Coordinating European Future Internet Research

security and privacy

Methods and technologies for IT security incident detection and analysis

_____________________________________________________________________

SUMMARY

The overall aim of this project is to promote the integration of scientific research and the production and commercialization of research results in the IT sector. Realizing the project will involve creating new technologies that will facilitate and expedite security incidents and vulnerabilities discovery. The new technology makes it easier to investigate incidents in the prevention of detecting and to prevent potential attacks.

_____________________________________________________________________

SOLUTIONS

  • Developing a tool for T security incident detection
  • Developing new methods, skills and techniques (a form of intellectual property, some of them will be patented), which will allow knowledge and technology transfer in the form of: a) a commercial benefit from the technologies developed licensing IT outsourcing firms or removals from these firms in this generated by the project-based technologies for software development; b) increase their research potential involvement in the new EU research projects.

_____________________________________________________________________

LINK:http://www.lumii.lv/resource/show/688

_____________________________________________________________________

Back to Latvia

Tagged

MIMODeS

_____________________________________________________________________

SUMMARY

Technology scaling has reached a point at which process and environmental variability are no longer negligible. With every new technology generation the behavior of CMOS devices becomes less predictable. Process variability, aging, sensibility to radiation, etc. lead to bit flips on register-transfer level. New approaches are required which allow building reliable systems on an unreliable hardware. This project focuses its research on hardware-reliability in wireless communication systems. The team follow a cross-layer approach which exploits the mutual trade-offs of system performance, hardware reliability, and implementation complexity. Wireless systems are especially suited for this approach because they have an inherent algorithmic error resilience.

_____________________________________________________________________

SOLUTIONS

  • Developing a novel cross-layer methodology to guarantee reliable system behaviour on unreliable hardware
  • Discovering how physical defects project themselves on register-transfer level
  • Simulating bit flips on gate level and discovering their impact on the system
  • Identifying and implementing low-complexity resilience actuators

_____________________________________________________________________

LINK:http://spp1500.itec.kit.edu/286_297.php

_____________________________________________________________________

Back to Germany

Tagged , ,

PreFairAppl

_____________________________________________________________________

SUMMARY

The main focus of the project is the development of “fair” applications which preserve the privacy of the users. The concept of fairness ensures that the computations are performed in a way that recognizes the users’ individual preferences on their inputs. There are many applications for which it is highly desirable to achieve both fairness and privacy simultaneously. The project has developed two applications to demonstrate their technology: the E-Chat application, an instant massager which was developed to demonstrate homomorphic cryptography, and an iPhone app which allows two parties to negotiate the time for a meeting in a privacy-preserving manner.

_____________________________________________________________________

SOLUTIONS

  • Designing privacy-preserving multi-party reconciliation using fully homomorphic encryption
  • Developing and implementing privacy-preserving reconciliation protocols

_____________________________________________________________________

LINK:http://www.prefairappl.info/

_____________________________________________________________________

Back to Germany

Tagged

Control and verification of the complex properties of hybrid systems

_____________________________________________________________________

SUMMARY

The aim of the project is to support and extend cooperation between the Laboratory of Parallel and Distributed Systems (ParaDiSe) at the Faculty of Informatics, Masaryk University, and the research team at Hybrid and Networked Systems Lab (HyNeSs Lab) at Boston University, in order to conduct research into the control and verification of hybrid systems. Both the control and verification of continuous and hybrid systems involves the application of advanced techniques for control strategy synthesis, analysis, verification and validation.
The research team at Boston University is specialised in control of hybrid and continuous systems, namely biological and robotic systems in particular. The lab has an extensive experimental environment for the implementation and testing of suggested concepts for robot motion planning. The team at Masaryk University aims to develop formal verification problematics.

The main target of the proposed project can be divided into two areas. The first one is the formulation of new approaches for the abstraction and modelling of complex systems in order to obtain approximately accurate model of the systems, which is to be automatically verified and controlled under complex requirements. The second research area concerns the design and development of methods for the synthesis of control strategies based on principles of formal verification. Part of the research is also aimed at the usage of the new technologies for improving the efficiency of synthesis and verification process.

_____________________________________________________________________

SOLUTIONS

  • Designing the formal analysis of piecewise affine systems through formula-guided refinement
  • Producing a least-violating control strategy synthesis with safety rules
  • Developing timed automata approach to verification of systems with degradation

_____________________________________________________________________

LINK: http://paradise.fi.muni.cz/grants.html

_____________________________________________________________________

Back to Czech Republic

Tagged , ,

Privacy and Intrusion Detection in Wireless Sensor Networks

_____________________________________________________________________

SUMMARY

This project focuses its research in the following three areas: 1. The analysis of temporary changes in privacy protection requirements for Wireless Sensor Networks (WSN) and proposal for scalable privacy protection protocols reflecting the changes. 2. A proposal for a framework that enables the (semi)automatic design of optimal intrusion detection systems for particular WSNs with a particular topology, sensor nodes capabilities and threats. 3. The analysis of the methods suitable for automatic search and optimization of security-related protocols personalized for a given network technology and layout.

In each area the proposed solutions will be tested and verified in small scale, experimental WSN deployment, avoiding some of the deficiencies and limitations of simulated verification.

_____________________________________________________________________

SOLUTIONS

  • Improving intrusion detection systems for wireless sensor networks
  • Developing an adaptive security architecture for location privacy sensitive sensor network applications
  • Designing multi-objective optimization of intrusion detection systems for wireless sensor networks

_____________________________________________________________________

LINK: http://www.muni.cz/research/projects/14905

_____________________________________________________________________

Back to Czech Republic

Tagged ,

MONARCA

_____________________________________________________________________

SUMMARY

The MONARCA aims to develop and validate solutions for multi-parametric, long term monitoring of behavioural and physiological information relevant to bipolar disorder. It will combine those solutions with an appropriate platform and a set of services into an innovative system for management, treatment, and self-treatment of the disease.

