Project

SCOTT: Secure Connected Trustable Things

Goal: SCOTT is a European research project with 57 key partners from 12 countries (EU and Brazil), https://scottproject.eu

IoT is the game changer and driver for digitalisation, and SCOTT contributes by
(i) answering IoT's need for a new and more advanced security paradigm through security classes
(ii) creating a convincing privacy assessment through privacy labelling
(iii) establish a clear link between security and safety

Updates
0 new
100
Recommendations
0 new
75
Followers
0 new
52
Reads
0 new
1307

Project log

Josef Noll
added a research item
Video on demand (VoD) services such as YouTube have generated considerable volumes of Internet traffic in homes and buildings in recent years. While Internet service providers deploy fiber and recent wireless technologies such as 802.11ax to support high bandwidth requirement, the best-effort nature of 802.11 networks and variable wireless medium conditions hinder users from experiencing maximum quality during video streaming. Hence, Internet service providers (ISPs) have an interest in monitoring the perceived quality of service (PQoS) in customer premises in order to avoid customer dissatisfaction and churn. Since existing approaches for estimating PQoS or quality of experience (QoE) requires external measurement of generic network performance parameters, this paper presents a novel approach to estimate the PQoS of video streaming using only 802.11 specific network performance parameters collected from wireless access points. This study produced datasets comprising 802.11n/ac/ax specific network performance parameters labelled with PQoS in the form of mean opinion scores (MOS) to train machine learning algorithms. As a result, we achieved as many as 93–99% classification accuracy in estimating PQoS by monitoring only 802.11 parameters on off-the-shelf Wi-Fi access points. Furthermore, the 802.11 parameters used in the machine learning model were analyzed to identify the cause of quality degradation detected on the Wi-Fi networks. Finally, ISPs can utilize the results of this study to provide predictable and measurable wireless quality by implementing non-intrusive monitoring of customers’ perceived quality. In addition, this approach reduces customers’ privacy concerns while reducing the operational cost of analytics for ISPs.
Peter Priller
added an update
Project SCOTT has ended in 2020, but that's not the end of the story:
Project InSecTT has started: "Going to the edge – Bringing Internet of Things and Artificial Intelligence together".
 
Peter Priller
added an update
SCOTT & InSecTT are having a virtual booth at the EFECS online event from 25-26 of November. Visit us there. More info: https://efecs.eu/exhibition.html
 
Peter Priller
added an update
#WINNER We proudly present the two Austrian winners of the #SCOTT International #Studentcontest on Wirelessly Connected IoT: Secure and Trustable – 2020 edition ▶️ https://lnkd.in/d2yTEWC)
1st prize and special recognition prize goes to Bernhard Großwindhager from NXP Semiconductors
2. prize goes to Hanna Brunner from Technische Universität Graz
Yesterday they received their trophies, of course physical distance was kept. 😉
All organizers and sponsors as well as the coordination team of SCOTT project congratulate warmly!
 
Peter Priller
added an update
The pan-European project SCOTT (coordinated by VIRTUAL VEHICLE Research GmbH from Graz, Austria) united top international industry and research partners. It reinforced Europe’s leading position in the field of Smart and Connected Things and secured Europe’s independence in the area of security-enabling components and systems.
After three years of fruitful scientific work, the €40-million research project led by VIRTUAL VEHICLE with 59 key partners from 12 countries (incl. Brazil) has successfully presented its impressing results at the final review meeting, such as:
  • Boosting Security, Privacy, Safety and Trust for IoT
  • Ensuring Industry-compliant Connectivity via Cloud Integration
  • Innovative Energy-constrained and Autonomous IoT Components
  • A Reference Architecture for Secure Connected Trustable Things demonstrated across 5 Domains (Automotive, Aeronautics, Home/Building, Rail, Healthcare, and Cross-domain (cross-disciplinary))
  • A scientifically sound yet practical Methodology for developing Trusted Systems
Read more about SCOTT results in our press release: https://scottproject.eu/wp-content/uploads/2020/11/scott_pressrelease_EN.pdf
 
Peter Priller
added an update
​We are proud to present SCOTT's results in the Final Review Meeting taking place now (September 29th and 30th). Under normal circumstances we'd have a huge meeting room full of hands-on demonstrators, with lots of experts sharing interesting presentations. Due to the current COVID-19 situation, everything moved online. This picture shows our virtual meeting room this morning, filling up during the preparation of the review meeting.
 
Peter Priller
added an update
Watch our latest video of the SCOTT result from the RISE (Research Institutes of Sweden), VIF (Virtual Vehicle) and JIG collaboration: https://www.youtube.com/watch?v=lkePDircbIY
 
Peter Priller
added an update
Making IoT secure is essential, but non-trivial. Have you ever wondered how to secure the communication of an IoT device with a cloud server with all the „hops“ in between?
Then this white paper might be a good read for you:
Security Scan Methodology for Cloud Connected IoT Devices from Nokia Bell Labs and other partners of SCOTT, see https://scottproject.eu/download/whitepaper-security-scan-methodology-for-cloud-connected-iot-devices/
Learn more about SCOTT by visiting https://scottproject.eu/
 
Peter Priller
added an update
Since the beginning of SCOTT in May 2017, we were looking forward to the “Grand Finale”, presenting our results and ideas in a “Public Day” in Graz (in co-location with the final project review).
Then came COVID-19.
After consultation with our ECSEL Programme Officer we jointly decided that the SCOTT final review meeting, as well as the SCOTT public day, will not take place in physical presence. The review meeting is able to move into the virtual world, but we are still working to find a solution for the public event. Date and format still have to be decided. We will keep you updated.
In the meantime: have a look and watch some impressive videos on SCOTT’s YouTube presence: https://m.youtube.com/channel/UC8MfGTuS5W_HKb-EtPo-8EA
 
Leander Hörmann
added a research item
A continually growing number of sensors is required for monitoring industrial processes and for continuous data acquisition from industrial plants and devices. The cabling of sensors represent a considerable effort and potential source of error, which can be avoided by using wireless sensor nodes. These wireless sensor nodes form a wireless sensor network (WSN) to efficiently transmit data to the destination. For the acceptance of WSNs in industry, it is important to build up networks with high trustworthiness. The trustworthiness of the WSN depends not only on a secure wireless communication but also on the ability to detect modifications at the wireless sensor nodes itself. This paper presents the enhancement of the WSN's trustworthiness using an optical localization system. It can be used for the preparation phase of the WSN and also during operation to track the positions of the wireless sensor nodes and detect spatial modification. The location information of the sensor nodes can also be used to rate their trustworthiness.
Peter Priller
added an update
One more week to apply in the International Student Contest on Wirelessly Connected IoT in 2020 Due to your inquiries and holiday period, the contest organizers have decided to extend the submission deadline by one week to 31 July 2020! We are interested in accomplished projects targeting domains like automotive, aeronautics, buildings, health, robotics, smart manufacturing, etc. that can be a part of the future secure and wirelessly connected world. Apply now! More information is available here: https://scottproject.eu/studentcontest/
 
Peter Priller
added an update
SCOTT WP26 targets the design of reliable and secure network components. The objective is to define infrastructure organization guidelines in the form of a reference architecture that will enable interoperability and will contribute to build trust in the different SCOTT IoT (Internet of Things) industrial use cases. The SCOTT reference architecture addresses trust issues by mapping infrastructure entities, their functionalities and their relationships (interfaces) to a multitude of building blocks that deal with security, privacy, safety, and dependability features. The SCOTT reference architecture provides compatibility with the most important standard architectures, while introducing novel concepts such as the SCOTT bubble and the Trustworthiness vector indicator that provide enhanced IoT designs. The SCOTT reference architecture builds on detailed functional, entity, information, and domain model perspectives that cover the needs of multiple IoT stakeholders and industrial lifecycles in the domains of aeronautics, railway, building, healthcare, and automotive.  More specifically, WP26 has achieved the following milestones:Definition of a detailed functional model based on the ISO sensor network reference architecture fused with modern IoT architectures based on ITU, IEEE, ISO, and IoT ARM standards, providing a detailed extension of requirements, interfaces and flow analysis for the main use cases of the project.Improvement of the Bubble entity layered model of the SCOTT architecture using fog, edge computing and 5G modern architecture concepts.Link of architectural and network security to safety issues using the philosophy of aeronautics and automotive safety related standards.Full interoperability analysis with other IoT and cloud computing platforms such as Fiware, Microsoft Azure, IBM, etc. Implementation of trustworthiness and security metrics analysis for different layers of the architecture and different entities of each use case. Definition of the Level 2 interoperability solution for communication between Bubbles with trustworthiness vector indicator provided by the cloud computing solution of the railway domainDefinition of a set of Bubble gateway components with enhanced security for automotive, wireless avionics intra-communications, and building access controlImproved modelling of vehicular network components and networks that will have an impact on the reliability of IoT solutions,Creation of network components that allow connectivity in challenging and remote locations using a variety of technologies such as satellite links, obstacle and metallic environments, turbulence conditions, etc. Definition of cloud computing elements that allow a variety of use cases to benefit from centralized processing with improved security, privacy and (if applicable) safety.Implementation of security metrics, security classes and privacy labels in different use cases.Alignment of spotlight use cases with the reference architecture, highlighting interfaces, vulnerabilities and risk assessment.
Find out more via https://scottproject.eu/
 
