SHIELD improved technologies. On the light of the above concepts, from the SHIELD perspective, Security Privacy and Dependability are related to each layer and controlled by means of an overlay using proper metrics. The SPD levels needed by specific applications are achieved composing SPD technologies. Even though interoperability and composability of state of the art SPD technologies will be itself a result of paramount value, the holistic vision perceived by SHIELD leads furthermore to include in the framework the development of innovative SPD technologies as requested by the market In the following table an outline is given on how Security, Privacy and Dependability are realized improving specific SPD features and technologies that will be detailed in Section 2.2. Layer Features & Technologies Node This layer provides SPD intrinsic capabilities at node level through the creation of an intelligent hardware and software platform consisting of different kinds of intelligent ES Nodes. - TPM and Smartcard - Asymmetric cryptography for low cost nodes - Intrinsically secure ES firmware - Automatic Access Control - Asymmetric cryptography for low cost nodes - Power Supply Protection - Self-re-configurability and self-recovery of sensing and processing tasks Network This layer designs and implements a secure, trusted, dependable and efficient data transfer for network centric sensible applications. - Reputation-based schemes for secure routing and intrusion detection - Reputation based Secure Resource Management Procedures at transmission level - Anonymity and Location-privacy techniques - Dependable authentic key distribution mechanisms - Waveform-agile and reliable transmission methodologies - Distributed self- management and self- coordination schemes for unmanaged and hybrid networks Middleware This layer designs and implements secure resource management techniques, se- cure service management functionalities, lifecycle sup- port and highly-dependable interfaces. - Secure Resource Management Procedures at middleware level - Secure service discovery, composition and delivery protocols - Secure Offline Authentication with mobile devices Overlay This layer includes the so- called security manager; each manager controls a given ES. - Semantic representation of the security knowledge domain - Semantic representation of the privacy knowledge domain - Semantic representation of the dependability knowledge domain
Appears in 3 contracts
Sources: Grant Agreement, Grant Agreement, Grant Agreement