DESCRIPTION
By 2025, 80% of the data will be processed by (I)IoT devices, though many times they are “black-boxes” from UI/UX and cybersecurity perspectives. New security reports are regularly published about new vulnerabilities in (I)IoT devices.
The reuse or proprietary/closed/untested/uncertified nature of (vulnerable/proprietary) components has a high negative impact as it increases many-fold the attack surface and entry-points to critical infrastructure, eneterprise-production and citizen-home networks.
Growing legislation (EU: Cyber Security Act, Cyber Resilience Act) and certifications (ioXt, UL2900, ISO/IEC IoT cybersec) landscape mandates extensive cybersecurity tests, including on fully running device instances (physical or virtual). To TEST/CERTIFY it for functional/certification/cybersecurity/vulnerability/exploit reasons one usually needs the actual (expensive) device, which hugely limits the agility and scalability of pro-actively addressing their bugs/cybersecurity.
A future-proof solution is virtualizing/emulating (I)IoT devices/firmware to obtain a running/operating "Digital Twin" that offers a sufficiently-accurate representation of the (I)IoT device/firmware under test. IoT-DiTwiCS aims at “closed-loop system & experiment” producing "cybersecurity x Digital Twin" relevant dataset(s)+technology.
IoT-DiTwiCS aims at “closed-loop system & experiment” producing "cybersecurity x Digital Twin" relevant dataset(s)+technology.
One of the main end goals of IoT-DiTwiCS is to make the resulting datasets available in subsequent EUHubs4Data calls, as well as available for researchers, practitioners and innovators interested in the field or building new applications and value-added services atop such data.
A. Generate original and unique dataset(s) - proposed and envisioned dataset(s) are themselves innovative and very forward-looking
B. “(I)IoT firmware Digital Twins” for innovative APIs and tech-solutions - structured access to dataset(s), allowing third-parties to use the data most optimally, and build complementary cybersecurity solutions
C. Support forward-looking innovation - expected to attract ever-increasing innovation projects to EUH4D (and its related-initiatives); Enable exploration of novel research directions and innovative applications for (IoT) cybersecurity
IoT-DiTwiCS indirectly brings strong social and economic impact via its cybersecurity aims and resulting footprint. Most (if not all) modern societies are mostly digitalized, or are on the path to full digitalization. This means that cybersecurity, as a horizontal cross-cutting foundation to anything digital, is and will become increasingly important, indispensable, and increasingly mandatory (e.g., regulations, certifications, legal).
The KERs we plan will allow running and experimenting with (I)IoT device software/firmware Digital Twin, thus vulnerability exposure of ever increasing number of (I)IoT edge devices.
KER1: Dataset(s)
• Type: Data-driven
KER2: APIs
• Type: Software and services
KER3: Tech-solution/product (value-added solutions atop datasets and APIs)
• Type: Software and services
KER4: Whitepapers (Technical and Business)
• Type: Documents and reports
KER5: Structured feedback from “pilot projects tests”
• Type: Survey; Data-driven
One of the main end goals is to make the resulting datasets available in subsequent EUHubs4Data calls, as well as available for researchers, practitioners and innovators interested in the field or building new applications and value-added services atop such data.