{"id":9377,"date":"2022-01-18T14:22:10","date_gmt":"2022-01-18T14:22:10","guid":{"rendered":"https:\/\/msecproject.eu\/?page_id=9377"},"modified":"2024-07-08T12:18:32","modified_gmt":"2024-07-08T12:18:32","slug":"github","status":"publish","type":"page","link":"https:\/\/msecproject.eu\/ja\/github\/","title":{"rendered":"Github"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text css=&#8221;&#8221;]<span style=\"font-weight: 400;\">M-Sec project provides a secure end to end framework based on advanced techniques, methods, and design as well as operating principles that minimize the risk of suffering from critical vulnerabilities in the IoT ecosystem. The project offers tools and components, most of them open source,\u00a0that protect IoT devices from malware through intrusion detection mechanisms and vulnerability detection systems, authentication of parties, encryption of data, attestation of devices, anonymization of data sources, personal data removal contained in images or streaming videos using, secure data storage combining onchain and offchain thanks to the use of blockchain, as well as mechanisms to analyze security requirements\u00a0and eliminate both human errors in designing application logic along with a wide number of tests performed to verify the security level, and more.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">On top of the M-Sec framework, and in order to validate the technological and secure components developed, the consortium has built new IoT applications that have been tested across two smart cities; Fujisawa and Santander, each recognized having already developed a long-term smart city approach.\u00a0<\/span>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][g5plus_heading sub_color=&#8221;accent-color&#8221; underline=&#8221;true&#8221; align=&#8221;text-center&#8221; css_animation=&#8221;flipInX&#8221; title=&#8221;M-Sec Architecture&#8221; css=&#8221;.vc_custom_1642679637609{padding-top: 40px !important;}&#8221; el_class=&#8221;full width&#8221;][vc_column_text css_animation=&#8221;zoomIn&#8221; css=&#8221;.vc_custom_1642686460928{margin-top: 18px !important;}&#8221;]<\/p>\n<div class=\"msec_out\">\n<div id=\"msec_lay1\" class=\"msec_hl\"><\/div>\n<div id=\"msec_lay2\" class=\"msec_hl\"><\/div>\n<div id=\"msec_lay3\" class=\"msec_hl\"><\/div>\n<div id=\"msec_lay4\" class=\"msec_hl\"><\/div>\n<div id=\"msec_lay5\" class=\"msec_vl\"><\/div>\n<div id=\"msec_l1\" class=\"msec_keyLaPos msec_c0 msec_l1\">Application<br \/>\nLayer<\/div>\n<p><!--\n\n\n<div id=\"msec_keyl1\" class=\"msec_keyCoPos\"><b>Application layer<\/b> defines all the use the IoT technology or in\nwhich IoT has deployed<\/div>\n\n\n--><\/p>\n<div id=\"msec_l1a1\" class=\"msec_comp msec_c1 msec_l1\">Eclipse<br \/>\nsensiNact Studio TRL 7<\/div>\n<p><!--\n\n\n<div id=\"msec_keyl1a1\" class=\"msec_keyCoPos\"><b>Eclipse sensiNact Studio<\/b>\nSensiNact is designed to allow platforms to interoperate, thus coexist and benefit from the richness of the variety. Additionally, it provides a fine grained security mechanism to allow access to services by only authenticated and authorized entities<\/div>\n\n\n--><\/p>\n<div id=\"msec_l1a2\" class=\"msec_comp msec_c1 msec_l2\">SAT &amp;<br \/>\nDMSS TRL 4<\/div>\n<p><!--\n\n\n<div id=\"msec_keyl1a2\" class=\"msec_keyCoPos\"><b>Security Analysis Tool &amp; Development Method for a secure service<\/b> A security requirements modelling support system, for a misuse case diagram that enables the association of security knowledge with elements that constitute the diagram.<\/div>\n\n\n--><\/p>\n<div id=\"msec_l1a3\" class=\"msec_comp msec_c2 msec_l1\">MTSA TRL 7<\/div>\n<p><!