5g
Factories of the Future
Media & Entertainment
Smart Cities
Smart Energy
Smart Ports
SME Opportunities
Societal Impacts
Technology Development
Telecoms Providers
5G CAM
5G Automotive
5G CAM KPIs
5G CAM Standardisation
5G Corridors
5G Multimodal Connectivity
5G Transport Network
Artificial Intelligence & Machine Learning
Artificial Intelligence & Machine Learning in big data
Artificial Intelligence & Machine Learning technologies
Big data
Big data algorithms
Big data analytics
Collaborative Classification and Models
Business Models, Process Improvement, Contract Management, KPIs and Benchmarking Indexes
Collaboration Risk and Value Sharing
Collaborative Planning and Synchromodality
Customs & Regulatory Compliance
Environmental Performance Management
Logistics Optimisation
Stock Optimisation
Supply Chain Corrective and Preventive Actions (CAPA)
Supply Chain Financing
Supply Chain Visibility
Common Information Objects
Booking
Customs Declarations
Transport Service Description
Transport Status
Waybills
Computing and Processing
Big Data Management and Analytics
Cloud
Edge
Fog
Knowledge Graphs
Machine Learning
MIST
Stream Processing
Connectivity
Architecture
Blockchain
Connectivity Interfaces
Technologies (Bluetooth, Ethernet, Wifi)
Data Management, Simulation and Dashboards
Dashboards
Data Fusion
Data Governance, Integrity, Quality Management and Harmonization
Event Handling
Open Data
Simulation
Statistics and Key Performance Indicators (KPIs)
Data market
Data ecosystem
Data marketplace
Data Platform
Data Providers
Devices
IoT Controllers
IoT Gateways
IoT Sensors
Tracking Sensors
Digitisation Frameworks
Control Towers
Data Pipelines
e-Freight
e-Maritime
National Single Windows
Port Community Systems
Federation
Data Federation
Platform Federation
Industrial IoT Sectors
Rail Sector Active Predictive Maintenance
Interoperability
Data interoperability
Data interoperability mechanisms
Interoperability solutions
Platform interoperability
IoT Secuirty, Privacy and Safety Systems
PKI Technology
Privacy-preservation
Data privacy preserving technologies
Privacy preserving technologies
Project Results
5G-SOLUTIONS Deliverables
5G-SOLUTIONS Publications
CHARIOT Capacity Building and Trainings
CHARIOT Deliverables
CHARIOT Publications
SELIS Deliverables
SELIS Publications and Press Releases
Project Results - 5g Routes
5G-ROUTES Deliverables
5G-ROUTES Innovation
5G-ROUTES Publications
Project Results - TRUST
TRUST Deliverable
TRUSTS Publications
Safety, Security and Privacy Systems
Access Management
Coordinated Border Management
Information Security
International Organisations
Risk Assessment and Management
Risk Management
Safety and Security Assessment
Source Code Analysis
Sectors and Stakeholders
Airports and Air Transport
Banks, investors and other funding providers
Custom Authorities
Facilities, Warehouses
Freight Forwarders
Inland Waterways
Multimodal Operators
Ports and Terminals
Railway
Retailers
Road Transport
Shippers
Shipping
Smart Buildings
Trusties and other Intermediary Organizations
Urban and Countryside Logistics
Urban Logistics
Sectors and Stakeholders - TRUST
Audit & Law firms
Corporate offices
Enterprises
Financial Institutions
Telecommunications
Security
Secured Data
Secured Infrastructure
Secured Platform
Sovereignty
Data sovereignty
Standards
Good Distribution Practices
International data standards
International Organization for Standardization (ISO)
UN/CEFACT
World Customs Organization (WCO)
Supply Chain Management
Business Models, Process Improvement, Contract Management, KPIs and Benchmarking Indexes
Risk Management
Risk-Based Controls
Screening and tracking
Supervision Approach
Technologies
5g
Agile Deployment, Configuration Management
Business Applications
Business Integration Patterns, Publish-Subscribe
Cloud Technologies/Computing, Services Virtualisation
Cognitive
Community Node Platform and Application Monitoring
Connectivity Technologies (Interfaces and Block Chain)
Hybrid S/T Communication and Navigation Platforms
IoT (Sensors, platforms)
Mobile
Physical Internet (PI)
Public key infrastructure (PKI)
Radio-frequency identification (RFID)

CHARIOT Deliverables

D3.6 Design Specification of IPSE (final design)
Aydın Ulaş 28/02/2020 00:00:00

1 Executive Summary
CHARIOT Project envisions a holistic approach to the problems related to security, safety supervision and privacy in industrial IoT (Internet of Things) deployments. For this goal CHARIOT IPSE (IoT Privacy Safety Supervision Privacy and Security Engine) offers several cognitive capabilities on different parts of the CHARIOT architecture to handle these issues. CHARIOT IPSE is designed by considering the requirements of the three living labs in the CHARIOT Consortium.

In the preliminary design version of this document (D3.1), we reported the first phase of the design specifications of CHARIOT. All the technical components and their respective functional and non-functional requirements have been reported where functional requirements consist of the main functionalities of the engines and nonfunctional requirements highlight the quality and operation attributes of the system. The requirements were used by the Work Package 3 Partners to generate the high-level technical specifications of the component. Furthermore, interface definitions were presented, and several use cases and scenarios were highlighted.
In this final design version of the document, a project-wide consolidated requirements’ document and the rescoping document written after the mid-term review has been taken into consideration and reflected to the design and implementation of IPSE. In this, all revised or updated requirements were taken into account to reflect any updated requirements or design considerations. This has led to the final version of the deliverable as the IPSE final design.

CHARIOT IPSE functionality can be listed briefly as follows: CHARIOT Safety Supervision Engine is used to observe and share the system topology across Fog computation components and enforce rule based or machine learning based safety supervision policies across the industrial IoT setup. On top of this, safety supervision engine can be used to optimize the system signal rate under normal and emergency conditions. CHARIOT Privacy Engine ensures privacy by design by handling the encryption policies for data within CHARIOT. CHARIOT Security Engine processes firmware binary updates and identifies the security vulnerabilities of the firmware. We updated the requirements of the security engine considerably to align with the changes in task 3.3 documented in the project
amendment in Month 15. IoTL is the language used to define the state of the relevant industrial IoT setup and a web server that listens to state transfers from relevant nodes in the Fog network. Finally CHARIOT Dashboard integrates with the CHARIOT engines to provide reporting, configuration and visualization functionality for the engines.

The purpose of this deliverable is sharing the finalized design version of the CHARIOT IPSE design as CHARIOT D3.6. In this context, we share our output to align with work package 2 and work package 4 of CHARIOT Project, coordinate the partners’ effort on IPSE and to guide further development and innovation goals related to IPSE.
We deployed the IPSE to the three living labs in accordance with the requirements in this document and demonstrated its use in IBM LL in Dublin in the mid-term review. The document involves contributions from all WP3 partners and in particular WP2-3-4 task leaders of the CHARIOT Project.

Reference Link

Attached Documents

The “CHARIOT IoT Search Index” aims to provide a web location where publications, articles, and relevant documents can be centralized hosted in a well-structured and easily accessed way.

Tags

Contact Us
Enter Text
Contact our department