www.c4iiot.eu

Work Package 2

Edge computing cybersecurity technologies.

  • Duration
  • Objectives
  • Tasks

M4 - M30

  • To ensure proper provision, configuration, and management of edge-node assets, including IIoT (sensors) devices and network elements (field gateways);
  • To ensure that machine learning methods that perform detection of complex anomalous and malicious behavior are implemented in a distributed way;
  • To design and implement the mechanisms needed to dynamically offload security-aware tasks at the edge;
  • To build the tools and technologies for providing a secure execution environment for the edge IoT devices.
  • Task 2.1. Provision, configuration and management of edge-node assets
  • Task 2.2. Deep learning trained models deployed at the edge
  • Task 2.3. Security-aware dynamic offloading decision mechanism
  • Task 2.4. Security and trustworthiness at the edge