--\n\n\n<div id=\"msec_keyl1a3\" class=\"msec_keyCoPos\"><b>Modal Transition System Analyser<\/b> A development tool for synthesizing behaviour specification for reactive systems with formal guarantee.<\/div>\n\n\n--><\/p>\n<div id=\"msec_l1a4\" class=\"msec_comp msec_c4 msec_l1\">IoT<br \/>\nMarketplace TRL 9<\/div>\n<p><!--\n\n\n<div id=\"msec_keyl1a4\" class=\"msec_keyCoPos\"><b>IoT Marketplace<\/b> The M-Sec IoT Marketplace is a novel Marketplace where smart objects and users can exchange information and services through the use of virtual currencies, allowing real-time matching of supply and demand, and thus enabling the creation of liquid markets with profitable business models of the IoT stakeholders.<\/div>\n\n\n--><\/p>\n<div id=\"msec_l2\" class=\"msec_keyLaPos msec_c0 msec_l3\">Cloud<br \/>\nLayer<\/div>\n<p><!--\n\n\n<div id=\"msec_keyl2\" class=\"msec_keyCoPos\"><b>Cloud layer<\/b> includes all the infrastructure upon which cloud services are based<\/div>\n\n\n--><\/p>\n<div id=\"msec_l2a1\" class=\"msec_comp msec_l3 msec_c2\">Monitoring<br \/>\n&amp; Visualisation Tool TRL 6<\/div>\n<p><!--\n\n\n<div id=\"msec_keyl2a1\" class=\"msec_keyCoPos\"><b>Monitoring &amp; Visualisation Tool<\/b> A software-based solution that collects and examines activity from IoT layer or agents embedded in the IoT gateway devices. This tool not only help with the security health checks by providing insight into how the security is being maintained at IoT gateways, but also helps in further analysis of devices under attack. Thereby, providing 24\/7 security threat monitoring and alerts.<\/div>\n\n\n--><\/p>\n<div id=\"msec_l2a2\" class=\"msec_comp msec_l3 msec_c4 \">Crypto<br \/>\nCompanion DB TRL 7<\/div>\n<p><!--\n\n\n<div id=\"msec_keyl2a2\" class=\"msec_keyCoPos\"><b>Crypto Companion Database<\/b>&gt; As the real world matches the digital world, ensuring that information remains secure, private and authentic has become an ongoing challenge. Using blockchain technology, some of the issues can be addressed. However, once data is stored on the blockchain it can't be manipulated or altered. Our companion database is proposed as a parallel system to the blockchain for the encrypted storage. The blockchain saves a hash created from sensitive or personal data, and the companion database stores the sensitive data encrypted together with the hash.<\/div>\n\n\n--><\/p>\n<div id=\"msec_l3\" class=\"msec_keyLaPos msec_c0 msec_l5\">Middleware<br \/>\nLayer<\/div>\n<p><!--\n\n\n<div id=\"msec_keyl3\" class=\"msec_keyCoPos\"><b>Middleware layer<\/b> includes the infrastructure needed for both Peer-to-Peer and IoT-to-Cloud approaches<\/div>\n\n\n--><\/p>\n<div id=\"msec_l3a1\" class=\"msec_comp msec_c3 msec_l5\">Eclipse<br \/>\nsensiNact platform TRL 7<\/div>\n<p><!--\n\n\n<div id=\"msec_keyl3a1\" class=\"msec_keyCoPos\"><b>Eclipse sensiNact platform<\/b> SensiNact is designed to allow platforms to interoperate, thus coexist and benefit from the richness of the variety. Additionally, it provides a fine grained security mechanism to allow access to services by only authenticated and authorized entities.<\/div>\n\n\n--><\/p>\n<div id=\"msec_l3a2\" class=\"msec_comp msec_c3 msec_l6\">Secure<br \/>\nSOXFire TRL 6<\/div>\n<p><!--\n\n\n<div id=\"msec_keyl3a2\" class=\"msec_keyCoPos\"><b>Secure SOXFire<\/b> SOXFire can provide practical distributed and federated infrastructure for IoT sensor data sharing among various users\/organisations in a way that is scalable, extensible, easy to use and secure, while preserving privacy.<\/div>\n\n\n--><\/p>\n<div id=\"msec_l3a3\" class=\"msec_comp msec_c4 msec_l5\">Quorum Blockchain<br \/>\nBlockchain middleware TRL 7<\/div>\n<p><!