BB category
|
SCOTT:Methodology for SW/HW development +
, SCOTT:SW component +
, Service +
, Profile +
, Interface +
, Standard +
, Process +
|
Baseline
|
Security in IoT applications has not been … Security in IoT applications has not been addressed in full extent. Current solutions are vendor specific and mainly target encryption at the application level. This gap will be filled by this building block, providing a complete assessment of potential vulnerabilities that will lead to convenient security enforcing mechanisms. convenient security enforcing mechanisms. +
|
Current TRL
|
TRL 3 +
|
Description
|
Design a reference architecture that will allow for a convenient infrastructure design and the analysis of security threats in different levels of such architecture +
|
Lead partner
|
ISEP +
|
Leader
|
Ramiro Robles +
|
Main output
|
The main output is a full modelling and an … The main output is a full modelling and analysis of security threats for different levels, interfaces and entities of the infrastructure. This will allow us to design security enforcing mechanism in a robust manner, not only at the application level, but across all layers, entities and interfaces of the infrastructure and architecture.es of the infrastructure and architecture. +
|
Page Title
|
BB26.D Infrastructure design and security threat analysis +
|
Partner
|
ISEP +
|
Target TRL
|
TRL 6 +
|
Technology Line
|
SCOTT:Reference Architecture/Implementation +
|
Title
|
Infrastructure design and security threat analysis +
|
Workpackage
|
SCOTT:WP12 +
, SCOTT:WP16 +
|
Creation dateThis property is a special property in this wiki.
|
19 June 2017 08:14:40 +
|
Categories |
Building Block +
|
Modification dateThis property is a special property in this wiki.
|
13 July 2017 17:51:56 +
|