Blog

Setting up the scene: project set up

blog_post_featured_image

Setting up the scene: project set up

The first work package of C4IIoT which consisted in preliminary R&D, that set the scene for the rest of project, was concluded on November 30th, 2019 marking the first milestone of the project. It delivered three reports that will serve as starting points and guidelines for two other ongoing work packages:

  • WP4 which started on January 1st 2020 and consists in the agile development and continuous integration of the end-to-end integrated industrial IoT cybersecurity framework which is the main innovative technology goal of the project;
  • WP5 which started on July 2019 in parallel with WP1 and consists in first establishing an experimental real-life industrial smart manufacturing infrastructure, and then deploy on this infrastructure the end-to-end framework resulting from WP4 to evaluate and measure the cybersecurity benefits that it effectively provides in a realistic industrial setting.

 

C4IIoT-Workplan-overview
C4IIoT Workplan Overview

 

The three documents delivered are the following:

  • D1.1., an up-to-date survey of both the academic and industrial state-of-the-arts in the field of cybersecurity for the industrial IoT, which verified that the ambitious innovation challenges that the consortium identified at proposal writing time remained far beyond the capabilities of currently available integrated industrial IoT cybersecurity solutions, whether open-source or commercial;
  • D1.2, which identified and classified, on the one hand, the assets to be protected by the C4IIoT framework, and, on the other hand, the cybersecurity threats to these assets, and also specified the experimental protocol to evaluate the strength of the cyberprotection effectively provided by the framework to the identified classes of assets from the identified classes of threats;
  • D1.3 which elaborated the architecture model of the C4IIoT framework, specifying the roles of the the tools provided by each project partner into an integrated framework and specifying how these tools will interoperate in synergy to provide a far higher level of cyberprotection than what is attainable with currently available tools and frameworks.