The MONARCA system will be designed to comply with all relevant security, privacy and medical regulations, will pay close attention to interoperability with existing medical information systems, will be integrated into relevant medical workflows, and will be evaluated in a statistically significant manner in clinical trials.

_____________________________________________________________________

SOLUTIONS

  • Developing an eHealth monitoring system for bipolar sufferers consisting of 5 components: a sensor enabled mobile phone, a wrist worn activity monitor, a novel “sock integrated” physiological (GSR, pulse) sensor, a stationary EEG system for periodic measurements, and a home gateway
  • Combining GPS location traces, physical motion information, and recognition of complex activities (nutrition habits, household activity, amount and quality of sleep) into a continuously updated behavioural profile
  • Assessing the patient’s emotional state and mood through physiological information from the “GSR sock”, the periodic EEG measurements, voice analysis from mobile phone conversations, and motion analysis
  • Integrating patient data with medical records and established psychiatric quantitative assessment of patients condition (expressed in Psychiatric Rating Scales like BRAM or HAMD) so as to predict depressive and manic episodes
  • Closing the loop between the system and the patient with an interface for self assessment (on the basis of the above information), provision of warnings and risk profiles and a coaching concept for self treatment will be implemented

_____________________________________________________________________

LINK: http://www.monarca-project.eu/

_____________________________________________________________________

Back to EU Level

Tagged , ,

Security for Future Home Networks and Services

_____________________________________________________________________

SUMMARY

Home device and network security is an area with major research challenges and great potential for short concept-to-market cycles. Security in this space often builds on already established research trends. However, existing theoretical methods and best practices are then often applied in new innovative contexts and on new concepts leading to shortcomings in the areas of usability, ubiquity, privacy and simplification.

This project’s goal is to research and develop novel network and service security frameworks for Internet-connected devices such as smart phones, digital cameras, home hubs and Internet TVs.

_____________________________________________________________________

SOLUTIONS

  • Providing a novel security framework for home devices which is easier to use, minimising and eliminating identified security threats
  • Designing a simulation of the proposed framework for privacy and security in smart homes
  • Developing protocols to connect devices with cloud services
  • Analysing the security of remote management systems for home appliances
  • Producing a security framework for content sharing between the home and social networks

_____________________________________________________________________

LINK: http://www.oii.ox.ac.uk/research/projects/?id=78

_____________________________________________________________________

Back to United Kingdom

Tagged , ,

Informatics and Information Security Centre

_____________________________________________________________________

SUMMARY

Storing and communicating military or civil information securely is a critical service for any country or organisation. In today’s information age, it is important that the increasingly large volume of digital data and communication is stored and conducted in a trusted and secure manner.

The Informatics and Information Security Centre (TUBITAK BILGEM) seeks to ensure that information systems can supply services which ensure operations continuity, boost efficiency, and are trusted and innovative. Specifically, the centre aims to accurately analyse the security and Quality of Service requirements of informatics systems, and to select system architectures on the basis of thorough risk analyses.

The Centre doesn’t provide one−size−fits−all solutions. Instead, it offers bespoke services tailored to the security requirements of each individual public or private client.

_____________________________________________________________________

SOLUTIONS

  • Predicting the threats and vulnerabilities of the Future Internet to help build its defences before threats materialise
  • Allowing citizens to access eGovernment services securely, effectively and quickly

_____________________________________________________________________

LINK: http://uekae.tubitak.gov.tr/sid/548/pid/547/index.htm

_____________________________________________________________________

Back to Turkey

Tagged , ,

Trustworthy Cloud Storage

_____________________________________________________________________

SUMMARY

Cloud Computing offers its users centralized and inexpensive computing services, facilitating the development of large and scalable applications. Despite the advent of cloud computing, many individuals and companies are reluctant to entrust the cloud with their data.

This project identifies three “nightmare” scenarios that illustrate typical concerns and which discourage wider adoption of cloud computing services: malicious users, and low performance. In this context, the project team aims to adders these scenarios by contributing to the development of secure, verifiable and robust services for storing data on the cloud.

_____________________________________________________________________

SOLUTIONS

  • Identifying three “nightmare” scenarios for potential users of cloud computing services:
    • Malicious users who would secretly install software in the cloud servers to mine the data from commercial users to sell to competitors
    • Bugs in the cloud software stack causes data deletion actions to fail silently leaving unintentionally uploaded, incriminating data in the cloud, despite “deletion” by the user
    • Low performance of upscaled, higher-end hardware installed to facilitate a growing number of users which I then prevents
  • Inventing broadly applicable concepts that address the above scenarios through:
    • Designing a secure cloud data storage system
    • Developing unique tools that advance the state-of-the-art for profiling and validating applications running on the cloud
    • Integrating new hardware storage technologies that improve overall performance for cloud storage
    • Devising techniques to predict the performance of a cloud application
    • Creating new mechanisms that allow cloud providers to augment their infrastructure seamlessly
  • Implementing all developed concepts as part of a comprehensive prototype which will encourage cloud providers to adopt similar concepts in their commercial offerings

_____________________________________________________________________

LINK: http://p3.snf.ch/project-136318

_____________________________________________________________________

Back to Switzerland

Tagged , ,

Optimisation of Networks against Malicious Attacks

_____________________________________________________________________

SUMMARY

Contemporary society increasingly depends on complex systems such as the Internet, traffic, electrical power grids, social networks, ecological networks and so on. Due to the importance of these systems, the complex networks which are used to model them have been receiving much interest from multiple disciplines of the research community. Despite progress on several fronts, many crucial aspects of complex networks are not yet sufficiently understood. One of these aspects is the robustness of these systems to random failure and malicious attacks.

The goal of this project is to optimise model networks in a dynamical process, changing their topology in the search for robust structures which can withstand malicious attacks. The project’s applications will be of special interest to epidemiologists who want to break up disease transmission networks by targeted vaccinations and to police forces when disrupting criminal networks.