Peter Priller
added an update
Students: tell us about your bachelor or master thesis, PhD dissertation or any kind of accomplished student project addressing security, safety, trust, and dependability in IoT and win up to 1300 € or more, and additionally get access to interesting internship/job offers. The contest finalists will have the opportunity to present their projects to representatives of leading European companies and universities.
Visit our website for more details: www.scottproject.eu/studentcontest
 
Peter Priller
added an update
SCOTT Technologies for Autonomy and Energy Efficiency of Wireless Sensor Networks
SCOTT’s WP25 aims to improve autonomy of devices and energy efficiency of Wireless Sensor Networks (WSNs) through the development of a set of Building Blocks that will help to achieve the following objectives of the Technology Line:
  • Development and integration of energy harvesting and energy storage technologies applicable in different contexts and industrial domains.
  • Development of novel, energy efficient hardware and software components for WSNs.
  • Development of methods for integration and testing of energy-constrained WSNs.
Some of the main research results from this WP are:
  • Security enhancement of a WSN prototype for automotive test-beds considering tight energy and low computational resources constraints.
  • A local oscillator signal generation sub-system designed within strict power consumption constraints, as part of an integrated UWB SoC to be used for the purposes of distance bounding in secure car access system solutions (see picture).
  • An energy prediction algorithm to predict energy income on devices operating with a minimum amount of energy, by adjusting the time slots for data transmission, in order not to deplete the energy stored (see picture). This algorithm has been integrated into a harvester device developed for environments where the energy source is either not predictable or steady but with very low voltage generation.
  • An energy supply system for electronic equipment used in on-track segments, which harvests energy from two primary mechanical sources (track deformation and air displacement when a train is passing by, see picture) and from solar photovoltaic panels as a third source.
  • A concept study of security aspects for in-vehicle WSNs considering the energy constraints of devices powered by batteries, energy harvesting system, or a combination of both.
  • An investigation of how fault level injection techniques can contribute to a fast release of large and complex systems.
  • Technologies supporting efficient and secure network deployment, runtime operation, and maintenance of in-vehicle networks, for the layers above the physical layer.
 
Peter Priller
added an update
SCOTT is proud to announce another high-rank publication: Georgi Nikolov and his co-authors from the Cork Institute of Technology (CIT) published "ASR - Adaptive Similarity-Based Regressor for Uplink Data Rate Estimation in Mobile Networks" in the IEEE Journal on Selected Areas in Communications June 2020 special issue on Advances in Artificial Intelligence and Machine Learning for Networking (DOI: 10.1109/JSAC.2020.3000414). Publishing in such high prestigious journal is just another testament of the great work all the partners are doing in SCOTT. Find out more about SCOTT at https://scottproject.eu/
 
Peter Priller
added an update
SCOTT organizes the International Student Contest "Secure and Trustable Wirelessly Connected IoT", organized and sponsored by NXP, AVL, VIF, UIO, GUT, Pomorskie Voivodeship (Poland), Interizon ICT Cluster, and AP/MTT/AES Joint Chapter, IEEE Poland
1st PLACE: 1300€ 2nd PLACE: 1000€ 3rd PLACE: 700€ Additional SPECIAL PRIZES for finaliststs: 500 € each, cool gadgets and books and internship opportunities
Tell us about your bachelor or master thesis, PhD dissertation or any kind of student project and win awesome prizes!Think of wearables used in healthcare and smart living, think of your smart home appliances, future smart cities, connected cars, or all the machines collaborating in a modern production facility (talk Industry 4.0). They are all part of "The Internet of Things" (IoT), which revolutionizes our everyday life, one of the most important drivers of digital transformation. But are the IoT devices secure? Can you trust them?The European research project SCOTT (Secure COnnected Trustable Things) consortium organizes a competition for students and recent graduates. If your bachelor or master thesis, PhD dissertation or student project of any kind addresses issues like security, safety, trust, and dependability applicable to wired and wireless communication or can be used in interesting IoT applications, send us its description, applicability fields, together with your CV. We are interested in accomplished projects targeting industrial domains like automotive, aeronautics, building, health, robotics, smart manufacturing, etc. that can be a part of the future secure and wirelessly connected world.The contest finalist will have an opportunity to present their projects before representatives of the leading European companies and universities in September 2020.
To apply go to https://scottproject.eu/
Topics:The contest will be focusing on (but not limited to) the following topics:
  • Advanced wireless sensor networks (WSN) and IoT concepts for industrial use cases in domains like automotive, aeronautics, building, health, robotics, smart manufacturing, with the focus on one or more of the following attributes: security, safety, reliability, trustability.
  • Theoretical aspects of security, privacy, safety and trust for IoT.
  • Innovative energy-constrained and autonomous IoT components.
  • Dependable WSN with enhanced energy efficiency, robustness and quality-of-service.
  • Physical layer and out-of-band security in WSN applications.
  • Routing and scheduling algorithms for reliable real-time WSNs.
  • Secure identification, authentication, authorization and communication in WSN.
  • Trust anchors and trust indicators for secure IoT systems.
  • Edge and Cloud computing services for safe and secure connected mobility applications.
  • Secure localization using radio technology.
  • UWB solutions for distance bounding and positioning.
  • Secure car access technologies.
  • Secure and robust Integration of IoT systems with edge/cloud services.
  • Connected vehicles (e.g. cars, trucks, …) interacting with personal mobile devices and systems of passengers, road participants, other vehicles and cloud services.
 
Peter Priller
added an update
SCOTT partner TU Delft (TUD) has produced a little video explaining their work in WP24 for low latency WSAN systems: https://youtu.be/WEh2nDZj7x8. Connected vehicles need to react to imminent threats fast enough. Therefore, they leverage edge computing to perform the bare minimum analysis to detect threats that require immediate action. TUD developed a set of small robot cars to test out and showcase this work. A partially completed version of TUD's testbed is shown in the video. More on SCOTT can be found at https://scottproject.eu/
 
Peter Priller
added an update
SCOTT's WP24 is dedicated to Distributed Cloud Integration, connecting IoT via vehicular and 5G networks. Here the focus is on
  • remote management, configuration, and seamless heterogeneous communication of wireless devices
  • Provisioning of guidelines for Application Layer Protocols on cloud architectures
  • analytics platforms
  • mobile Edge Computing for Security and Privacy
  • secure cloud-based services for mobility applications
  • Adoption of ABAC models using semantic technologies 
  • cloud technologies for 5G network slicing
Interested? Recent research results include
  1. A Vehicle Telematics Service for Driving Style Detection: Implementation and Privacy Challenges, VEHITS 2020, http://www.insticc.org/node/TechnicalProgram/VEHITS/2020/presentationDetails/93294
  2. Cross-Federation Identities for IoT Devices in Cellular Networks, ETFA 2019, https://ieeexplore.ieee.org/document/8868982
  3. Towards a Generic IoT platform for Data-driven Vehicle Services, ICVES 2018, https://doi.org/10.1109/ICVES.2018.8519505
 
Peter Priller
added an update
We are proud to announce that SCOTT is featured as Project of the Week on cyberwatching.eu! Check it out on https://cyberwatching.eu/services/catalogue-of-services/project-week-scott
 
Peter Priller
added an update
​SCOTT's Work Package WP23 on Safety and Security consists of a number of Building Blocks that address different aspects of safety and security. As a part of the work, key objectives of this Safety and Security Technology line are:
  • Development of solutions to build trust in smart wirelessly connected devices, components and systems.
  • Development of a flexible security and privacy architecture that allow pre-processing of data depending on the use case e.g. gateway support, end-device capability.
  • Development of integrated safety and security development approaches.
Recent and publicized results from this work package include the work and demonstration of Remote Attestation (with talks on that topic available at the Code::Dive conferencehttps://codedive.pl/index/speaker/name/gabriela-limonta and https://codedive.pl/index/speaker/name/ian-oliver), as well as the previously promoted Security Scan methodology document for basic checking of a network architecture's following of state of the art security procedures and protocols https://www.researchgate.net/project/SCOTT-Secure-Connected-Trustable-Things/update/5e625442cfe4a7bbe563d4e4
 
