Difference between revisions of "SCOTT:BB23.N"
From its-wiki.no
Josef.Noll (Talk | contribs) |
Josef.Noll (Talk | contribs) |
||
Line 8: | Line 8: | ||
|Related to Use Cases=SCOTT:WP9, SCOTT:WP11, SCOTT:WP12, SCOTT:WP13, SCOTT:WP15, SCOTT:WP18, SCOTT:WP19, SCOTT:WP20, | |Related to Use Cases=SCOTT:WP9, SCOTT:WP11, SCOTT:WP12, SCOTT:WP13, SCOTT:WP15, SCOTT:WP18, SCOTT:WP19, SCOTT:WP20, | ||
|Description=Common (SW) security library supporting basic and especially lightweight security mechanisms (e.g., encryption, authentication, signing, etc.) in SCOTT also providing an interface to secure HW modules (e.g., TPM, HSM, secure memory, ...) as defined in Building Block “HW supporting security mechanisms”. | |Description=Common (SW) security library supporting basic and especially lightweight security mechanisms (e.g., encryption, authentication, signing, etc.) in SCOTT also providing an interface to secure HW modules (e.g., TPM, HSM, secure memory, ...) as defined in Building Block “HW supporting security mechanisms”. | ||
− | |Main output=A library of general security mechanisms and functions to secure | + | |Main output=A library of general security mechanisms and functions to secure a wired or wireless channel and a guide on how to use it. |
|BB category=Methodology (for SW/HW development), SW component, Other | |BB category=Methodology (for SW/HW development), SW component, Other | ||
|Baseline=Numerous different security mechanisms and technologies exist in the IT domain. However, these mechanisms are often to heave to use in wireless networks and embedded systems. | |Baseline=Numerous different security mechanisms and technologies exist in the IT domain. However, these mechanisms are often to heave to use in wireless networks and embedded systems. |
Latest revision as of 18:03, 11 December 2017
Title | SCOTT Security Library |
---|---|
Page Title | BB23.N SCOTT Security Library |
Technology Line | Security & Safety |
Lead partner | VIF |
Leader | Marco Steger |
Contributors | VIF, AVL, VEMCO, GUT, INDRA, UIO, TUG, JKU, F-SECURE, SBA, EyeSaaS, HiOA, TU Delft |
Related to Use Cases | SCOTT:WP9, SCOTT:WP11, SCOTT:WP12, SCOTT:WP13, SCOTT:WP15, SCOTT:WP18, SCOTT:WP19, SCOTT:WP20 |
Description | Common (SW) security library supporting basic and especially lightweight security mechanisms (e.g., encryption, authentication, signing, etc.) in SCOTT also providing an interface to secure HW modules (e.g., TPM, HSM, secure memory, ...) as defined in Building Block “HW supporting security mechanisms”. |
Main output | A library of general security mechanisms and functions to secure a wired or wireless channel and a guide on how to use it. |
BB category | Methodology (for SW/HW development), SW component, Other |
Baseline | Numerous different security mechanisms and technologies exist in the IT domain. However, these mechanisms are often to heave to use in wireless networks and embedded systems. |
Current TRL | 4, protocols and solutions exist (IT security) but cannot directly be applied in WSNs and smart sensors |
Target TRL | 5-6, the developed components and the corresponding guidelines will be used to support the implementation of SCOTT prototypes and verified in testbeds |