_____________________________________________________________________

SOLUTIONS

  • Utilising Monte-Carlo based optimization technique as well as novel, bioinspired optimization processes such as the evolutionary modification of populations of networks
  • Developing generally applicable methods for enhancing robustness based on the connection between the network’s topology and its resilience to malicious attacks
  • Using the tools for network optimisation to devolvop strategies for social, and in particular criminal, network disruption
  • Adopting fragmentation optimisation an inverse robustness optimisation simulation methods to develop efficient attack strategies and to learn how to immunise and protect benign networks
  • Applying the found strategies to disrupt real world criminal networks in collaboration with the federal police forces

_____________________________________________________________________

LINK: http://p3.snf.ch/project-126853

_____________________________________________________________________

Back to Switzerland

Tagged , , ,

VISION

_____________________________________________________________________

SUMMARY

The goal of the VISION project is to advance the competitiveness of the EU economy and facilitate the convergence of ICT, media and telecommunications through developing a radically improved ICT infrastructure for reliable and effective delivery of data-intensive storage services.

SICS, the Swedish ICT research institute, will lead the work on computational storage in VISION. They will provide a solution for bringing computing to storage, enabling secure execution of computational tasks in close proximity to the relevant data, applicable both to user-driven computational tasks as well as autonomous data derivation and transformation.

_____________________________________________________________________

SOLUTIONS

  • Supporting the setup and deployment of data and storage services on demand, at competitive costs, across disparate administrative domains, providing Quality of Service and security guarantees
  • Radically extending earlier generations of service infrastructures
  • Developing a cloud-based infrastructure built on open standards and new technologies, capable of the optimised delivery of converged data-intensive services
  • Using objects with metadata to support effective access and management, enabling unprecedented scalability and simplification of storage services
  • Enabling comprehensive data migration and interoperability across remote locations, overcoming current limitations
  • Introducing a technology for specifying and executing computations close to storage, reducing overheads
  • Facilitating access to data by content and its relationships, relieving applications and users from the need to be aware of the underlying storage implementation

_____________________________________________________________________

LINK: https://www.sics.se/projects/vision-virtualized-storage-services-foundation-for-the-future-internet

_____________________________________________________________________

Back to Sweden

Tagged , ,

SuMA

_____________________________________________________________________

SUMMARY

In recent years, MANET (Mobile Ad-hoc NETwork) systems have proliferated rapidly and are now used in variety of applications from the military to the environment. However, in many fields of application, the lack of fixed infrastructure, constraints on power consumption, shared communication channels and a hos to of other issues make MANET systems especially vulnerable to security threats.

This project aims to provide solutions to emerging security threats in the area of MANET systems through developing a new cross-layer detection mechanism which can deal with deal with multi-layer information

_____________________________________________________________________

SOLUTIONS

  • Performing an appraisal of current technology and methods in the area of MANET security
  • Identifying solutions to the weaknesses and vulnerabilities of current MANET security mechanisms
  • Developing new multi-detection proposals that improve the performance of currently available mechanisms
  • Implementing and evaluating autonomous reaction mechanisms which can intelligent adapt to the local environment in response to security incidents reported
  • Combining different, specific solutions to create one, integrated global solution
  • Assessing various potential solutions in an carefully designed validation and verification environment

_____________________________________________________________________

LINK: http://nesg.ugr.es/suma/

_____________________________________________________________________

Back to Spain

Tagged , ,

CONSEQUENCE

_____________________________________________________________________

SUMMARY

Over the few last years, network connectivity support in transportation systems has been one of the main research topics in computer networks engineering. Most of the research has been focused on routing mechanisms and on network mobility support, but there are still many other aspects to cover.

In this context, the CONSEQUENCE project aims to concentrate on two scenarios. The first scenario is network connectivity on trains, where high-speed trains have embedded femtocells that connect to the outside using the most suitable wireless technology at a given time, and that offer secure access to communication to the cellular phones and WiFi devices of the passengers. The second scenario is hybrid sensor and vehicular networks (HSVNs), where vehicle-to-vehicle communications and vehicle-to-roadside sensor communications are combined to obtain information about road state, weather conditions, traffic jams, crashes, potential dangers and so on, in order to improve road safety. This information must be exchanged in a secure, privacy-friendly, reliable way.

The issues in these scenarios can be grouped in four main areas:

  • Continuity of service
  • Quality of service (QoS) awareness
  • Security and identity
  • Privacy

_____________________________________________________________________

SOLUTIONS

  • Designing a bandwidth-efficient service for local information dissemination in sparse to dense roadways
  • Measuring the privacy of user profiles in Personalized Information Systems (PIS)
  • Developing a metric-based approach to assess risk for “On Cloud” federated identity management
  • Producing a dynamic framework with adaptive contention window and multipath routing for video-streaming services over mobile ad hoc networks
  • Constructing an event-driven, hybrid identity management approach to privacy enhanced e-Health

_____________________________________________________________________

LINK: http://consequence.it.uc3m.es/index.html

_____________________________________________________________________

Back to Spain

Tagged , , , , ,

SafeCity Bucharest

_____________________________________________________________________

SUMMARY

The SafeCity project aims to improve smart Public safety and security in cities. The main objective is to enhance the role of Future Internet in ensuring people feel safe in their urban surroundings. Safecity is the result of the elaboration of a vertical Use Case Scenario based on Public Safety in European cities. o study specific scenarios in key European cities to enable our capabilities in the area of Public Safety.

Bucharest is one six use cases identified by the project where research will be carried out.

_____________________________________________________________________

SOLUTIONS

  • Identifying an initial set of enablers, to provide the Public Safety smart capabilities.
  • Involving key users and public authorities at local, regional and national levels in the proposal.
  • developing smart Public Safety applications of high value.
    producing conceptual prototypes and test a preliminary open IT platform for M2M demonstrating the feasibility of urban Public Safety services.
  • Demonstrating the positive impact of these solutions on a city’s sustainable development, and developing eco-designed networks and sensors.
  • Integrating Public Safety in order to extend this implementation to the citizens’ terminals for their effective awareness.

