BIECO Impact: The project concept is designed to provide benefits for industrial partners on both short and long term. On short term, the industrial partners will receive innovative technologies and set of methods/tools to support security and resilience within their supply chains; on the long term, the functionality of the technologies will be applicable to build new secure and resilient ecosystems, opening new business possibilities.
Barcelona IOT Solutiona World Congress - Day 2
Barcelona IOT Solution World Congress - Day 1
BIECO onsite meeting – Barcelona - January 2023Discussions about the integration of the 3 use cases.
CISIS 2022 15th International Conference on Computational Intelligence in Security for Information Systems International Joint Conferences SOCO-CISIS-ICEUTE-HAIS 2022 Proceedings CISIS ICEUTE...
Once the secure communication with a vehicle has been demonstrated for remote FW update, it is straightforward to extend it to general Service-Over-the-Air architecture and even further.
Securing remote and in-vehicle communications against cyber-attacks, possibly performed with quantum computers in the near future, is a major goal in the automotive sector. For such a purpose I-FEV focused on a thorough study and an architecture and protocol design to develop and implement a Service Over the Air (SOtA )system, starting from Electronic Control Unit (ECU) firmware update on its electric vehicles from remote.
Simulate the real time communication for the distributed based on the Time sensitive network simulation. Additionally, simulate the fail-operation clock synchronization methodology. This simulation will validate the communication stack.
The domain specific language enables specification of digital twin behaviour in a manner that can enable a predicted evaluation of its trustworthy behaviour in a simulated environment.
GdpR-based cOmbinatOrial Testing (GROOT) is a general combinatorial strategy for testing systems managing GDPR’s concepts (e.g., Data Subject, Personal Data or Controller).
The monitoring tool is an infrastructure in charge of setting up and managing a monitoring component. It is based on event messages and enables the collection of complex events.
The extended Manufacturer Usage Description (MUD) file is an extension of the MUD Internet Engineering Task Force (IETF) standard. The MUD specification’s major goal is to limit the threat and attack surface of a certain IoT device by allowing manufacturers to establish network behaviour profiles for their devices. Each profile is built around a set of policies, or Access Control Lists (ACLs), that specify the communication’s endpoints.