Peter Priller
added an update
The Semantic Attribute-Based Access Control (SABAC) demonstrator presents a solution designed to ensure easy deployment of the systems created in SCOTT's Workpackage 9 Secure Connected Facilities Mangement. It will improve its performance, enhance the security of the whole system, and improve the interoperability. SABAC provides fine-grained access control, dynamic and context-aware access control by considering the context surrounding subjects (i.e., users or requesters) and objects (i.e., resources) & improves the interoperability by making decisions semantically and considering the semantic relationships for inferring new policies (i.e., implicit policies). Watch the great and informative video here: https://www.youtube.com/watch?v=TVWy2v0ToJM
 
Peter Priller
added an update
SCOTT partner TUG just released a video on YouTube explaining the X-Burst technology in under 6 minutes - see https://youtu.be/7OgCQzbUQQE. X-Burst is the innovative new technology providing Cross-Technology Broadcast Communication between off-the-shelf Wi-Fi, BLE and ZigBee Devices.
This video provides an introduction to the basic principles, and shows a demonstrator proving that off-the-shelf Wi-Fi, BLE, and IEEE 802.15.4 devices such as the Raspberry Pi 3B+, the TelosB mote, the TI CC2650 Launchpad, and the Zolertia Firefly can broadcast cross-technology frames to each other with an effective throughput above 1 kbps.
 
Peter Priller
added an update
We are happy to announce that the SCOTT special session ("SS1:Trustworthiness and Security Focused Wireless Industrial IoT Networks") we have suggested and organized is accepted and in the WFCS conference program.
Due to the current global situation, the WFCS2020 will be held virtually on 27 - 29 April 2020, see https://www.cister-labs.pt/wfcs2020/
The following papers will be presented:
* TDOA-enhanced DistanceBounding in the Presence of Noise
* Lifetime Security Concept forIndustrial Wireless Sensor Networks
* Tightening up security in lowpower deterministic networks
* Energy-efficient LinkCapacity Overprovisioning in Time Slotted Channel Hopping Networks
We do not have detailed information on the procedure yet, but we will keep you informed.
A big thank you to the organization team (Andreas, Kristina, Leander, Lukasz, Michael, Peter, Tomas)!
 
Peter Priller
added an update
Our sincere thanks go to all those who are helping to master the great challenges of the current crisis: whether in the health sector, public service, or simply in helping others.
Many of us need to stay at home, having to balance family life and work within new constraints. We work from remote, and try to take care via distance for our loved ones. Many of us rely on the Internet now even more than ever.
Digitization is a big help, allowing us to do so much, more and more, location-independent.
Spotlight on secure, connected and trustable things - this is exactly the vision SCOTT has started with about 3 years ago. For example, support caring for elderly people while travel restrictions are imposed in such times of crises: see the recent post on Assissted Living and Community Care (https://www.researchgate.net/project/SCOTT-Secure-Connected-Trustable-Things/update/5e67455f3843b0499fee82a7).
SCOTT contributes in many ways, serving with safe, secure and trustable solutions at home, mobility and helping to run industrial facilities. We aim to show this at our final event and market place, with many demonstrators across a variety of use cases.
This final event is currently planned to take place in Graz, Austria, during the first week of June, 2020. However, it is hard to predict how situation and restrictions across Europa will evolve over the next weeks. The project coordination team carefully monitors the situation. @SCOTT partners: please report current status and foreseeable impact of travel and work restrictions on final demonstrators periodically to the coordinator to improve planning.
Stay safe!
 
Peter Priller
added an update
Given that the share of elderly people in Europe continues to increase there will be a growing need for smart and secure monitoring systems in order to provide high quality elderly care without increasing costs by an effective use of caregiver resources. The (WP21) Assisted Living and Community Care System provides an integrated solution for monitoring patients or elderly, signaling alarms to available caregivers and allowing them to enter the house or apartment for giving care (only) when needed. An integrated ALCCS demonstrator for elderly monitoring and caregiver notification in case of emergency events was build and tested by various SCOTT partners. One of the sensors used for monitoring in this demonstrator is a presence sensor by Xetal/Yugen (see https://youtu.be/5rNn8zA25Dk for more information) that has been tested and matured with support from the SCOTT project and which is now ready for commercial application.
 
Peter Priller
added an update
An Indoor localization system developed by GUT within SCOTT project was presented on 21st of February during the annual meeting of specialists working in the area of translational medicine in Gdansk. Over 150 specialists from different fields of medicine, biology, biotechnology, pharmacy and chemistry, that work together in the biggest translational medicine centre in northern Poland, discussed relevant new preclinical research and disease-targeted research outcomes, that can be used to develop new methods to improve human health and longevity. During the meeting, Lukasz Kulas presented indoor localization system and also SCOTT methodology that can be used to set different privacy and security levels in different instances of the system. Presented achievements gained a lot of attention form translational medicine specialists - as the system can be used to support different needs with different privacy levels. When the system supports management of medical samples and organs for transplantation the privacy level can be low to better focus on safety and time-relevant issues. But when the system will be used to provide safety to elderly patients the privacy level will be higher to protect patient’s privacy and, as a consequence, higher acceptance of the system.
Find out more about SCOTT at https://scottproject.eu/
 
Peter Priller
added an update
Within the SCOTT project, the security researchers investigating specifically how to secure connected infrastructures have decided to write a general recommendation methodology for simple good practices. The document, so-called a "Security Scan", is meant to be used as a sort of checklist of basics to ensure that the most common entry points, attack vectors, and typical oversights and mistakes, are avoided and covered. While non-exhaustive and clearly oriented toward the architectures considered in the SCOTT projects, we hope that through following this simple checklist, users of the document (and infrastructure designers) can make sure that their infrastructure and systems are answering the most common security questions and concerns. The Whitepaper is available here: https://scottproject.eu/download/whitepaper-security-scan-methodology-for-cloud-connected-iot-devices/
Learn more about SCOTT using https://scottproject.eu/
 
Peter Priller
added an update
We are happy to congratulate the team of TU Graz for the best demonstration award at the 17th International Conference on Embedded Wireless Systems and Networks held in Lyon (France) on February 17-19, where they showcased their work on "Cross-Technology Broadcast Communication between Off-The-Shelf Wi-Fi, BLE, and IEEE 802.15.4 Devices" carried out within SCOTT. Specifically, the demonstrator shows how off-the-shelf Wi-Fi, BLE, and IEEE 802.15.4 devices such as the Raspberry Pi 3B+, the TelosB mote, the TI CC2650 Launchpad, and the Zolertia Firefly can broadcast cross-technology frames to each other with an effective throughput above 1 kbps.
The demo abstract is available at: http://www.carloalbertoboano.com/documents/brunner20ctc.pdf You can find out more information about SCOTT at: https://scottproject.eu/
 
Peter Priller
added an update
A promo video presents concepts that Vemco is working on in the SCOTT’s WP9: Secure Connected Facilities Management. Among these are using a smartphone as an access card and making a process of inviting guests possibly simple by reducing cumbersome formalities. Some of the presented functionalities are or will be demonstrated in other videos onthe SCOTT’s YT channel. The rest will be developed after the project depending on your feedback that would be highly appreciated! Watch it on our YouTube Channel: ttps://youtu.be/vCBJHsXT9Mg
Find more about SCOTT on https://scottproject.eu/
 
Peter Priller
added an update
Watch our SCOTT demonstrator by Telenor, Wolffia and OsloMet on YouTube! This demonstrator showcases the work in the WP21 (Assisted Living and Community Care) and in the WP24|BB24.L (Adaptable Network Slicing). The video is showing an early 5G testbed using open source software, in which concepts such as network slicing and identity management among others are implemented and also demonstrated how they can be helpful for daily-life situations and types of communities such as the elderly people. The video is available here: https://youtu.be/4SDFj059AhY
 
Peter Priller
added an update
SCOTT UC20 (Trustable Warning System for Critical Areas) aims to reinforce the critical areas in the railway domain, for instance the level crossing or working areas with operators located near the track. In addition, this WP increases the interoperability between the automotive and rail domain. For this purpose, the wireless communications between vehicles to anything (V2X) are implemented, gathering data from different sensors and providing information to external users, such pedestrians and drivers. An additional target is to link the rail with the automotive domain, as a proposal for the connected car in the future.
Nowadays, the level crossing alert is based on a trigger located on the track, mechanical or electronic, which activate the barriers and signals indicating the approaching of the train and it avoids the occupation of the track by vehicles or pedestrians. This mechanism is limited, due to its incompatibilities with other technologies and its non-flexibility to adapt it to other critical areas, such working areas. In addition, this system is analogical, and it does not allow any modifications from its initial design and setup, changes due to modifications on the speed or composition. In general, the current systems deployed for the critical areas shows a lack of safety in some situations.
The solution proposed for the UC20 is based on the wireless communication between the train and the critical area. This communication is in both directions, the critical area provides data about the possible track obstacle and the train dynamic information. Taking this data, the system provides safety answer for each situation. On the other hand, the use of wireless connectivity allows its integration with other domains, such the automotive one.
During the second year of the SCOTT project, the V2X communications have been tested in a real environment at INDRA installations achieving successful results. Moreover, the solution obtained from the UC20 will be tested in a real scenario in Germany.
More information on SCOTT, its technologies developed and publications available can be found in https://scottproject.eu.
 