_____________________________________________________________________

LINK: http://www.safecity-project.eu/index.php/mod.proyectos/mem.detalle/id.19/relcategoria./relmenu.3/chk.19353c5bb6e7dcf9f6f4b92d15674c81

_____________________________________________________________________

Back to Romania

Tagged , ,

ASSET

_____________________________________________________________________

SUMMARY

Emerging Internet of Things (IoT) technologies are key in the development of eHealth programmes. IoT technologies however, are vulnerable to breaches of privacy, virtual and physical attacks, and their energy-use, communications, and computation capabilities are constrained by complex security schemes. Most current security schemes render IoT infrastructure inflexible, and vulnerable to damages resulting from powerful threats.

The ASSET (Adaptive Security for Smart Internet of Things in eHealth) project aims to build risk-based adaptive security methods and mechanisms that increase which will adapt to the dynamic, changing conditions of IoT. The results enhance future e-Health solutions in Norwegian hospitals and health services

_____________________________________________________________________

SOLUTIONS

  • Duilding risk-based, dynamically adaptive security methods and mechanisms for the Internet of Things
  • Producing a case study which will lead to the design of adaptive strategies for the dynamic interplay between security and data transmissions in mobile patient monitoring systems
  • Designing systems adaptable to changing threat, usability, diversity and homogeneity conditions of the IoT, taking into account varios Quality of Service metrics
  • Verifying the necessary security and trust levels for emerging IoT e-Health applications

_____________________________________________________________________

LINK: http://www.forskningsradet.no/servlet/Satellite?c=Prosjekt&cid=1253972901191&pagename=verdikt/Hovedsidemal&p=1226993814962

_____________________________________________________________________

Back to Norway

Tagged , , ,

Secure Data Storage and Sharing in Big-data Cloud

_____________________________________________________________________

SUMMARY

Cloud Computing is becoming an increasingly popular platform for high-performance computing, supplanting large High Performance Computing (HPC) clusters and supercomputing centres. Nevertheless, some scientific applications still require special architectures available only in supercomputers.

This project aims to bridge the gap between HPC and Cloud Computing by merging Cloud Computing’s elasticity and easy resource allocation with supercomputing ‘s processing power. The scientific analysis of Big Data is one area which could benefit from such a development. The project will utilise interdisciplinary technology and methods to meet various challenges arising from this objective such as the security and privacy of the stored data, the efficiency of the processing algorithms, and the management of the infrastructure.

_____________________________________________________________________

SOLUTIONS

  • Combining Cloud Computing’s elasticity and efficient resource allocation with supercomputing ‘s processing power to create secure and efficient Big Data storage
  • Producing secure and efficient storage and sharing schemes for Big-data cloud-computing activities through the application of interdisciplinary technologies and methodologies such as cryptology and trusted computing

_____________________________________________________________________

LINK: http://www.forskningsradet.no/servlet/Satellite?c=Prosjekt&cid=1253987157734&pagename=verdikt/Hovedsidemal&p=1226993814962

_____________________________________________________________________

Back to Norway

Tagged , ,

Forum for Research and Innovation in Security and Communications

_____________________________________________________________________

SUMMARY

FRISC, the Forum for Research and Innovation in Security and Communications, is a network established by the VERDIKT programme to create synergies within the Norwegian Security and Communications ecosystem. The Forum will provide strategic suggestions and advice for policy research in information security. This will contribute to the creation of new innovative products and services, which can then be developed and marketed by the relevant stakeholders.

_____________________________________________________________________

SOLUTIONS

  • Establishing forums and creating dialogue between researchers, industry and public organizations in the area of security and communications

  • Contributing to innovation at every link of the value chain through providing advice and policy leadership

_____________________________________________________________________

LINK: http://www.forskningsradet.no/servlet/Satellite?c=Prosjekt&cid=1253968860795&pagename=verdikt/Hovedsidemal&p=1226993814962

_____________________________________________________________________

Back to Norway

Tagged ,

RASTER

_____________________________________________________________________

SUMMARY

Telecommunication has become a complex amalgam of many interdependent service and network providers and an integral part of contemporary society. A problem thus arises for critical infrastructure providers in accurately assessing the effectiveness of their continuity programmes. In this context, the Raster project seeks to develop a methodology for the risk assessment of large-scale telecommunication services.

_____________________________________________________________________

SOLUTIONS

  • Developing a risk assessment method based on a simplified model of the transmission, switching, and supporting elements of a telecommunications service
  • Refining the risk assessment model iteratively until all relevant risks can be analysed

_____________________________________________________________________

LINK: http://www.utwente.nl/ewi/is/research/raster.doc/

_____________________________________________________________________

Back to The Netherlands

Tagged , , ,

MITER

_____________________________________________________________________

SUMMARY

From the viewpoint of software engineering, ensuring confidence in implemented security mechanisms is a key objective. As such, it is vital that the IT industry constantly improve the design and implementation process of software security.

In this context, the MITER project aims to devise a security model which will accurately identify security concerns, present these concerns from a business perspective and test itself against agreed security requirements. These three aims will converge in an integrated, model-driven security process which can be embedded within a standard business model making security concerns heuristically identifiable and removable.

_____________________________________________________________________

SOLUTIONS

  • Proposing a portfolio of well-defined security models, classified in terms of their structural and behavioural aspects, without considering a specific target business model
  • Automatically composing a subset of selected security models, specified according to the target business model, to obtain a new business model augmented according to the security specifications
  • Heuristically validating and verifying the developed security model before final implementation

_____________________________________________________________________

LINK: https://sites.google.com/site/jacqueskleinwebpage/grants/miter

_____________________________________________________________________

Back to Luxembourg

Tagged ,

CoPAInS

_____________________________________________________________________

SUMMARY

The increasing pervasiveness of Internet of Things technology means that our environments are increasingly becoming Ambient Intelligence Systems – “intelligent spaces” in which Smart objects such as environmental sensors are able to adapt to changes in context and to users’ social needs.