--\n\n\n<div id=\"msec_keyl3a3\" class=\"msec_keyCoPos\"><b>Quorum Blockchain Blockchain middleware<\/b> A distributed ledger and middleware services system which provides all the necessary groundwork for security\/privacy-enhancing services related to transactions and interactions between actors of various ecosystems.<\/div>\n\n\n--><\/p>\n<div id=\"msec_l3a4\" class=\"msec_comp msec_c4 msec_l6\">T&amp;R Model<br \/>\nengine\/tool TRL 6<\/div>\n<p><!--\n\n\n<div id=\"msec_keyl3a4\" class=\"msec_keyCoPos\"><b>Trust &amp; Reputation Model\/Engine<\/b> The Trust &amp; Reputation\nManagement Engine (T&amp;RM Engine) is a tool working on top of the M-Sec\nblockchain\/Marketplace and in parallel with the corresponding\nmiddleware so as to provide a ranking system assessing the\nreliability, trustworthiness and reputation of resources providers\nwithin the MSec ecosystem.<\/div>\n\n\n--><\/p>\n<div id=\"msec_l4\" class=\"msec_keyLaPos msec_c0 msec_l7\">IoT<br \/>\nLayer<\/div>\n<p><!--\n\n\n<div id=\"msec_keyl4\" class=\"msec_keyCoPos\"><b>IoT Layer<\/b> includes all the devices, sensors, and their\ncorresponding low-level networks that are met in IoT ecosystems<\/div>\n\n\n--><\/p>\n<div id=\"msec_l4a1\" class=\"msec_comp msec_c2 msec_l7\">Secured components<br \/>\nfor devices TRL 6<\/div>\n<p><!--\n\n\n<div id=\"msec_keyl4a1\" class=\"msec_keyCoPos\"><b>Secured components for devices<\/b> A secure element, such as a\nTPM, is added to the physical platform, It is used to store any\nsensitive information that shall be protected from people having\nphysical Access to the electronics, such as IoT devices and gateways.\nThe secure element handles the integrity of the device during the\nboot process and also handles the authentication and encryption for\nexternal communication channels.<\/div>\n\n\n--><\/p>\n<div id=\"msec_l4a2\" class=\"msec_comp msec_c2 msec_l8\">Intrusion<br \/>\nDetection System TRL 7<\/div>\n<p><!--\n\n\n<div id=\"msec_keyl4a2\" class=\"msec_keyCoPos\"><b>Intrusion Detection System<\/b> Protect vulnerable IoT devices from\nmalicious activities using defense-in-depth mechanisms and threat\nmonitoring, thereby providing multi-layered security against policy\nviolations and cyber attacks, along with security health-checks<\/div>\n\n\n--><\/p>\n<div id=\"msec_l4a4\" class=\"msec_comp msec_c2 msec_l9\">Stealth security TRL 5<\/div>\n<p><!--\n\n\n<div id=\"msec_keyl4a4\" class=\"msec_keyCoPos\"><b>Description<\/b> description here<\/div>\n\n\n--><\/p>\n<div id=\"msec_l4a3\" class=\"msec_comp msec_c4 msec_l7\">Ganonymizer TRL 7<\/div>\n<p><!--\n\n\n<div id=\"msec_keyl4a3\" class=\"msec_keyCoPos\"><b>Ganonymizer <\/b>In situations where video data is used in various\nIoT application use cases such as smart cities, personal information\nis often a problem. GANonymizer is a technology that automatically\ndeletes personal information contained in such videos using AI\ntechnology.<\/div>\n\n\n--><\/p>\n<div id=\"msec_l5\" class=\"msec_keyLaPos msec_c5 msec_l1\">Cross<br \/>\nLayer<\/div>\n<p><!--\n\n\n<div id=\"msec_keyl5\" class=\"msec_keyCoPos\"><b>Cross layer<\/b> is the layer that provides services to all the horizontal layers.<\/div>\n\n\n--><\/p>\n<div id=\"msec_l5a1\" class=\"msec_comp msec_c6 msec_l3\">Security<br \/>\nManagement Tool TRL 5<\/div>\n<p><!--\n\n\n<div id=\"msec_keyl5a1\" class=\"msec_keyCoPos\"><b>Security Management Tool<\/b> A set of centralized security\nfunctions that are necessary to ensure end-to-end security, privacy\nand therefore digital trust. It is designed to support several\nsecurity functionalities aggregated in a single backend using the\nLDAP standard. The central element for the security manager is a\ndirectory service containing all information to manage security\nservices for clients, such services known as AAA for Authentication,\nAccounting and Authorization.