We have got to the heart of the ARCADIAN-IoT project, and after 6 months from the project kick-off, the research activity has started on the components of our new trust, security and privacy framework. Part of this work is related to the horizontal planes managing the privacy of data, security of components and decentralized storage through blockchain technologies.
The ARCADIAN-IoT partners are focusing on the research and development of the following technologies:
- Hardened encryption component which will include mechanisms to encrypt data at rest and will enable certain computations on the encrypted data for the subjects that hold special keys, this will enable encryption routines in hardware.
- Permissioned blockchain component providing immutable auditability and traceability properties to the data under management. It will provide several conditional access features for users to obtain permission to operate at given levels.
- Self-aware data privacy and Federated AI components will provide privacy preservation features to our framework; the self-aware data privacy aims at enhancing the way data privacy is managed and federated AI lets the process of training of a neural network be distributed over a collection of clients, each of which has access to a private data set that is not going to be shared.
The monitoring system in ARCADIAN-IoT includes (i) the network flow monitoring operating at the IoT infrastructure side and (ii) the behavior monitoring operating at the end-point side. In a case of a cyberattack, this component will strategically decide if the attack needs to be stopped, slowed, mirrored, monitored, or simply ignored and where to apply the prevention mechanism.
Information about threats and threat actors will be managed by the ARCADIAN-IoT Cyber Threat Intelligence which will primarily focus on IoT, and supports Indicator of Compromise generation and sharing by any participating IoT or Edge device.
The self-healing component, in the shape of an autonomous control loop will continuously monitor the network for any anomalies, attempt to determine the root cause, and then automatically decide and apply appropriate recovery solutions and algorithms in real-time such as reconfiguration, reinstallation, adaptation, or other actions.
The self-protection component enables a fully automated self-protection system to mitigate the attacks in real-time in a distributed way at various network locations without any human intervention considering multi-tenancy of 5G IoT infrastructure, scalability of the attacks, the complexity of topology and packet structures in 5G network.
As next steps, besides completing the first version of each component in the horizontal planes, ARCADIAN-IoT partners will organize a set of workshops intended to describe the technical details of the components developed during this first phase and obtain feedbacks from partners for enhancing the quality of the solutions delivered.