The CoPAInS project seeks to solve two problems arising from the proliferation of Ambient Intelligence Systems: the need to preserve users’ privacy and the desirability of cultivating a trusting or “convivial” relationship between humans and devices.

_____________________________________________________________________

SOLUTIONS

  • Utilising Knowledge Representation & Reasoning techniques to develop a formal framework for context representation, privacy and conviviality
  • Validating and verifying the privacy and conviviality properties of Ambient Intelligence systems using model-checking techniques
  • Simulating and testing use cases from the field of Ambient Assisted Living
  • Producing guidelines to assist system designers in the development of privacyaware and convivial “assistive systems”.

_____________________________________________________________________

LINK: http://www.fnr.lu/en/Research-Programmes/Research-Programmes/Projects/Convivialty-and-Privacy-in-Ambient-Intelligence-Systems-CoPAInS

_____________________________________________________________________

Back to Luxembourg

Tagged , ,

SeSaNet

_____________________________________________________________________

SUMMARY

The SeSaNet project seeks to address security risks arising from the increasing levels of unauthorised access given to critical networked control systems (NCS). Hence, the objective of the project is to design secure and safe NCS so as to improve the security of large-scale critical infrastructures. Specifically, the main focus of this project is to investigate how cyber attacks manipulate control algorithms and systems as well as safety-critical physical processes.

_____________________________________________________________________

SOLUTIONS

  • Investigating how cyber attacks manipulate control algorithms and systems
  • Designing of secure and safe networked control systems
  • Combining all safety and security issues to an integrated approach
  • Using fault-tolerant control (FTC) to detect and isolate faults in network components during runtime
  • Adapting the control algorithm to keep the controlled physical process in a desired state even if faults occur

_____________________________________________________________________

LINK: http://www.fnr.lu/en/Research-Programmes/Research-Programmes/Projects/Integrated-Security-and-Safety-Engineering-for-Networked-Control-Systems-SeSaNet

_____________________________________________________________________

Back to Luxembourg

Tagged ,

DYNOST

_____________________________________________________________________

SUMMARY

The DYNOST project focuses on the security of the Android software stack. The goal of the project is to develop dynamically adaptive security systems which modify their behaviour and structure according to an adaptation logic in response to changes in their surrounding environment. Currently, the project team is working on developing tools for in-vivo security analysis for smartphones.

_____________________________________________________________________

SOLUTIONS

  • Proposing a fault model for adaptation logics which classifies faults into environmental completeness and adaptation correctness
  • Expressing the underlying concepts behind adaptation logic in a meta-model
  • Developing a static analysis tool which computes the appropriate permission set for an Android application by analysing its byte-code

_____________________________________________________________________

LINK: https://sites.google.com/site/servalteam/projects/dynost

_____________________________________________________________________

Back to Luxembourg

Tagged , ,

The Knowledge Discovery and Data Mining Laboratory

_____________________________________________________________________

SUMMARY

The Knowledge Discovery and Data Mining Laboratory (KDD LAB) is a joint research initiative of ISTI and the Computer Science Department of the University of Pisa.

The objective of the research unit is the development of theory, techniques, and systems for extracting and delivering useful knowledge out of large masses of data. Within this area, the mission of the lab is to pursue fundamental research, strategic applications and higher education in the areas of mobility data mining, privacy aware data analysis and social network analysis.

_____________________________________________________________________

SOLUTIONS

  • Investigating methods to extract meaningful knowledge from large amounts of behavioural data
  • Defining techniques for an advanced, semantic-rich, knowledge discovery process
  • Providing an entirely new and highly detailed spatial-temporal microsimulation methodology for human mobility, grounded in Big data
  • Using the M-Atlas system on Orange GSM data to extract human mobility models

_____________________________________________________________________

LINK: http://www-kdd.isti.cnr.it/

_____________________________________________________________________

Back to Italy

Tagged , ,

Security for Mobile Devices

_____________________________________________________________________

SUMMARY

Security for Mobile Devices is a research group of the CNR’s Institute for Informatics and Telematics. The group seeks to address problems relating to the privacy protection and security systems of smart, mobile devices.

_____________________________________________________________________

SOLUTIONS

  • Developing a novel framework of autonomic intrusion detection over unlabeled HTTP log streams
  • Designing a client-aware reputation system for e-services
  • Enhancing Java ME security support with resource usage monitoring

_____________________________________________________________________

LINK: http://www.iit.cnr.it/en/research_activities/security-mobile-devices

_____________________________________________________________________

Back to Italy

Tagged , , ,

Secure Communication and Computing Group

_____________________________________________________________________

SUMMARY

The Secure Communication and Computing group at Bar-Ilan university aims to conduct research at the leading edge of ICT security. The research team is multi-disciplinary and aggregate research covers a vast array of domains and areas.

_____________________________________________________________________

SOLUTIONS

Areas of study include:

  • Network security, especially Internet protocols, TCP/IP, DNS, routing, Denial-of-Service, spam
  • Applied cryptography, especially resiliency to exposures, cryptanalysis, side-channels etc
  • Privacy, anonymity and covert communication, including defences and attacks
  • Cyber-security, mainly malware communication and detection
  • Usable security and social-engineering attacks including phishing
  • Financial cryptography
  • Trust management

_____________________________________________________________________

LINK: http://www.cs.biu.ac.il/en/node/808

_____________________________________________________________________

Back to Israel

Tagged

ILIas

_____________________________________________________________________

SUMMARY

Due to the increasing frequencies of natural disasters as well as potential terrorist attacks, the protection of critical infrastructures from natural and man-made catastrophic events has become a central challenge. However, as the scale complexity and mutual interdependence these critical infrastructures grows, finding solutions becomes more and more challenging. Furthermore, new technology paradigms such as All-IP networks and Smart Grid functionality blur the classical domain boundaries and facilitate novel attack types.