<\/div>\n\n\n--><\/p>\n<div id=\"msec_fg1\" class=\"msec_fg\">Development &amp; Design Tools<\/div>\n<div id=\"msec_keyfg1x\" class=\"msec_keyCoPos\"><b>Development &amp; Design Tools Functional Group<\/b> &#8230;<\/div>\n<div id=\"msec_fg2\" class=\"msec_fg\">Devices Security<\/div>\n<div id=\"msec_keyfg2x\" class=\"msec_keyCoPos\"><b>Devices Security Functional Group<\/b>&#8230;<\/div>\n<div id=\"msec_fg3\" class=\"msec_fg\">Secure City Data Acc<\/div>\n<div id=\"msec_keyfg3x\" class=\"msec_keyCoPos\"><b>Secure City Data Access Functional Group<\/b>&#8230;<\/div>\n<div id=\"msec_fg4\" class=\"msec_fg\">IoT Marketplace<\/div>\n<div id=\"msec_keyfg4x\" class=\"msec_keyCoPos\"><b>IoT Marketplace Functional Group<\/b>&#8230;<\/div>\n<div id=\"msec_fg5\" class=\"msec_fg\">Secured&amp;Trusted Storage<\/div>\n<div id=\"msec_keyfg5x\" class=\"msec_keyCoPos\"><b>Secured &amp; Trusted Storage Functional Group<\/b>&#8230;<\/div>\n<div id=\"msec_fg6\" class=\"msec_fg\">Privacy Management<\/div>\n<div id=\"msec_keyfg6x\" class=\"msec_keyCoPos\"><b>Privacy Management Functional Group<\/b>&#8230;<\/div>\n<div id=\"msec_fg7\" class=\"msec_fg\">End-to-End Security<\/div>\n<div id=\"msec_keyfg7x\" class=\"msec_keyCoPos\"><b>End-to-End Security FG<\/b>&#8230;<\/div>\n<div id=\"msec_fg7\" class=\"msec_fg\">End-to-End Security<\/div>\n<div id=\"msec_keyfg7x\" class=\"msec_keyCoPos\"><b>End-to-End Security FG<\/b>&#8230;<\/div>\n<div id=\"msec_K1\" class=\"msec_key\">Key:<\/div>\n<div id=\"msec_kl\" class=\"msec_hl msec_key\">Layer<\/div>\n<div id=\"msec_keykl\" class=\"msec_keyCoPos\"><b>Layered<\/b> Layered architecture patterns are n-tiered patterns<br \/>\nwhere the components are organized in horizontal layers. This is the<br \/>\ntraditional method for designing most software and is meant to be<br \/>\nself-independent. This means that all the components are<br \/>\ninterconnected but do not depend on each other.<\/div>\n<div id=\"msec_kfg\" class=\"msec_fg msec_key\">Functional Group<\/div>\n<div id=\"msec_keykfg\" class=\"msec_keyCoPos\"><b>Functional Groups<\/b> represents a reusable, functional, identifiable part of the<br \/>\nwhole framework that provides a set of functionalities based on the combination of other components.<\/div>\n<div id=\"msec_kc\" class=\"msec_comp\">Component<\/div>\n<div id=\"msec_keykc\" class=\"msec_keyCoPos\"><b>Component<\/b> represents a smaller functional part that in a combination with other components,<br \/>\nintroduce the functional group component. A component is an self-contained software which can<br \/>\ncommunicate with other components. In this representation a component can also represent a set of components. We are not representing interfaces and connectors.<\/div>\n<p><!--\n\n\n<div class=\"msec_keyCoPosBg msec_keyCoPos \">\n\n<b>Hint:<\/b> cursor over element name shows more information... --><\/p>\n<div class=\"msec_keyCoPosBg msec_keyCoPos \"><b>SRL:<\/b> SRL of level 3 &#8216; System Development &amp; Demonstration<\/div>\n<p><!--\n\n\n<div class=\"srl\"><b>SRL:<\/b> SRL of level 3 ' System Development &amp; Demonstration<\/div>\n\n\n--><\/p>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<\/div>\n<p>[\/vc_column_text][g5plus_space desktop=&#8221;700&#8243; tablet=&#8221;70&#8243; tablet_portrait=&#8221;60&#8243; mobile_landscape=&#8221;50&#8243; mobile=&#8221;40&#8243;][vc_column_text]<\/p>\n<h3>Application Layer<\/h3>\n<p>The Application Layer defines all the use the IoT technology or in which IoT has deployed[\/vc_column_text][vc_text_separator title=&#8221;Development &amp; Design