ERATOSTHENES Pilots

Pilot 1: Connected Vehicles
pilot1

The first pilot will explore several attack scenarios during the implementation of the ERATOSTHENES framework in connected vehicles, investigating the interaction between vehicles (V2V) and the interactions between a vehicle and road infrastructure (V2I/I2V).  The connected vehicle is an integrated part of more extensive IoT deployments where multiple infrastructures are also intelligent objects, such as vehicle detection loops installed near a traffic light, traffic signals, trolling collection systems, parking management, or electrical charging stations. This pilot will validate the ERATOSTHENES framework through several scenarios covering both V2I and V2V concepts. For example, it will assess the case when a vehicle communicates through an OBU to a roadside infrastructure device (traffic light), and another vehicle fitted with an OBU will also be nearby, sending conflicting/malicious intent messaging.

Pilot 2: Smart Health
pilot2

The second pilot will validate ERATOSTHENES framework in the smart health world by deploying its Trust Agents in the patient monitoring product of Tellu. The implementation aims to transform the product from a closed remote patient monitoring service to an open platform for home assistance, enabling the healthcare gateways to collect data not only from the standard IoT devices distributed by the operator but also from the patient’s own devices in a secure and safe manner

Pilot 3: Disposal IDs in Industry 4.0
pilot3

 One-minute downtime in automotive production can result in USD 22.000 cost. An hour downtime can cause damage of 1.3 million USD. The third pilot aims to increase security by design in industrial IoT networks and communication. It will demonstrate the efficacy of the ERATOSTHENES framework in such environments by introducing novel approaches on IoT Asset Identification and disposable IDs to identify trustworthy entities in communication networks. The system will showcase a level of trust and resilience in industrial communication networks to prevent, defend and isolate malicious attackers hiding or faking their true identities.