The ILIas project will develop intelligent solutions for protecting critical infrastructures that provide electricity and telecommunication services to the general public. These solutions will be scalable and reconcile the need for fast automated reaction with manual supervision for highly critical decisions.

_____________________________________________________________________

SOLUTIONS

  • Protecting critical societal infrastructures through leading edge ICT
  • Developing a flexible peer-to-peer-based distributed management system to provide a robust and fault tolerant foundation for the network analysis and administration functionalities
  • Ensuring data availability and system control in case of different network failures until overall control can be re-established
  • Designing models for simulating attack scenarios and evaluating the efficiency of protection mechanisms in large-scale networks

_____________________________________________________________________

LINK: http://www.gt-arc.com/projects/ilias/

_____________________________________________________________________

Back to Germany

Tagged , , ,

Coeur de Filiére Numerique

_____________________________________________________________________

SUMMARY

“Coeur de filiére numerique” is an initiative launched in April, 2013 by the French Ministry of Crafts, Commerce and Tourism under the new guidelines of the Future Investment Programme. The initiative, funded to the tune of €150 million by the ministry, sets out to support and develop four key technologies: embedded software and connected objects, the security of information, supercomputing and simulation systems, and cloud computing and Big Data.

_____________________________________________________________________

SOLUTIONS

  • Funding research and development in four key areas with many applications:
    • Transport and mobility
    • Health
    • Digital cities
    • Logistics and distribution
    • Robotics
    • Energy
    • Automation and industrial processes
  • Creating a new innovation ecosystem structured around key technological developments and applications

_____________________________________________________________________

LINK: http://www.entreprises.gouv.fr/secteurs-professionnels/coeur-filiere-du-numerique

_____________________________________________________________________

Back to France

Tagged , , , , , , ,

RE2EE

_____________________________________________________________________

SUMMARY

This project aims to develop a greater quality of security and trust management for the Future Internet, safeguarding end-users from unwanted and potentially harmful internet traffic.

The application of RE2EE’s technology would mean that routing in customer networks or traversal of the customer edge has no impact on routing in the core network because packets are tunneled over the core. The architecture thus separates customer from core networks.

Besides its defensive use in security and trust applications, the project proposes to create an offensive system of trust management for the global Internet. The objective of Internet wide trust management is to render uninvited, harmful and invasive traffic non-viable as a business model.

_____________________________________________________________________

SOLUTIONS

  • Developing a future Internet architecture which separates end to end communication from packet forwarding in the core network.
  • Deploying Ethernet in the core network as a packet transport technology
  • Improving scalability in terms of power consumption compared to using IP end to end

_____________________________________________________________________

LINK: http://www.re2ee.org/

_____________________________________________________________________

Back to Finland

Tagged ,

Cloud Software Programme (Tivit)

_____________________________________________________________________

SUMMARY

The Cloud Software programme aims to significantly improve the global competitive position of the software-intensive, Finnish industry in the areas of operational efficiency, user experience, web software, open systems, security engineering and sustainable development. As software becomes increasingly web-based, cloud software is fasting becoming one a basic infrastructure of the future internet. The Cloud Software Programme especially aims to pioneer in building new cloud business and lean software enterprise models as well as developing innovative open cloud software infrastructure.

_____________________________________________________________________

SOLUTIONS

Cloud Technologies:

  • Collecting a compilation of best practices for cloud computing
  • Developing a toolbox for cloud computing application development
  • Building a cloud demonstration environment
  • Defining guidelines for openness in the cloud
  • Developing sample applications that benefit from cloud computing and content mashupping

Lean Software Enterprise

  • Developing a framework for applying the lean principles towards an enterprise transformation.
  • Conducting Lean Enterprise Transformation. Making lean applicable in cloud software organizations.
  • Scaling Agile Software Development. Perfecting & automating the cloud software R&D engine.
  • Developing Integrated Software R&D Approaches. Seeking for competitive edge.

Superior User Experience

  • Creating a common UX framework that supports the overall objectives of the cloud SW research and development:
    • Cloud computing and Web services with excellent UX
    • Better security with improved UX
    • Market success of green SW with good UX
  • Developing, through industrial case studies, efficient and integrated methods and tools for UX design and evaluation, including SW development tools that provide good UX both for end users and developers
  • Providing tools for using UX as a business factor by development of measures and tools to communicate UX to decision makers

Cloud Security

  • Producing a feasible Secure Development Lifecycle methodology supporting agile and lean SW development, and
  • Designing vulnerability, complexity and robustness management and risk-driven security metrics methodologies and tools that help developers to achieve adequate security, trust, dependability and privacy goals cloud computing environment.

_____________________________________________________________________

LINK: http://www.cloudsoftwareprogram.org/

_____________________________________________________________________

Back to Finland

Tagged , , , ,

eMedic

_____________________________________________________________________

SUMMARY

This project aims to develop new practices for teleconsultation between patients and medical professionals. The team will develop a model in which IT plays a central role in providing secure and innovative work methods, cooperation and know-how sharing. The growing trend of teleconsultation sets a demand for virtual and secure data sharing in providing and also consuming clinical e-Health services.

_____________________________________________________________________

SOLUTIONS

  • Meeting the demand for virtual and secure data sharing in the provision of clinical e-Health services.
  • Developing a framework for IT mediated communication between patient and medical professional

 

_____________________________________________________________________

LINK: https://www.etis.ee/portaal/projektiAndmed.aspx?DropDownListAreaOfStudy=4&IsDetailSearch=True&DropDownListFinanceProgramCode=0&DropDownListProjectStatus=1&CheckBoxExactSearch=False&VID=5b559c4d-42d9-4994-a4b3-b9d6529fd6d6&DropDownListSpeciality=7&lang=en&FromUrl0=projektiInfo.aspx

_____________________________________________________________________

Back to Estonia

Tagged , ,

CITH

_____________________________________________________________________

SUMMARY

The overall goal of the CITH project to contribute to a safe and secure life of chronic heart failure patients with Implantable cardioverter-defibrillator’s (ICDs) through improved IT-supported communication and collaboration between all involved parties. CITH will advance the conceptual and practical understanding of how to model, develop and implement socio-technical IT solutions for communication and collaboration within heterogeneous and distributed healthcare networks.