Tools&#8221; title_align=&#8221;separator_align_left&#8221; align=&#8221;align_left&#8221; color=&#8221;turquoise&#8221; css=&#8221;.vc_custom_1642680633894{margin-top: 15px !important;}&#8221;][vc_column_text]<\/p>\n<ul>\n<li>Eclipse sensiNact Studio TRL 7\n<ul>\n<li>Eclipse sensiNact Studio SensiNact is designed to allow platforms to interoperate, thus coexist and benefit from the richness of the variety. Additionally, it provides a fine-grained security mechanism to allow access to services by only authenticated and authorized entities<\/li>\n<\/ul>\n<\/li>\n<li>SAT &amp; DMSS TRL 4\n<ul>\n<li>Security Analysis Tool &amp;amp; Development Method for a secure service. A security requirements modelling support system, for a misuse case diagram that enables the association of security knowledge with elements that constitute the diagram.<\/li>\n<\/ul>\n<\/li>\n<li>MTSA TRL 7\n<ul>\n<li>Modal Transition System Analyser. A development tool for synthesizing behaviour specification for reactive systems with formal guarantee.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_text_separator title=&#8221;IoT Marketplace TRL 9&#8243; title_align=&#8221;separator_align_left&#8221; align=&#8221;align_left&#8221; color=&#8221;turquoise&#8221; css=&#8221;.vc_custom_1642683001747{margin-top: 15px !important;}&#8221;][vc_column_text]<\/p>\n<ul>\n<li>IoT Marketplace\n<ul>\n<li>The M-Sec IoT Marketplace is a novel Marketplace where smart objects and users can exchange information and services through the use of virtual currencies, allowing real-time matching of supply and demand, and thus enabling the creation of liquid markets with profitable business models of the IoT stakeholders.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1642685410275{margin-top: 20px !important;}&#8221;]<\/p>\n<h3>Cloud Layer<\/h3>\n<p>Cloud layer includes all the infrastructure upon which cloud services are based[\/vc_column_text][vc_text_separator title=&#8221;Devices Security&#8221; title_align=&#8221;separator_align_left&#8221; align=&#8221;align_left&#8221; color=&#8221;turquoise&#8221; css=&#8221;.vc_custom_1642683281268{margin-top: 15px !important;}&#8221;][vc_column_text]<\/p>\n<ul>\n<li>Monitoring &amp; Visualisation Tool TRL 6\n<ul>\n<li>The M-Sec IoT Marketplace is a novel Marketplace where smart objects and users can exchange information and services through the use of virtual currencies, allowing real-time matching of supply and demand, and thus enabling the creation of liquid markets with profitable business models of the IoT stakeholders.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_text_separator title=&#8221;Secured &amp; Trusted Storage&#8221; title_align=&#8221;separator_align_left&#8221; align=&#8221;align_left&#8221; color=&#8221;turquoise&#8221; css=&#8221;.vc_custom_1642684077873{margin-top: 15px !important;}&#8221;][vc_column_text]<\/p>\n<ul>\n<li>Crypto Companion DB TRL 7\n<ul>\n<li>Crypto Companion Database &#8211; As the real world matches the digital world, ensuring that information remains secure, private and authentic has become an ongoing challenge. Using blockchain technology, some of the issues can be addressed. However, once data is stored on the blockchain it can&#8217;t be manipulated or altered. Our companion database is proposed as a parallel system to the blockchain for the encrypted storage. The blockchain saves a hash created from sensitive or personal data, and the companion database stores the sensitive data encrypted together with the hash.