Difference between revisions of "SCOTT:BB23.N"

From its-wiki.no

Jump to: navigation, search
m (Josef.Noll moved page SCOTT:BB3.1.N to SCOTT:BB23.N without leaving a redirect)
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
 
{{Building Block
 
{{Building Block
 
|Title=SCOTT Security Library
 
|Title=SCOTT Security Library
|Page Title=BB3.1.N SCOTT Security Library
+
|Page Title=BB23.N SCOTT Security Library
 
|Technology Line=Security & Safety
 
|Technology Line=Security & Safety
 
|Lead partner=VIF
 
|Lead partner=VIF
Line 8: Line 8:
 
|Related to Use Cases=SCOTT:WP9, SCOTT:WP11, SCOTT:WP12, SCOTT:WP13, SCOTT:WP15, SCOTT:WP18, SCOTT:WP19, SCOTT:WP20,
 
|Related to Use Cases=SCOTT:WP9, SCOTT:WP11, SCOTT:WP12, SCOTT:WP13, SCOTT:WP15, SCOTT:WP18, SCOTT:WP19, SCOTT:WP20,
 
|Description=Common (SW) security library supporting basic and especially lightweight security mechanisms (e.g., encryption, authentication, signing, etc.) in SCOTT also providing an interface to secure HW modules (e.g., TPM, HSM, secure memory, ...) as defined in Building Block “HW supporting security mechanisms”.
 
|Description=Common (SW) security library supporting basic and especially lightweight security mechanisms (e.g., encryption, authentication, signing, etc.) in SCOTT also providing an interface to secure HW modules (e.g., TPM, HSM, secure memory, ...) as defined in Building Block “HW supporting security mechanisms”.
|Main output=A library of general security mechanisms and functions to secure a a wired or wireless channel and a guide on how to use it.
+
|Main output=A library of general security mechanisms and functions to secure a wired or wireless channel and a guide on how to use it.
 
|BB category=Methodology (for SW/HW development), SW component, Other
 
|BB category=Methodology (for SW/HW development), SW component, Other
 
|Baseline=Numerous different security mechanisms and technologies exist in the IT domain. However, these mechanisms are often to heave to use in wireless networks and embedded systems.
 
|Baseline=Numerous different security mechanisms and technologies exist in the IT domain. However, these mechanisms are often to heave to use in wireless networks and embedded systems.

Latest revision as of 18:03, 11 December 2017

Title SCOTT Security Library
Page Title BB23.N SCOTT Security Library
Technology Line Security & Safety
Lead partner VIF
Leader Marco Steger
Contributors VIF, AVL, VEMCO, GUT, INDRA, UIO, TUG, JKU, F-SECURE, SBA, EyeSaaS, HiOA, TU Delft
Related to Use Cases SCOTT:WP9, SCOTT:WP11, SCOTT:WP12, SCOTT:WP13, SCOTT:WP15, SCOTT:WP18, SCOTT:WP19, SCOTT:WP20
Description Common (SW) security library supporting basic and especially lightweight security mechanisms (e.g., encryption, authentication, signing, etc.) in SCOTT also providing an interface to secure HW modules (e.g., TPM, HSM, secure memory, ...) as defined in Building Block “HW supporting security mechanisms”.
Main output A library of general security mechanisms and functions to secure a wired or wireless channel and a guide on how to use it.
BB category Methodology (for SW/HW development), SW component, Other
Baseline Numerous different security mechanisms and technologies exist in the IT domain. However, these mechanisms are often to heave to use in wireless networks and embedded systems.
Current TRL 4, protocols and solutions exist (IT security) but cannot directly be applied in WSNs and smart sensors
Target TRL 5-6, the developed components and the corresponding guidelines will be used to support the implementation of SCOTT prototypes and verified in testbeds