Improved security in open-source and open-specification hardware for connected devices

Inicio / Programas UE / HORIZON / HORIZON-CL3-2021-CS-01-02
Logo

(HORIZON-CL3-2021-CS-01-02) - IMPROVED SECURITY IN OPEN-SOURCE AND OPEN-SPECIFICATION HARDWARE FOR CONNECTED DEVICES

Programme: Horizon Europe Framework Programme (HORIZON)
Call: Increased cybersecurity 2021 EU

Topic description

ExpectedOutcome:

Projects are expected to contribute to some of the following expected outcomes:

  • Reduced security threats of open source hardware for connected devices.
  • Formal verification of open hardware.
  • Effective management of cybersecurity patches for connected devices in restricted environments such as IoT devices.
  • Effective security audits of open source hardware, embedded software and other security-relevant aspects of connected devices.
  • Effective mechanisms for inventory management, detection of insecure components and decommissioning.
  • Methods for secure authentication and secure communication for connected devices in restricted environments such as IoT devices

The proposal should provide appropriate indicators to measure its progress and specific impact.

Scope:

The quality of hardware and software, notably open source, for IoT and connected devices is improving. However, the restricted environment of many IoT devices does not allow the deployment of more complex protection schemes (e.g. Trusted Platform Modules, Sandboxing applications in managed memory partitions) and similar approaches that often rely on operating system (OS) support to ensure cybersecurity. Open Source designs are frequently used in IoT technology and become more reliable and efficient with the number of developers that deploy them. The management of this large collaborative development environment that Open Source represents is a real cybersecurity challenge.

The aim is to support European trustworthy platforms by methods, tools and technologies that foster a stronger Cybersecurity, which can serve in a variety of connected devices. The proposed action should integrate formal security models and verified and scalable cryptography that can be used in future key system components (operating systems,…).

Proposals should cover one or more of these research activities:

  • development of verifiable implementations of cryptographic solutions, authentication schemes, and, as relevant, software libraries that implement them securely in operating systems;
  • develop mechanisms to mitigate hardware-related security vulnerabilities
  • development of security auditing for connected devices;
  • development and advancing of security testing in restricted environments;
  • development and advancing of verification methods for secure firmware updates and secure software patching in connected devices;
  • development of multi-factor authentication hardware and software solutions.
  • development of the security upgrading of the connected devices within the life cycle (bootstrapping, commissioning, operational, upgrade etc.)

The participation of SMEs is strongly encouraged. In this topic the integration of the gender dimension (sex and gender analysis) in research and innovation content is not a mandatory requirement.

Keywords

Internet of Things Security testing and validation Vulnerability discovery and penetration testing Measurement and assessment of security levels. Cryptology (Cryptography and Cryptanalysis) Authentication protocols/frameworks, authorization Software engineering, operating systems, computer Internet of Things, embedded/pervasive systems Hardware technology (RFID, chips, sensors, etc.) Open hardware

Tags

secure software patching secure firmware update connected device Trusted Platform Modules multi-factor authentication bootstrapping formal security model hardware-related security vulnerabilities Sandboxing applications

¿No encuentras la financiación que necesitas?

Contacta con nosotros y cuentanos cuál es tu proyecto.