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1642685433299{margin-top: 20px !important;}&#8221;]<\/p>\n<h3>Middleware Layer<\/h3>\n<p>Middleware layer includes the infrastructure needed for both Peer-to-Peer and IoT-to-Cloud approaches[\/vc_column_text][vc_text_separator title=&#8221;Secure City Data Acc&#8221; title_align=&#8221;separator_align_left&#8221; align=&#8221;align_left&#8221; color=&#8221;turquoise&#8221; css=&#8221;.vc_custom_1642684464168{margin-top: 15px !important;}&#8221;][vc_column_text]<\/p>\n<ul>\n<li>Eclipse sensiNact platform TRL 7\n<ul>\n<li>Eclipse sensiNact Studio SensiNact is designed to allow platforms to interoperate, thus coexist and benefit from the richness of the variety. Additionally, it provides a fine-grained security mechanism to allow access to services by only authenticated and authorized entities<\/li>\n<\/ul>\n<\/li>\n<li>Secure SOXFire TRL 6\n<ul>\n<li>SOXFire can provide practical distributed and federated infrastructure for IoT sensor data sharing among various users\/organisations in a way that is scalable, extensible, easy to use and secure, while preserving privacy.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_text_separator title=&#8221;Secured &amp; Trusted Storage&#8221; title_align=&#8221;separator_align_left&#8221; align=&#8221;align_left&#8221; color=&#8221;turquoise&#8221; css=&#8221;.vc_custom_1642684651761{margin-top: 15px !important;}&#8221;][vc_column_text]<\/p>\n<ul>\n<li>Quorum Blockchain Blockchain middleware TRL 7\n<ul>\n<li>A distributed ledger and middleware services system which provides all the necessary groundwork for security\/privacy-enhancing services related to transactions and interactions between actors of various ecosystems.<\/li>\n<\/ul>\n<\/li>\n<li>T&amp;R Model engine\/tool TRL 6\n<ul>\n<li>Trust &amp; Reputation Model\/Engine The Trust &amp; Reputation Management Engine (T&amp;RM Engine) is a tool working on top of the M-Sec blockchain\/Marketplace and in parallel with the corresponding middleware so as to provide a ranking system assessing the reliability, trustworthiness and reputation of resources providers within the MSec ecosystem.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1642685440807{margin-top: 20px !important;}&#8221;]<\/p>\n<h3>IoT Layer<\/h3>\n<p>IoT Layer includes all the devices, sensors, and their corresponding low-level networks that are met in IoT ecosystems[\/vc_column_text][vc_text_separator title=&#8221;Devices Security&#8221; title_align=&#8221;separator_align_left&#8221; align=&#8221;align_left&#8221; color=&#8221;turquoise&#8221; css=&#8221;.vc_custom_1642684906575{margin-top: 15px !important;}&#8221;][vc_column_text]<\/p>\n<ul>\n<li>Secured components for devices TRL 6\n<ul>\n<li>Secured components for devices. A secure element, such as a TPM, is added to the physical platform, It is used to store any sensitive information that shall be protected from people having physical Access to the electronics, such as IoT devices and gateways. The secure element handles the integrity of the device during the boot process and also handles the authentication and encryption for external communication channels.<\/li>\n<\/ul>\n<\/li>\n<li>Intrusion Detection System TRL 7\n<ul>\n<li>Intrusion Detection System Protect vulnerable IoT devices from malicious activities using defense-in-depth mechanisms and threat monitoring, thereby providing multi-layered security against policy violations and cyber attacks, along with security health-checks<\/li>\n<\/ul>\n<\/li>\n<li>Stealth security TRL 5<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_text_separator title=&#8221;Privacy Management&#8221; title_align=&#8221;separator_align_left&#8221; align=&#8221;align_left&#8221; color=&#8221;turquoise&#8221; css=&#8221;.vc_custom_1642685134954{margin-top: 15px !important;}&#8221;][vc_column_text]<\/p>\n<ul>\n<li>Ganonymizer TRL 7\n<ul>\n<li>Ganonymizer. In situations where video data is used in various IoT application use cases such as smart cities, personal information is often a problem. GANonymizer is a technology that automatically deletes personal information contained in such videos using AI technology.