Peter Priller
added an update
SCOTT UC19 (Smart Train Composition Coupling) aims to develop and test in a real environment a solution focused on the management and control of multiple compositions via remote control from only one of them. It means to implement effectively secure and safe wireless technology for the communications between trains.
The currently coupling system available at the railway industry is based on a mechanical and physical joint between two or more compositions. One of the problem of this system is the needs of works for creating the physical composition (slow manoeuvres in depots and shunting yards). The second problem of this system is the limitation for traction long and heavy compositions, with one or several locomotives.
The virtual coupling developed in the UC19 ensures a safety manoeuvre avoiding the physical connection, as well as reduce the traction needs for long and heavy compositions. The solution also enables the communication between the trains (V2V communications), allowing them to automatically accelerate and brake together as well as manage them to follow each other at a closer distance. This means an improvement in the line capacity, which nowadays is limited, as a result on the reduction of the distance between compositions.
During the second year of the SCOTT project, the V2V communications have been tested in a real environment at INDRA installations achieving successful results. Moreover, the solution obtained from the UC19 will be tested in a real scenario in Germany.
More information on SCOTT, its technologies developed and publications available can be found in https://scottproject.eu.
 
Peter Priller
added an update
GUT and Vemco work together in SCOTT's Use Case on solutions that can increase users’ comfort as well as their safety and security in facility areas. The main developed concept is spatial-based authorization and authentication, i.e. use of information about user’s or asset’s location as an additional factor in the authorization and authentication process. This mechanism can be used, for example, to detect the user’s presence in a forbidden zone, monitor expensive assets or help in an emergency evacuation.
Watch it now on YouTube: https://youtu.be/j9uTYYycRk4
More about SCOTT: https://scottproject.eu/
 
H.-P. Bernhard
added an update
I am very pleased to publish the CFP of the SCOTT Consortium's "Special Session on Trustworthiness and Security Focused Wireless Industrial IoT Networks" for the next WFCS 2020 in Porto (https://lnkd.in/dTrszyG). If you have interesting contributions you are welcome to submit them.
 
Peter Priller
added an update
SCOTT UC18 (Autonomous Wireless Network for Rail Logistics and Maintenance) aims to develop and test in a real environment an autonomous wireless network on the railways tracks as well as on the trains, to increase the efficiency on the management due to the cargo and rolling stock monitoring for Logistics and Maintenance purposes.
Nowadays, in the railway domain, the means for managing infrastructure and the rolling stock is expensive to install and maintain. It requires long wired installations, which increase costs. Furthermore, these systems are based on human supervision, including procedures as the wagon identification, the confirmation of the composition or the maintenance needs for infrastructure devices.
To minimize the need of an operator and increase the security and safety in the railway domain, the UC18 implement and demonstrate wireless sensor networks along the tracks and on the trains, including the required communication systems, to establish a wireless connection between the sensors and the cloud platform (V2X communications).
The system also incorporates sensors for monitoring transported cargo and other information about the wagon content. This allows the logistics companies to perform tracking of the cargo through the end-user application.
During the second year of the SCOTT project, the V2V communications have been tested in a real environment at INDRA installations, achieving successful results. Moreover, the solution obtained from the UC18 will be tested in a real scenario in Germany.
More information on SCOTT, its technologies developed and publications available, go to https://scottproject.eu.
 
Peter Priller
added an update
GUT, FEV, and Vemco work together in one of SCOTT’s Use Cases on comprehensive solutions related to vehicle-as-a-sensor within a smart infrastructure.
This video presents three scenarios:
1. Entering the facility,
2. speeding detection and
3. entering the forbidden zone.
The first scenario presents the authorization and authentication process of both the driver and their vehicle using V2X communications and a mobile app. The latter scenarios present how real-time processing of the vehicle data like speed or position can improve safety and security at the facility.
Check it out on SCOTT YouTube Channel: https://youtu.be/t2ZqlSyGNvE
A whole lot more about trusted and secure IoT can be found on https://scottproject.eu/
 
Peter Priller
added an update
Use the chance and visit us at our SCOTT booth at the ECEFS 2019 in Helsinki. We will inform you how to realize the full potential of IoT and how to build trust in wireless solutions and increase their social acceptance. We are looking forward to welcome and meeting you at our booth!
 
Peter Priller
added an update
Representatives from SCOTT Project met in Madrid, Spain. It was hosted by our project partner Indra. Members took advantage of this fruitful live meeting by clarifying as many topics as possible. After more than two years of highly motivated project work the experts from industry and research discussed the progress made and defined next steps to reach the project goals. Throughout the event, the beneficiaries were updated on the current “status quo” and worked intensely on their joint vision of the SCOTT project. Several topic-specific sessions and workshops offered enough room for interesting discussion. A big thank to our team from Indra for organizing this 3-day event!
 
Peter Priller
added an update
​SCOTT's partner TU Graz has developed an open-source, portable, and lightweight update framework for constrained IoT devices named UpKit. This framework encompasses all phases of the software update process: from the generation and signature of a new firmware, to the transmission of the latter to an IoT device, its verification and installation. UpKit employs a novel update architecture that is agnostic to how new firmware images are distributed and that introduces a double-signature process to guarantee the freshness of a new firmware.
Curious? Check out the implementation for several operating systems, off-the-shelf hardware platforms, as well as cryptographic libraries at https://github.com/updatekit/upkit A paper describing UpKit in detail was also recently published at the 39th IEEE International Conference on Distributed Computing Systems (ICDCS), and can be downloaded from http://www.carloalbertoboano.com/documents/langiu19upkit.pdf There is so much more to see ... check out https://scottproject.eu/
 
Peter Priller
added an update
We are happy and proud to report a very successful 2nd review (Y2) which took place in Brussels on October 10th (accompanied by a prep meeting the day before). Efficient and rigid time management allowed to provide a concise overview of one year of work for 31 (!) work packages. Several life table-top demonstrations as well as videos of larger demonstrators provided a good indication on what was achieved. Thanks to our project officer, our reviewers and all presenters, as well as ECSEL hosting us in the White Atrium!
 
Peter Priller
added an update
We are proud to report that the workshop "WS01: Workshop on Secure and Trustable Wirelessly Connected Industrial IoT" took place very successfully on September 10th 2019 at ETFA-2019 in Zaragoza, Spain.
After almost a year of preparation by a dedicated SCOTT team, and a CfP which drew lots of attention and papers, a dense and highly interesting program took place on the first day at ETFA. First very good overview on SCOTT and its main ideas was given by Hans-Peter Bernhard from Johannes Kepler University (JKU). This was complemented by Martin Kubisch's highly motivating keynote "IoT in aerospace: The challenge of long device lifetime". The rest of the day was packed with 13 great presentations of research in the IIoT domain from both external researchers and project-partners. The Agenda and papers presented can be found here: http://www.etfa2019.org/ws01-workshop-on-secure-and-trustable-wirelessly-connected-industrial-iot/. Thanks all for organizing and managing this event!
 
