Security Architecture in the SILVANUS project

被引:1
|
作者
Orzechowski, Natan [1 ]
Rzepka, Karol [1 ]
Szary, Przemyslaw [1 ]
Cabaj, Krzysztof [1 ]
Mazurczyk, Wojciech [1 ]
Leligou, Nelly [2 ]
Przybyszewski, Marcin [3 ]
Kozik, Rafal [3 ,4 ]
Choras, Michal [3 ,4 ]
机构
[1] Warsaw Univ Technol, Warsaw, Poland
[2] Netco Intrasoft, Paiania, Greece
[3] ITTI Sp Zoo, Poznan, Poland
[4] Bydgoszcz Univ Sci & Technol, Bydgoszcz, Poland
关键词
Network security; Secure communication; Security architecture; Keycloak;
D O I
10.1145/3600160.3605082
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
SILVANUS is a new EU-funded project whose main objectives are to address the causes of wildfires in Europe. To achieve this aim, a dedicated platform for environmentally sustainable and climate-resilient forest management has been developed with the help of many state-of-the-art, modern technologies. One of the major challenges to solve when building such a heterogeneous, multi-component, multipurpose platform is to provide the necessary se-curity architecture. It should ensure that only trusted users and devices (e.g., sensors, drones, UGVs, etc.) would be allowed to use it, and attackers or other third parties would not jeopardize its communication and assets. In this paper, we outline the main design principles, solutions, and mechanisms we have considered when building the security architecture for the SILVANUS platform. Moreover, we present the current state of development of this platform and the main challenges we have been facing.
引用
收藏
页数:17
相关论文
共 50 条
  • [41] A security architecture for the Internet Protocol
    Cheng, PC
    Garay, JA
    Herzberg, A
    Krawczyk, H
    IBM SYSTEMS JOURNAL, 1998, 37 (01) : 42 - 60
  • [42] Scheduling of Security Resources in Software Defined Security Architecture
    Zhang, Gang
    Qiu, Xiaofeng
    Chang, Wei
    2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 494 - 503
  • [43] Application of Java']Java Security Architecture in Information Security
    Shen Guicheng
    Zheng Xuefeng
    PROCEEDINGS OF FIRST INTERNATIONAL CONFERENCE OF MODELLING AND SIMULATION, VOL III: MODELLING AND SIMULATION IN ELECTRONICS, COMPUTING, AND BIO-MEDICINE, 2008, : 66 - 69
  • [44] Architecture Security Evaluation Method based on Security of the Components
    Du, Changxiao
    Li, Xiaohong
    Shi, Hong
    Hu, Jing
    Feng, Ruitao
    Feng, Zhiyong
    2013 20TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2013), VOL 1, 2013, : 523 - 528
  • [45] A security architecture for reputation systems
    Ismail, R
    Boyd, C
    Josang, A
    Russell, S
    E-COMMERCE AND WEB TECHNOLOGIES, PROCEEDINGS, 2003, 2738 : 176 - 185
  • [46] Wireless network security architecture
    Blumenthal, U
    Marcovici, M
    Mizikovsky, S
    Patel, S
    Sundaram, GS
    Wong, M
    BELL LABS TECHNICAL JOURNAL, 2002, 7 (02) : 19 - 36
  • [47] Agent platform security architecture
    Santana, G
    Sheremetov, LB
    Contreras, M
    COMPUTER NETWORK SECURITY, 2003, 2776 : 457 - 460
  • [48] Towards a security architecture for substations
    Fuloria, Shailendra
    Anderson, Ross
    2011 2ND IEEE PES INTERNATIONAL CONFERENCE AND EXHIBITION ON INNOVATIVE SMART GRID TECHNOLOGIES (ISGT EUROPE), 2011,
  • [49] The Research of the Cloud Security Architecture
    Hu Xiangyi
    Ma Zhanguo
    Liu Yu
    INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS, 2012, 127 : 379 - 385
  • [50] A SECURITY ARCHITECTURE FOR THE INTERNET OF THINGS
    Behrens, Reinhard
    Ahmed, Ali
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (12): : 6092 - 6115