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1642685447866{margin-top: 20px !important;}&#8221;]<\/p>\n<h3>Cross Layer<\/h3>\n<p>Cross layer is the layer that provides services to all the horizontal layers.[\/vc_column_text][vc_text_separator title=&#8221;End-to-End Security&#8221; title_align=&#8221;separator_align_left&#8221; align=&#8221;align_left&#8221; color=&#8221;turquoise&#8221; css=&#8221;.vc_custom_1642685299157{margin-top: 15px !important;}&#8221;][vc_column_text]<\/p>\n<ul>\n<li>Security Management Tool TRL 5\n<ul>\n<li>Security Management Tool. A set of centralized security functions that are necessary to ensure end-to-end security, privacy and therefore digital trust. It is designed to support several security functionalities aggregated in a single backend using the LDAP standard. The central element for the security manager is a directory service containing all information to manage security services for clients, such services known as AAA for Authentication, Accounting and Authorization.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][g5plus_space desktop=&#8221;90&#8243; tablet=&#8221;70&#8243; tablet_portrait=&#8221;60&#8243; mobile_landscape=&#8221;50&#8243; mobile=&#8221;40&#8243;][vc_column_text]<\/p>\n<h3>Visit the <a href=\"https:\/\/github.com\/MSec-H2020\">M-Sec&#8217;s Github<\/a><\/h3>\n<p>[\/vc_column_text][g5plus_space desktop=&#8221;90&#8243; tablet=&#8221;70&#8243; tablet_portrait=&#8221;60&#8243; mobile_landscape=&#8221;50&#8243; mobile=&#8221;40&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<table class=\"GeneratedTable\">\n<thead>\n<tr>\n<th class=\"first-column\">FG<\/th>\n<th class=\"blue-cells\">Component<\/th>\n<th class=\"blue-cells\">Owner<\/th>\n<th class=\"blue-cells\">Code of the Repository<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td class=\"first-column wt\" rowspan=\"3\">Development and (Security) Designing Tools<\/td>\n<td>Security Analysis Tool &amp; Development Method for a secure service<\/td>\n<td>NII<\/td>\n<td><a href=\"https:\/\/github.com\/MSec-H2020\/Secure_Analysis_Tool\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/MSec-H2020\/Secure_Analysis_Tool<\/a><\/td>\n<\/tr>\n<tr>\n<td>Modal Transition System Analyser<\/td>\n<td>WU<\/td>\n<td><a href=\"https:\/\/github.com\/MSec-H2020\/MTSA-NodeRed-Translator\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/MSec-H2020\/MTSA-NodeRed-Translator<\/a><\/td>\n<\/tr>\n<tr>\n<td>Eclipse Sensinact Studio<\/td>\n<td>CEA<\/td>\n<td><a href=\"https:\/\/projects.eclipse.org\/projects\/technology.sensinact\/developer\" target=\"_blank\" rel=\"noopener\">https:\/\/projects.eclipse.org\/projects\/technology.sensinact\/developer<\/a><\/td>\n<\/tr>\n<tr>\n<td class=\"first-column wt\">Cloud Tools FG<\/td>\n<td>Monitoring and Visualisation Tool<\/td>\n<td>YNU<\/td>\n<td><a href=\"https:\/\/github.com\/MSec-H2020\/Monitoring_and_Visualisation_Tool\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/MSec-H2020\/Monitoring_and_Visualisation_Tool<\/a><\/td>\n<\/tr>\n<tr>\n<td class=\"first-column wt\" rowspan=\"3\">Devices FG<\/td>\n<td>Stealth Security<\/td>\n<td>YNU<\/td>\n<td><a href=\"https:\/\/github.com\/MSec-H2020\/Stealth_Security\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/MSec-H2020\/Stealth_Security<\/a><\/td>\n<\/tr>\n<tr>\n<td>Secured Component for Devices<\/td>\n<td>CEA<\/td>\n<td>CEA private GitLab instance. Access restricted to M-Sec partners. <a href=\"https:\/\/gitlab.msecproject.eu\/\" target=\"_blank\" rel=\"noopener\">https:\/\/gitlab.msecproject.eu\/<\/a><\/td>\n<\/tr>\n<tr>\n<td>Intrusion