Peter Priller
added an update
At the SCOTT Vehicle Data Hackathon, the team of the University of Applied Sciences - Campus Hagenberg won the final. With their idea to use vehicle data of several drivers provided by the SCOTT partner VIRTUAL VEHICLE (Graz) (which is freely available here: https://zenodo.org/record/2661316#.XZSJbGZS9PY) such as speed, rpm, GPS data, steering wheel angle, acceleration sensor values in all directions, temperature of the engine, outside temperature, etc., the team was able to calculate meaningful predictions about the condition of the vehicle or the driving environment, e.g. show where strong brakes happen. They also proposed an algorithm idea to authenticate a driver just by its individual acceleration behavior. Thereby they convinced the top-class jury with representatives from ACCIONA, AVL List, JKU Linz, INDRA, Technical University of Graz, Philips Lighting, GUT, SmartIO, NXP, Nokia, VIRTUAL VEHICLE, and the University of Oslo. As a reward, the three students Lukas Rogl, Alina Kuttler and Simon Krög of the Automotive Computing Studies at the Campus Hagenberg won 1.250 Euro. Congratulations! The success was also reported in the media, among other things there was a report in the 2 different editions of the local newspaper "Tips" (https://www.tips.at/nachrichten/waldneukirchen/wirtschaft-politik/475801-fh-trio-gewinnt-internationalen-hackathon) and reports on the accounts of the University of Applied Sciences, which mention project SCOTT as well.
 
Peter Priller
added an update
This (https://youtu.be/In81mR648yA) video features the use-case Vehicle-as-a-Sensor within Smart Infrastructure.
Big factory premises have strict traffic rules on their sites. Safety schooling for external personnel takes a lot of time. Within the SCOTT EU-Project, the Virtual Vehicle Research Center suggested using autonomous driving vehicles. To provide access to this vehicle, Vemco created an authentication system which was integrated into an autonomous car of the Virtual Vehicle Research Center.
Future appliances may now follow the listed procedure: I) The technician visits the factory site II) The receptionist hands over a tablet for authentication III) An autonomous vehicle with an authentication system is provided IV) The access control to the vehicle is handled between tablet and vehicle V) The vehicle drives autonomously to the destination
See how this works on SCOTT project Youtube channel: https://youtu.be/In81mR648yA
Links:
 
Peter Priller
added an update
The ongoing liberalization of the European railway market, based on the open access to railway capacity for any railway company, poses a set of challenges, among which the optimization of the capacity allocation is a key issue for the emerging new ecosystem.
Use Case 17 of SCOTT addresses this topic by focusing on a scenario of logistic management in multimodal hubs, more specifically, a shunting yard/depot. In such scenario, the provision of interoperable information across all the involved stakeholders (e.g. multi-modal logistics operator, railway operator, and eventually, the shunting yard operator), the continuous tracking of freights, and the optimization of the yard management, are all key aspects for the success of the upcoming new business models.
In line with the focus of SCOTT on wireless solutions, the use case proposes a real time management network that will integrate a wide range of wireless infrastructure and communication elements and technologies, including WSN (Wireless Sensor Networks), GNSS (Global Navigation Satellite System), cargo identification, and backhauling via Satcom.
This is in fact a cross-domain use case, as it aims to combine logistics and railway operational environments, which are currently segregated. This will be addressed through the provision of a gateway connecting heterogeneous data sources and sensors, the unification of data formats, and the integration with a cloud-based centralized monitoring system.
Moreover, the use case explores new IoT-based methods to improve the planning, management and optimization capabilities of logistic infrastructures, and to centralize rail infrastructure information from both track and trains, thus opening new opportunities in the rail logistics market.
The use case makes use of a wide range of technology building blocks developed within Scott project, addressing topics such as security & safety, distributed cloud integration, and energy efficiency and autonomy of wireless devices.
More information on technologies developed in project SCOTT can be found at https://scottproject.eu/
 
Peter Priller
added an update
Best paper award for the article describing the X-Burst cross-technology communication framework!
We are happy to congratulate the team of TU Graz for the best paper award at the 16th IEEE International Conference on Sensing, Communication and Networking (SECON) for their work on "Enabling Multi-Platform Cross-Technology Communication between Constrained IoT Devices" carried out within SCOTT.
You can find out more information about SCOTT at: https://scottproject.eu/
 
Peter Priller
added an update
From: SCOTT <sps@avl.com> Sent: Montag, 1. Juli 2019 09:43 To: Priller, Peter AVL/AT <peter.priller@avl.com> Cc: Priller, Peter AVL/AT <peter.priller@avl.com>; manuela.klocker@v2c2.at Subject: ResearchGate
Dear ResearchGate-responsible,
a new announcement has to be posted on 6/27/2019.
Below you can find the details.
****************
Title: SCOTT Members in the wining team of Airbus competition!
Content:
Mr. Nikos Kouvelas, who is working on SCOTT project, is one of the students out of four of the winning team from TUDelft who won the Airbus challenge in IoT stream. The team was mentored by another SCOTT member Dr. R Venkatesha Prasad, an Associate Professor, in TUDelft who is the TUDelft lead for SCOTT project. Needless to say that the idea was inspired by TUDelft work in WP16 of SCOTT project!
For more on SCOTT see https://scottproject.eu/
 
Peter Priller
added an update
We are happy to congratulate the team of TU Delft for the BEST PAPER AWARD at the The Fourth IEEE International Conference on Fog and Mobile Edge Computing (FMEC 2019) for their work done in SCOTT: Reinforcing Edge Computing with Multipath TCP enabled mobile device clouds.Find out more about SCOTT at https://scottproject.eu/
 
Peter Priller
added an update
SCOTT partner TU Delft develops a cost-effective, battery-less, miniaturized, wireless IOT switch, for interesting applications like in passenger planes. Of course security is included. Curious? Have a look at https://youtu.be/Mp_QWyykEs0
 
Peter Priller
added an update
SCOTT partners met in wonderful Gdansk, Poland and had a successful and great time!
Nearly 90 representatives took advantage of this fruitful live meeting by clarifying as many topics as possible. Throughout the event, the beneficiaries were updated on the current "status quo" and worked intensely on their joint vision of the SCOTT project. Several topic-specific sessions and workshops offered enough room for interesting discussions, innovative solutions and also fun. A Hackathon session with award ceremony, a demonstrator session with already available demonstrators as well as results from publications and a session on exploitation activities showed the already existing impact of SCOTT project.
The Team from Gdansk University were excellent hosts, thank you very much!
 
Peter Priller
added an update
​SCOTT UC 16 (Secure Wireless Avionics Intra-communications) intends to leverage wireless technology on board commercial aircraft. This means to effectively implement secure and safe wireless technology in real applications to be used by the aeronautics industry.
The aeronautics domain has conducted a full analysis of vulnerabilities and potential countermeasures for the hybrid aircraft wireless/wireline infrastructure. Following standards of the industry, a joint security/safety analysis for wireless aeronautical networks has been proposed. The aeronautics domain has also adopted the concept of security classes and privacy labels that is foreseen in future certification/standardisation and regulation aspects in the EU. Several issues have been addressed, including propagation modelling for reliable transmission and reduced leaking or interference, as well as MAC-PHY cross-layer design to reduce conflicts between different subnetworks in the same aircraft and minimize interference to control subsystems.
Secure links will be addressed by minimizing transmissions to potential eavesdroppers or unsafe locations either within the same or in other airplanes. Privacy of data will be also addressed by convenient mechanisms and data-context management with ground control. The aeronautics industry expects huge benefits from the use of wireless technologies. It is estimated that cables constitute over 70% of aircraft weight. The use of wireless links could reduce this figure down to 55%. It is estimated that the use of wireless technologies will bring a 12% reduction in terms of fuel consumption. It is also estimated that 13% of an aircraft operation cost is related to maintenance, reparation and overhaul. Automatic configuration, maintenance and troubleshooting can be performed over the air reducing maintenance service costs thanks to wireless technologies.
SCOTT UC 16 will demonstrate secure wireless transmission for an active flow control application for skin drag reduction in a wind tunnel and DIMA (Distributed Integrated Modular Avionics) platform conventionally used in aeronautics industry.
More information on SCOTT, its technologies developed and publications available can be found in https://scottproject.eu.
 
