated to the demonstrator Specification and Integration Plan, clarifying the architecture, interfaces, and integration roadmap of the Resilient Trust demonstrators.