_____________________________________________________________________

SOLUTIONS

  • Applying an explorative, experimental and interventionist approach within an overall participatory design research strategy involving health professionals, patients and relatives
  • Examining the feasibility of the existing ICD telemonitoring system
  • Developing IT applications and services, through iterative prototyping and testing in real life situations, to support communication and collaboration across organizational and professional boundaries and between patients’ homes and the hospitals.

_____________________________________________________________________

LINK: http://www.cith.dk/

_____________________________________________________________________

Back to Denmark

Tagged , ,

SmartOSN (Smartphones Meet Online Social Networks)

_____________________________________________________________________

SUMMARY

The SmartOSN project will investigate and solve arising challenges for social network applications on mobile network infrastructures.

_____________________________________________________________________

SOLUTIONS

  • The project will develop solutions in several areas such as:
    • Information dissemination
    • Privacy
    • Resource allocation
    • Emerging collaborative applications.

_____________________________________________________________________

LINK: http://itu.dk/en/Forskning/Forskningsprojekter/SmartOSN

_____________________________________________________________________

Back to Denmark

Tagged , , ,

SoloMIDEM

_____________________________________________________________________

SUMMARY

A major challenge facing mobile application providers is to provide highly targeted, context-rich communications that do not harm the confidence and trust of the users, while allowing a diverse range of stakeholders to fully harness the generated data. The SoloMIDEM project seeks to develop solutions to meet this challenge.

The project’s goal is to maximise information flow in the social, mobile application value chain between end users and content providers through fostering a culture of trust and privacy which will make consumers more comfortable in proving pertinent information.

_____________________________________________________________________

SOLUTIONS

  • Developing of a user-centric federated identity management solution, in which the user manages how and when his mobile identity is shared with different application providers.
  • Exploring cryptographic means to ensure location privacy and investigation of the trade-off between Quality of Experience of location based services and the corresponding level of privacy protection.

_____________________________________________________________________

LINK: http://www.iminds.be/en/research/overview-projects/p/detail/solomidem

_____________________________________________________________________

Back to Belgium

Tagged , , ,

MOSES 3

_____________________________________________________________________

SUMMARY

This project aims to conceptualise and develop a quantitative method which will support organisations in making complex, multi-variable decisions in confronting information security threats. The proposed method is based on a framework that comprises ontological modeling of security knowledge, dynamic attack tree generation techniques, stochastic attack simulation, meta-heuristic identification of efficient portfolio and interactive decision support.

_____________________________________________________________________

SOLUTIONS

  • Designing a holistic evaluation and optimization method for examining the total effectiveness of all implemented safeguards
  • Incorporating into the method design an account of the given organisation’s information infrastructure, information assets and the threat sources
  • Relying on and developing heavyweight ontologies to represent detailed security knowledge and harness that knowledge through automated reasoning

_____________________________________________________________________

LINK: http://www.fwf.ac.at/en/abstracts/abstract.asp?L=E&PROJ=P23122

_____________________________________________________________________

Back to Austria

Tagged

FIT-IT Programme

_____________________________________________________________________

SUMMARY

FIT-IT is an Austrian research programme that focuses on high-quality research in the area of information and communication technology. Currently, there are five programme lines: “embedded systems”, “semantic systems and services”, “systems-on-chip”, “trust in IT-systems” and “visual computing”. The programme receives over €15 million funding from the Austrian government every year.

_____________________________________________________________________

SOLUTIONS

 

  • Embedded systems:
    • Developing Rapid prototyping (with “hardware in the loop”) and formal verification and design validation processes
    • Integrating input-output streams for sensor-actuator technologies
    • Creating capacities for interoperability and dynamic reconfiguration within systems
    • Managing scarce resources
  • Semantic systems:
    • Simplifying conditions for human-computer interaction
    • Designing a a simplified co-complex web-based service which connects syntactically and semantically similar elements in different information systems to allow for superior data content
  • Systems on chip:
    • Investigating Sub-micron Technology and mixed analog and digital systems
    • Managing the complexity in design and design methodology
    • Assuring quality from design to system
  • Trust in IT:
    • Designing secure network protocols and operating systems from the ground up, improving on current ad-hoc security systems
    • Developing new cryptology methods
    • Creating technologies for privacy and identity management, especially in the area of mobile communication applications

_____________________________________________________________________

LINK: http://www.fit-it.at/english/index.html

_____________________________________________________________________

Back to Austria

Tagged , , ,

G-Lab

_____________________________________________________________________

SUMMARY

The G-Lab project aims at the development of future Internet technologies which overcome the challenges posed by new Internet applications with high demands on the Internet infrastructure. For that purpose it relies on both experimentation and theoretical research work in a complementary manner.

The G-Lab consists of a Germany-wide research and experimental facility used to investigate the interplay between new technologies and the requirements of emerging applications. The BMBF funded project consists of 32 partners. The first phase started in October 2008 with six partners and runs for three years. The second phase started in September 2009 and consists of nine additional research projects. The G-Lab experimental facility is composed of wired and wireless hardware with over 170 wired nodes which are fully controllable by the G-Lab partners.

_____________________________________________________________________

SOLUTIONS

  • Designing a Topology Management Tool (ToMaTo)
  • Developing Multi-Hop Packet Tracking
  • Promoting ICT standardisation – This solution comprises in particular the activities of Nokia-Siemens Networks, Alcatel-Lucent, Qualcomm, and NTT DOCOMO on the standardization within 3GPP, IETF, IRTF, ONF.