Peter Priller
added an update
Passive keyless entry and passive keyless start systems for car access are getting higher attraction by end users and therefore higher market relevance for the car industry. Besides other known car features, a passive keyless entry or passive keyless start system allows access to the car without pulling the key fob out of the pocket or handbag. Once the user approaches the car or touches the door handle, the car will be unlocked and the user has access to the car. When the user is in the driver's seat, she/he can start the engine by pressing a start button. There is no need to insert the key into the ignition lock and turn the key fob.
The underlaying building blocks to implement such a passive keyless entry/start systems are low frequency and sub gigahertz frequency radio technologies. Existing systems are vulnerable to so called "relay attacks" which can only be mitigated by verification of the real distance from the key fob to the car by technologies which have a high resilience to such attacks.
Secure distance bounding, based on a time of flight measurement, with a radio frequency signal is introduced. Once the key fob is identified within a certain range to the car the access will be allowed and the car unlocked.
The technology building block to implement secure distance bonding is part of a SCOTT technology work package and comprises an ultra-wide band radio to measure distance based on the assumption that no signal can be faster than speed of light. Integration of the ultra-wide band radio into existing keyless entry car access systems requires proper hardware interfaces, the development of additional software components and ultra-wide band localization algorithms to satisfy the use case needs.
Key challenges are the low power consumption on key fob side to achieve more than 2 years battery lifetime and the design of an optimized localization algorithm to minimize the number of required ultra-wide band anchors on the car side for low system cost.
More information on technologies developed in project SCOTT can be found at https://scottproject.eu/
 
Peter Priller
added an update
This use case has as a goal to develop a self-aware warehouse - "a system that gathers and maintains information about its current state and environment, reasons about its behaviour, and adapts itself if necessary". The self-awareness of the warehouse system is implemented through the capabilities of (1) collecting the state of the warehouse and its assets through digital twins, (2) automatically generating plans – task sequences and motion plans – to fulfil normal delivery requests as well as handle abnormal situations like goods spillage, slippery floors etc. and (3) assigning the tasks to both human workers and robots, and monitoring the execution.
Another feature of UC10 is to provide a safe collaborative environment where humans and robots can work together using a shared workspace and shared resources where fence is removed around the robot. Collaborative robotics introduces new advantages in terms of productivity and efficiency, but also new hazards, like increased possibility of collision with workers. Two-layered safety analysis is performed using real robots, simulated environment of VREP and implementing AI-based algorithms for risk analysis. The safety analysis is based on creating three-layered safety fields around the robot: red (critical), yellow (warning) and green (clear) using speed and distance monitoring and power and force limiting approaches of the standard ISO/TS 15066:2016.
The main challenges covered in UC10 are: •Automated planning and execution for mission fulfillment given by warehouse manager •Automated decisions at run-time •Ensuring safety for warehouse exhibiting collaborative robots •Information modelling allowing devices and systems interoperability •Monitoring of warehouse status
 
Peter Priller
added an update
One of the domains the SCOTT focuses on are IoT solutions in the area of buildings and facilities. In WP15 there is a special attention to industrial area with high safety and security requirements. The main objectives are ensuring communication between car and infrastructure and implementing the trustable “car as a sensor” approach in order to highly increase situational awareness and enable flexible access rights management. From technical point of view, the main focus is put on development of intelligent mechanisms (context-aware reasoning) in order to increase the efficiency of safety & security systems and developing a data integration model which allows for utilization of various types of data.
We expect to see impact in cross-domain application for car-to-car infrastructure communication; model of flexible business rules for precise vehicle access rights management; platforms for car-to-infrastructure communication.
Mor information on SCOTT, its technologies developed and publications available can be found in https://scottproject.eu.
 
Peter Priller
added an update
We are proud to announce the SCOTT Workshop “S01. Workshop on Secure and Trustable Wirelessly Connected Industrial IoT” at the ETFA 2019, see http://www.etfa2019.org/ws01-workshop-on-secure-and-trustable-wirelessly-connected-industrial-iot/. In this workshop we will highlight recent advances in secure and trustable wirelessly connected IIoT. We strongly invite submissions from both SCOTT partners and outside.
Deadline for submission: May 13 (see website on changes)
The workshop will take place on September 10th 2019 as part of ETFA in Zaragoza, Spain.
Hope to see you there!
 
Peter Priller
added an update
Ensuring a high level of comfort and simultaneously safety and security in facility areas (buildings, infrastructure objects, and installations) is one of the most challenging and ambitious directions of development in situation awareness systems. The main challenges of the SCOTT’s Work Package 9 are related to detection, identification, and localization of objects with permanent monitoring of their behavior inside buildings. The other challenge is to utilize the data provided by positioning systems in order to enhance the level of access control in building and facilities. The main technical challenges are close to the real-time operation, the operation in a harsh environment, the reliable merging of data from different sources, physical layer security, localization accuracy, and precisions. More on https://scottproject.eu/
 
Peter Priller
added an update
The good news of today: „European Parliament adopts EU Cybersecurity Act to reinforce cybersecurity in the EU” (see http://europa.eu/rapid/press-release_MEX-19-1653_en.htm)
The SCOTT consortium started with a strong vision of “Building Trust in the Internet of Things”. Thus we see a lot of potential in the EC’s step, which will support Cybersecurity in Europe by
  • strengthening the role of the European Agency for Network and Information Security (ENISA)
  • establishing a common European cybersecurity certification framework for IT services, systems and equipment
  • a proposed €2 billion to reinforce cybersecurity in the Digital Europe Programme
Project SCOTT focuses on security and trustability in IoT. For more details in ongoing research and industrial demonstrators see http://scottproject.eu/
 
Peter Priller
added an update
A new study by IBM on privacy needs of consumers reveal some interesting numbers: according to the study, 89% say technology companies need to be more transparent about their products. This is what the SCOTT project had in mind when starting to work on “Privacy labels” and secure, privacy aware technologies. Find out more on SCOTT by visitng https://scottproject.eu/
Lots of ideas and results can be found in SCOTT’s publications, see https://scottproject.eu/media/publications/
 
Peter Priller
added an update
In recent years, the number of connected wireless devices has increased to billions. Meanwhile, wireless devices malfunction and cannot do what they are intended to do because of technical problems or malicious activities. The traditional approaches cannot handle the increased volume of technical issues in wireless networks, as it is too time consuming, costly and cannot scale to millions of devices. In addition, new cyber attacks and privacy concerns are threatening the trustability of wireless networks.
This is why one focus area for the SCOTT research project (https://scottproject.eu/ ) is remote monitoring and management of wireless devices to improve efficiency, performance and trustability. The managed wireless solution, EyeSaaS, consists of a secure monitoring and management cloud platform, which supports open standard protocols. The managed wireless platform can monitor and manage Internet gateways and wireless access points in homes and buildings. The aim of the platform is to reduce operational and support costs as well as improve the performance and trustability of wireless devices. You can reach us via scott@v2c2.at
 
Peter Priller
added an update
Urban people typically spend 90 % of their time indoors, which means that indoor air pollutants are a more significant health risk than even outdoor pollution. SCOTT (https://scottproject.eu/ ) facilitates the development of continuous monitoring networks and analytics solutions that can identify and predict issues with indoor air quality (IAQ). The developed IAQ system consists of a cloud-based analytics platform and multiple sensors, gateways and actuators, which have been inter-connected securely. To ensure scalability and portability, the platform supports multiple open source communication features and standards. The IAQ data interpretation is conducted by applying machine learning algorithms. The target of the IAQ platform is to ensure healthy indoor air by providing decision making support for humans and control solutions for IAQ appliances. You can reach us via scott@v2c2.at
 
Peter Priller
added an update
​SCOTT facilitates the creation of instant secure wireless networks for in-vehicle communication with the trust and pair approach. With this solution SCOTT lifts quick measurements within cars to a new level. Mechanics and test drivers do not have to remember and enter complicated passwords, nor do they have to remember the positions of the sensors. Everything is guided by tablet and security is created by a simple pairing via NFC. The concept was successfully demonstrated at the review in Brussels, now it's time to get it into the vehicle and implement the technical Trust Indicator so you can always be sure that the connection is secure and stable.
 