Detection System<\/td>\n<td>YNU<\/td>\n<td><a href=\"https:\/\/github.com\/MSec-H2020\/Intrusion_Detection-System\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/MSec-H2020\/Intrusion_Detection-System<\/a><\/td>\n<\/tr>\n<tr>\n<td class=\"first-column wt\">Privacy Management FG<\/td>\n<td>GANonymizer<\/td>\n<td>KEIO<\/td>\n<td><a href=\"https:\/\/github.com\/MSec-H2020\/GANonymizer\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/MSec-H2020\/GANonymizer<\/a><\/td>\n<\/tr>\n<tr>\n<td class=\"first-column wt\" rowspan=\"2\">Secure City Data Access<\/td>\n<td>Eclipse Sensinact Platform<\/td>\n<td>CEA<\/td>\n<td><a href=\"https:\/\/projects.eclipse.org\/projects\/technology.sensinact\/developer\" target=\"_blank\" rel=\"noopener\">https:\/\/projects.eclipse.org\/projects\/technology.sensinact\/developer<\/a><\/td>\n<\/tr>\n<tr>\n<td>Secure SoxFire<\/td>\n<td>KEIO<\/td>\n<td><a href=\"https:\/\/github.com\/MSec-H2020\/Secure_SOXFire\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/MSec-H2020\/Secure_SOXFire<\/a><br \/>\n<a href=\"https:\/\/github.com\/MSec-H2020\/SOXStore-Server\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/MSec-H2020\/SOXStore-Server<\/a><\/td>\n<\/tr>\n<tr>\n<td class=\"first-column wt\" rowspan=\"2\">Secured &amp; Trusted Storage FG<\/td>\n<td>Quorum Blockchain \/Blockchain Middleware<\/td>\n<td>ICCS<\/td>\n<td><a href=\"https:\/\/github.com\/MSec-H2020\/Quorum_Blockchain_and_Blockchain_Middleware\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/MSec-H2020\/Quorum_Blockchain_and_Blockchain_Middleware<\/a><\/td>\n<\/tr>\n<tr>\n<td>Crypto Companion Database<\/td>\n<td>WLI<\/td>\n<td><a href=\"https:\/\/github.com\/MSec-H2020\/Crypto_Companion_DB\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/MSec-H2020\/Crypto_Companion_DB<\/a><\/td>\n<\/tr>\n<tr>\n<td class=\"first-column wt\">IoT Marketplace FG<\/td>\n<td>IoT Marketplace<\/td>\n<td>ICCS<\/td>\n<td><a href=\"https:\/\/github.com\/MSec-H2020\/IoT_Marketplace\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/MSec-H2020\/IoT_Marketplace<\/a><\/td>\n<\/tr>\n<tr>\n<td class=\"first-column wt\">End-to-End Security FG<\/td>\n<td>Security Management Tool<\/td>\n<td>CEA<\/td>\n<td>CEA private GitLab instance. Access restricted to M-Sec partners. <a href=\"https:\/\/gitlab.msecproject.eu\/\" target=\"_blank\" rel=\"noopener\">https:\/\/gitlab.msecproject.eu\/<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text css=&#8221;&#8221;]M-Sec project provides a secure end to end framework bas [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-9377","page","type-page","status-publish","hentry"],"translation":{"provider":"WPGlobus","version":"3.0.2","language":"ja","enabled_languages":["gb","ja"],"languages":{"gb":{"title":true,"content":true,"excerpt":false},"ja":{"title":false,"content":false,"excerpt":false}}},"_links":{"self":[{"href":"https:\/\/msecproject.eu\/ja\/wp-json\/wp\/v2\/pages\/9377","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/msecproject.eu\/ja\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/msecproject.eu\/ja\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/msecproject.eu\/ja\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/msecproject.eu\/ja\/wp-json\/wp\/v2\/comments?post=9377"}],"version-history":[{"count":5,"href":"https:\/\/msecproject.eu\/ja\/wp-json\/wp\/v2\/pages\/9377\/revisions"}],"predecessor-version":[{"id":9736,"href":"https:\/\/msecproject.eu\/ja\/wp-json\/wp\/v2\/pages\/9377\/revisions\/9736"}],"wp:attachment":[{"href":"https:\/\/msecproject.eu\/ja\/wp-json\/wp\/v2\/media?parent=9377"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}