_____________________________________________________________________

LINK: http://www.german-lab.de

_____________________________________________________________________

Back to Germany

Tagged , , , ,

UMA

_____________________________________________________________________

SUMMARY

The proliferation of social networking has thrown up challenges for the internet community in terms of guaranteeing end user’s safety and privacy on the web.

The User-Managed Access (UMA) project seeks to develop a protocol that enable will individuals to authorise who and what can get access to their online personal data, content , and services through a unified control point. At this control point, a user can set policy that ensures that only requesters meeting a given set of criteria can succeed in gaining access to their personal data.

UMA can apply to a wide variety of sharing scenarios, such as sharing social data and calendars with friends, sharing health data securely with medical professionals, giving contract bookkeepers access to small-business financial data, and offering photos for sale. An international team of computer industry professionals, web service providers, and researchers has been involved in designing and implementing the draft UMA specifications.

_____________________________________________________________________

SOLUTIONS

 

  • Designing a web protocol specification with initial version and updates submitted to the Internet Engineering Task Force (IETF) for consideration
  • Conducting interoperability testing on four specific implementations, including Java and Python implementations
  • Engaging stakeholders to implement the UMA outputs to solve a variety of selective-sharing scenarios

_____________________________________________________________________

LINK: http://kantarainitiative.org/confluence/display/uma/Home

_____________________________________________________________________

Back to United Kingdom

Tagged , , , ,

EnCoRe

_____________________________________________________________________

SUMMARY

The EnCoRe project seeks to develop innovative technological mechanisms to enable and simplify the process of granting and revoking consent for the storage and use of personal data.

The project will develop news technologies and methodologies for the use, storage, location and sharing of data. The project will also explore and experiment with a holistic legal and regulatory framework for consensual data storage

The project will also make use of different scenarios to identify potential problems in areas such as social networks, e-government, and the internal structures of organisations.

_____________________________________________________________________

SOLUTIONS

  • Enabling business to adopt scalable, cost effective and robust consent and revocation methods for controlling the use, storing, locating and sharing of personal data
  • Providing meaningful, intuitive mechanisms by which individuals can control the use of their personal information held by others
  • Restoring and safeguarding confidence in the digital economy
  • Complementing the new regulatory environment and meet the data protection requirements of business

_____________________________________________________________________

LINK: http://www.encore-project.info/index.html

_____________________________________________________________________

Back to United Kingdom

Tagged , , ,

Sematic Monitoring of the Cyberspace

_____________________________________________________________________

SUMMARY

Public and private enterprises and service-providers continuously analyse their environment in search of threats and risks to their business model, work practices and customer-base. Many such threats manifest themselves on the internet – on forums, blogs and portals.

This project aims to help rectify the scarcity of security tools available to sift through vast amounts of web documents and detect risks or threats to a given service-provider or enterprise. The project team will develop a prototype method to automatically web-based threats. 

_____________________________________________________________________

SOLUTIONS

  • Developing a method and prototype of a security system for integrating data and semi-structured information on security threats from various sources on the Web.

  • Increasing the availability of security tools providing protection from web-based threats to public and entities

_____________________________________________________________________

LINK: http://smc.kie.ue.poznan.pl

_____________________________________________________________________

Back to Poland

Tagged , , , ,

NDIX

_____________________________________________________________________

SUMMARY

NDIX an open platform which seeks to facilitate competition, innovation and the development of new digital services by offering unlimited and secure connectivity between content suppliers and end-users.

As a result, NDIX aims to:

  • Boost competition between suppliers of existing services (like Internet, telephony and hosting/backup)
  • Facilitate the development of new services (for learning, security, healthcare, public services, in the cultural, social, entertainment and creative sectors)
  • Promote investment in new broadband infrastructures.

_____________________________________________________________________

KEY OUTPUTS/RESULTS

  • Offering flexible and concurrent use of  many different services
  • Creating a critical mass of users for new service development
  • Stimulating innovation

_____________________________________________________________________

LINK: www.ndix.net

_____________________________________________________________________

Back to The Netherlands

Tagged , , , , , , , ,

T-City Szolnok

_____________________________________________________________________

SUMMARY

T-City is a long-term innovation and development collaboration between Magyar Telekom NyRt and the city of Szolnok. Through the initiative, the citizens, companies and institutes of Szolnok can test the new services and products of Magyar Telekom NyRt, and they can discover the advantages of the internet based information society.

_____________________________________________________________________

SOLUTIONS

  • Creating a Digital City which will provide new solutions for citizens, employees, students, city services.
  • Testing new ICT services and products under real circumstances together with the citizens and small/medium enterprises.
  • Narrowing the Digital Divide

_____________________________________________________________________

LINK: www.t-city.hu

_____________________________________________________________________

Back to Hungary

Tagged , , , , , ,

G-Lab Deep

_____________________________________________________________________

SUMMARY

G-Lab DEEP explores innovative composition-approaches for cooperation between network and application level services with the focus on security in the Future Internet. The main focus of the research is the secure exposure, interaction and composition of future network capabilities with services from the web, telecommunication and business process world. This Future Internet approach builds upon a cooperative network and service monitoring security approach to detect, prevent and mitigate network and service level attacks. G-Lab DEEP utilizes a federation approach to make resources from heterogeneous testbeds, networks and domains available within the cross-layer, cross-domain composition approach.  The German Future Internet testbed platform G-Lab is used and extended for the evaluation of the developed concepts.

_____________________________________________________________________

SOLUTIONS

  • Developing a Secure Network & Service Level on demand composition based on requirements of application
  • Securing the Future Internet through cooperative Network and Service Level Monitoring and Attack Mitigation
  • Designing  a Wide-Scale Federation of heterogeneous resources from different testbeds, networks, domains

_____________________________________________________________________

LINK: http://www.g-lab-deep.de/

_____________________________________________________________________

Back to Germany

Tagged ,