Peter Priller
added an update
We see intelligent systems popping up everywhere. However, citizens need clear, actionable information about privacy and security of their devices. Thomas Rosteck (Division President for Digital Security Solutions at Infineon Technologies) posted interesting thoughts on http://www.eenewseurope.com/news/consumers-need-trustworthy-secured-label?news_id=112360
Project SCOTT works on
  • Creating a convincing privacy assessment through privacy labelling
  • Answering the IoT need for a new and more advanced security paradigm through security classes
  • Establishing a clear link between security and safety
 
Peter Priller
added an update
​Dr. Silke Holtmanns from SCOTT partner Nokia Bell Labs presents today at the DeepSec 2018 a very interesting talk on "New Attack Vectors for the Mobile Core Networks (https://deepsec.net/schedule.html). Project SCOTT aims on Secure Connected Trustable Things - learn more on https://scottproject.eu/
 
Peter Priller
added an update
Today in "SCOTT's Use Cases": Secure Cloud Services for Novel Connected Mobility Applications
Challenges:This use case focuses on implementing different secure cloud services for connecting vehicles. The goal is to develop a range of applications covering connected vehicle functionalities, such as OTA Software Updates, vehicle data logging, and predictive maintenance. In order to achieve this goal a secure and privacy-aware gateway device providing vehicular wireless connectivity and data retrieval, a cloud infrastructure and an ecosystem for apps and services will be implemented. In more detail, the following key products will be developed:
  • Secure and privacy-aware gateway for in-vehicle use,
  • Wireless connectivity between vehicles and infrastructure,
  • Secure data retrieval, provisioning and transfer interface, obeying security and privacy setting,
  • User-friendly configuration of privacy and security rules,
  • Automotive remote diagnostics and update systems,
  • Solution for cooperating connected vehicles,
  • Cloud solution for connected vehicles,
  • Third-party-cloud services for quantified connected vehicles and digital ecosystem on mobile applications
The main challenge is to include the aspects privacy, data protection, authorization and authentication, communication security, usability and safety, as only trustworthy solutions will be broadly accepted by both end users and industry.
Progress:
Secure in-vehicle gateway:
A first prototype of a secure OTA software update and vehicle data logging system was implemented using TLS, and an additional end-to-end authenticated encryption for securing the communication from the in-vehicle gateway over the internet to the cloud. To increase the security even more, the gateway is running a hardened kernel (all unnecessary services, drivers, and applications were removed).
User (Driver) authentication
A first concept for secure authentication and authorization via mobile devices to access various services from the infrastructure and the car was implemented. A first prototype of a user authentication mechanisms using a mobile application was developed.
Cloud infrastructure
A basic backbone infrastructure where a set of different components are put in place to provide a flexible and scalable data acquisition and exploitation infrastructure was defined and a first prototype was implemented. All components are deployed in a Dockerised environment on top of Docker Swarm
Cloud security
By using machinery, docker images and docker swarms for our cloud reference architecture, clusters that are secure by default can be constructed and operated. In addition to containers at the operating system level, overlay networks deployed as part of a swarm are encrypted for cluster-wide communication and explicit mechanisms are offered for the spreading of secrets to relevant containers in a manner that is secure and avoids eavesdropping.Furthermore, Site-to-Site connections are used to create a hybrid solution in order to implement secure connections between on-premises networks and virtual network.
 
Peter Priller
added an update
SCOTT will be present with a booth and a talk at the EFECS 2018. Visit us at our booth and join the talk, Nov 20-22, Lisbon!
 
Peter Priller
added an update
SCOTT’s mission is already in its name: secure connected trustable things. Recently there has been a wave of IoT in consumer markets (smart home, entertainment, health,…). Citizens start to get aware of potential threats to security and privacy. Now the well-known Mozilla Foundation updated their Buyer’s Guide 2.0 in https://foundation.mozilla.org/en/privacynotincluded/ to “…help consumers shop smart — and safe — for products that connect to the internet”. Their way of classifying security and privacy is briefly descried in this blog: https://medium.com/@harraton/how-we-evaluated-the-products-in-mozillas-privacy-not-included-buyer-s-guide-2018-6b122f885de0 . Partners in SCOTT work on a comprehensive set of criteria, from the privacy labeling to security classes to trust framework. We will soon put first public available deliverables on this topic on our website https://scottproject.eu/
 
Peter Priller
added an update
The SCOTT consortium had a very productive face-to-face meeting in wonderful Cork, Ireland. Besides giving each work package team the chance for in-depths discussions, many great sessions focused on topics like SCOTT's Trust Assessment Framework, Reference Architecture, Technology lines, and presentation of current publications. Workshops provided a deep insight into e.g., how to do analyze privacy requirements of an use case or how to run to STPA/STPA-Sec analysis. The "Innovator's Elevator Pitch" as well as the "Exploitation Networking Hub" provided the stage to discuss very interesting new ideas for innovations. Thanks to the organisers! Thanks Cork for your hospitality!
 
Peter Priller
added an update
Going wireless for instrumentation of “units under test” (UUT) will provide a significant gain in flexibility and productivity in automotive testing and production. Use Case „Ubiquitous Testing of Automotive Systems” integrates highly interesting approaches from SCOTT’s research. This (https://youtu.be/fe7eCHSh7pc) video provides a short overview about (1) multimodal positioning of sensors, (2) out of band communication for secure authentication of wireless nodes and (3) energy-efficient secure wireless communication.
 
Peter Priller
added an update
Watch the SCOTT demonstration video from workpackage "Assisted Living and Community Care", shown at the review meeting in Brussels on Youtube: https://youtu.be/DxLdRplDWWQ
How can elderly be protected who are likely to fall when there is an incident? A mounted sensor in their home and a wearable that measures vital signs but also acts as a fall detector and a panic button make it possible. How this technically works is shown in this video from workpackage "Assisted Living and Community Care".
 
Peter Priller
added an update
The European Commission has published the "Proposal for a Regulation Establishing the European Cybersecurity Industrial, Technology and Research Competence Centre and the Network of National Coordination Centres” on September 12th, 2018, see https://ec.europa.eu/digital-single-market/en/european-cybersecurity-industrial-technology-and-research-competence-centre. Statement: “The Competence Centre will facilitate and help coordinate the work of the Network and foster the Cybersecurity Competence Community, driving the cybersecurity technological agenda and facilitating common access to the expertise of national centres. The proposal aims to help the Union retain and develop the capacities necessary to secure its Digital Single Market.”
Also, two interesting JRC technical reports that have been published as Annex of this regulation:
European Cybersecurity Centres of Expertise Map: Definitions and Taxonomy
European Cybersecurity Centre of Expertise: Cybersecurity Competence Survey
 
Peter Priller
added an update
What is the one most positive achievement in cybersecurity in the last 2 years?
Maybe it is that security has now the public awareness and interest it needs. Not long ago it was mostly ignored by many, but findings like Heartbleat, Meltdown or Spectre got a lot of attention, and citizen worldwide are interested in how to protect their systems, smart things and privacy – exactly what project SCOTT is about.
For a list of SCOTT publications addressing trust, security and dependability in the IoT world go to https://scottproject.eu/media/publications/
 
Peter Priller
added an update
SCOTT will create a convincing privacy assessment through privacy labelling, and answer the IoT need for a new and more advanced security paradigm through security classes.
Just recently the EC mentioned those needs: as reported on Heise (https://www.heise.de/newsticker/meldung/EU-Laender-wollen-Sicherheit-digital-vernetzter-Geraete-erhoehen-4075157.html; in German), "the European Commission wants measures for cybersecurity to be regulated at European level in future. Among other things, IT products and services will in future undergo a voluntary certification procedure. The European Commission is proposing a reform of the European IT security authority ENISA in a first draft for a European regulatory framework". Have a look at https://www.enisa.europa.eu/ (the European Union Agency for Network and Information Security (ENISA) is a centre of expertise for cyber security in Europe). What's the best way to join forces?
 
Peter Priller
added an update
ECSEL JU Book of Project vol.2 has just been published! You can find the contribution to SCOTT Project on page 64. Have a look at https://www.ecsel.eu/sites/default/files/2018-06/Book%20of%20Projects%2021%20June%202018%20website2.pdf
 
Peter Priller
added an update
​Very proud to announce that the "Best Project Presentation and Communication Award" @ECSEL_JU Symposium 2018 goes to SCOTT Project!
 
Peter Priller
added an update
The automotive domain is an important area of SCOTT. When more and more data is produced and processed in a car, how can we ensure security and privacy? In this context a report from the EC, DG Connect provides a highly interesting report: “Access to In-vehicle Data and Resources” from May 2017, see https://ec.europa.eu/transport/sites/transport/files/2017-05-access-to-in-vehicle-data-and-resources.pdf . It includes legal and technical analysis, some thoughts on current implementations and assessments. Have a look!
 
Peter Priller
added an update
Are you at the ECSEL Symposium 2018 in Brussels right now? If so, drop by at the SCOTT boot. ​Michael Karner presents our project on June 19th + 20th at this high-profile European event. One of the highlights will be SCOTT's Trust Framework, see picture attached.
 
