Fail-operation clock synchronization methodology

 Coordinated by
TTTech

Synchronization loss can occur due to many reasons, either because of a device or link failure or due to a targeted attack on the reference node, which supplies the corrected time to the network’s nodes.

Description

Describe the innovation content of the result:
Synchronization loss can occur due to many reasons, either because of a device or link failure or due to a targeted attack on the reference node, which supplies the corrected time to the network’s nodes.
Who will be the customer?
OEMs, Tir1, Tire2
What benefit will it bring to the customers?
enhanced robustness of the system
When is the expected date of achievement in the project (Mth/yr)?
At the end of the project, we will have a prototype
When is the time to market (Mth/yr)?
2-3 years after the project end
What are the costs to be incurred after the project and before exploitation?
N/A
What is the approximate price range of this result/price of licences?
The plan is to integrate the methodology in our product line for the middleware and Electronic Control Unit (ECU) controller and keep sell it as integration package.
What are the market size in Millions € for this result and relevant trend?
N/A
How will this result rank against competing products in terms of price/performance?
We follow the standard that has been accepted by our customer. We are planning to extend the BIECO results and integrate it in the different product line.
Who are the competitors for this result?
Other security and test provider
How fast and in what ways will the competition respond to this result?
We are estimating that creating similar solution will take at least three years.
Who are the partners involved in the result?
TTTech
Who are the industrial partners interested in the result (partners, sponsors, etc.)?
N/A.
Have you protected or will you protect this result? How? When?
Research publications are provided along the way of the concept development and its validation.

Other results

ResilBlockly

This exploitation result consists in cybersecurity consultancy services supported by ResilBlockly (former Blockly4SoS), a Model-Driven Engineering tool that has been developed in the context of BIECO.

Security evaluation methodology

Security evaluation methodology to evaluate the security of an ICT system. The methodology is based on standards such as ISO 31000 standard for Risk Management, the ISO 29119 standard for Security Testing or the MUD standard…

Monitoring Tool

The monitoring tool is an infrastructure in charge of setting up and managing a monitoring component. It is based on event messages and enables the collection of complex events.

Extended MUD file

The extended Manufacturer Usage Description (MUD) file is an extension of the MUD Internet Engineering Task Force (IETF) standard…

BIECO Project

SUBSCRIBE and become part of the BIECO community!

We don’t spam!

Share This