Peter Priller
added an update
Peter Priller from AVL gave a keynote speech on June 8th 2018 at the SIES 2018 conference (http://sies2018.tugraz.at), titeled “5 reasons why IoT is key for Smart Mobility, and 5 reasons why we might fail”. So what is Peter’s top 10 list, and how does it relate with SCOTT?
5 Reasons why IoT is Key for Smart Mobility:
  1. Intelligence in vehicles: sensors + computing + connect = better cars
  2. Vehicles connected: V2x establishes dependable ADAS and autonomous driving
  3. Whole life connected connectivity and smart things in automotive development
  4. Is it efficient? Safe? Secure? … Verification and validation
  5. Industry 4.0 & Smart Production let technology join the team work in smart factories
…and 5 Reasons why we might fail:
  1. Complexity grows beyond our comprehension
  2. Connectivity vs. Vehicle Safety & Security
  3. Life Cycle and Technological Diversity
  4. Privacy and Politics
  5. Trust
There are lots of links to our project, and the bullet point “Trust” provided the perfect opportunity to introduce SCOTT. There was a lively discussion following the talk: how can we ensure, verify and sustain security in such scenarios? Thanks to the SIES 2018 team for the perfect organization, and all participants for the interesting discussion!
 
Peter Priller
added an update
SCOTT partner ISEP presented at the ISO/IEC JTC1/SC41 advisory board meeting the request for liaison between WG5 and the project SCOTT. ISO/IEC JTC1/SC41/WG5 is the working group in charge of the Internet of Things technology and applications. This activity is part of the standardization strategy of project SCOTT. The ISO/IEC JTC1/SC41 meeting took place in Berlin, Germany at the premises of the German standardization authority (DIN) from Monday May 14 to Friday May 18 2018.
 
Peter Priller
added an update
SCOTT is proud to announce another high-profile talk of a project partner: Silke Holtmanns from NOKIA will present "4G - Who is paying your cellular phone bill?" at the DEF CON 26 taking place in Las Vegas on August 9-12, 2018. Details will follow. https://www.defcon.org/
 
Peter Priller
added an update
Our 2nd face-to-face meeting has just started with the General Assembly meeting. About 60 partners joined at this great location in the very north of Norway. We are looking forward to 3 days of interesting presentations, great talks, and a lot more networking.
 
Peter Priller
added an update
The SCOTT poster presented at the RISE ICT/SICS Open House 2018 drew a lot of attention with many industrial and academic participants.
 
Peter Priller
added an update
Just another reason why we need Secure Connected Trustable Things (SCOTT): see report on “Hackers once stole a casino's high-roller database through a thermometer in the lobby fish tank”
 
Peter Priller
added an update
The Nokia Bell Labs CyberSecurity Team participating in SCOTT contributed directly and indirectly their research results to the EU ENISA report and received acknowledgements for it by ENISA. The report represents an EU wide (and not only) assessment of the current situation 2G and 3G/4G, recommendations and an opinion for 5G. They analysed areas like types of attacks and their frequencies, security measures in place, available best practices and other constraints so that we can get an overall picture of signalling security in Europe. Attention was given to different stakeholders involved so that an adequate level of protection is achieved across EU. They published a set of technical and legal high-level recommendations that they urge responsible stakeholders (EU commission, local regulator, industry) to take into account. https://www.enisa.europa.eu/news/enisa-news/legacy-technologies-as-a-threat-to-eu2019s-telecommunications-infrastructure Contacts: Silke Holtmanns Nokia Bell Labs
 
Peter Priller
added an update
Using hardware provided by partner Klas Telecom, SCOTT researchers from CIT recently took 3G/4G network coverage measurements on a train journey between Cork and Dublin. These measurements are important input for developing reliable train to infrastructure connections for rail logistics and maintenance in SCOTT.
 
Peter Priller
added an update
SCOTT partner AIT is co-organizing the Transport Research Arena fair that will take place from the 16th to the 19th of April 2018 in Vienna (TRA 2018 https://www.traconference.eu ). Using an augmented reality visualization, the SCOTT use case “Smart train composition coupling” will be presented.
 
Peter Priller
added an update
Another high-profile presentation will be given by Dr. Silke Holtmanns from SCOTT partner Nokia-Bell Labs at the IT-Security Conference TROOPERS18 on 13.3.2018: "Data Security for 4G Interconnection and 5G Interconnection Risk Areas "
 
Peter Priller
added an update
Sitting on the shoulder of giants ... amongst a long list of successors, SCOTT is also proud to benefit from DEWI's and SHIELD's results.
The SHIELD book is published, with chapter 11 on applicability of "measurable security" for DEWI and SCOTT - worthwhile to be published on social networks
 
Peter Priller
added an update
Had a good first meeting with “Zeker Online” / “Partnering Trust” in the Netherlands on 2018/01/23. It appears that "partnering trust" and the "SCOTT Trust Framework" complement each other for trusted partner relations on different levels. Looks like there is potential for further collaboration.
 
Peter Priller
added an update
Silke Holtmanns from SCOTT partner NOKIA will give a key note speech at the TelcoSec Day on March 13th 2018. Title: "LTE Security - How secure is your data", see https://www.troopers.de/troopers18/telco-sec-day/
 
Peter Priller
added an update
SCOTT's work package WP12 focuses on Secure Cloud Services for Novel Connected Mobility Applications. AVL was proud to host the 3rd F2F Workshop in Graz on January 25th 2018. Guests from VIF, RISE SICS, CISC Semiconductors AIT, JIG Internet Consulting, FEV, Bosch, INDRA, IMEC and AVL discussed in depth challenges, ideas and milestones for innovations leading to secure & connected mobility solutions.
 
Peter Priller
added an update
​Creating trust in wireless solutions and increasing their social acceptance are major challenges to achieve the full potential of the Internet of Things.
Michael Karner (Virtual Vehicle Research Center), Project Manager of SCOTT, will give a talk about "Smart Wireless Solutions – Building Trust in the Internet of Things" at the IEEE World Forum on Internet of Things, 05-08 February 2018, in Singapore
 
Peter Priller
added an update
“TT” in SCOTT stands for “trustable things”. Can you trust your phone? Silke Holtmanns from SCOTT’s consortium partner Nokia Bell Labs will a highly interesting talk titled “Mobile Data Interception from the Interconnection Link” at the 34. Chaos Communication Congress (CCC)”, 27-30 December 2017, Leipzig, Germany (https://ccc.de/de/updates/2017/34c3-cfp-tickets ).
There will be a livelink available 28.12 11.30 CET https://www.youtube.com/watch?v=LyZEKjcbPZI
 
Peter Priller
added an update
Very proud to announce that the #ECSELJU Dissemination Award goes to two ECSEL_JU projects DEWI and SCOTT- for an excellent job done to maximize the visibility of project results & future potential. See https://scottproject.eu/2017/12/11/scott-wins-ecsel-ju-dissemination-award/
 
Peter Priller
added an update
SCOTT Project @EFECS 2017: Drop by if you are at EFECS 2017 in Brussels, and use the chance to get up-to-date info. Comprehensive cost-efficient solutions of wireless end-to-end secure, trustworthy connectivity and interoperability for various application domains are shown. Our goal: bridge the last mile to market implementation.
 
Peter Priller
added an update
Interesting read: Secure Wireless Automotive Software Updates Using Blockchains: A Proof of Concept. Steger, M., Dorri, A., Kanhere, S. S., Römer, K., Jurdak, R., & Karner, M. (2018) in Advanced Microsystems for Automotive Applications 2017 (pp. 137-149). Springer, Cham. Full text: https://www.researchgate.net/profile/Ali_Dorri5/publication/318721346_Secure_Wireless_Automotive_Software_Up-dates_using_Blockchains_-_A_Proof_of_Concept/links/597959f345851570a1bb7180/Secure-Wireless-Automotive-Software-Up-dates-using-Blockchains-A-Proof-of-Concept.pdf
 
Peter Priller
added 4 research items
Future smart vehicles will employ automotive over-the-air updates to update the SW in the embedded electronic control units. The update process can affect the safety of the involved users, thus requires a comprehensive and elaborate security architecture ensuring the confidentiality and the integrity of the exchanged data, as well as protecting the privacy of the involved users. In this paper, we propose an automotive security architecture employing Blockchain to tackle the implicated security and privacy challenges. We describe our proof-of-concept implementation of a Blockchain-based software update system , use it to show the applicability of our architecture for automotive systems, and evaluate different aspect of our architecture.
Future smart vehicles will employ automotive over-the-air updates to update the soft ware in the embedded electronic control units. The update process can affect the safety of the involved users, thus requires a comprehensive and elaborate security architecture ensuring the confidentiality and the integrity of the exchanged data, as well as protecting the privacy of the involved users. In this paper, we propose an automotive security architecture employing Blockchain to tackle the implicated security and privacy challenges. We describe our proof-of-concept implementation of a Blockchain-based software update system, use it to show the applicability of our architecture for automotive systems, and evaluate different aspects of our architecture.