a view from emobility

Similar documents
Version 11

Security and resilience in Information Society: the European approach

A Strategy for a secure Information Society Dialogue, Partnership and empowerment

Strategic Research Agenda

Impact of Infrastructure Modernization and Selection of Appropriate Technical Solutions to Enhance IPO Business Services

SRA A Strategic Research Agenda for Future Network Technologies

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act''

R&D to shape the networks and services of the future

13967/16 MK/mj 1 DG D 2B

Cyber Security in Europe

Cybersecurity ecosystem and TDL Antonio F. Skarmeta

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe

NATIONAL PROGRAMME Chapter 15 Telecommunication and Post. Telecommunication and Post

The role of ICT in managing the complex Smart Grid Infrastructure. Nampuraja Enose Infosys Labs

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government

Introduction to Device Trust Architecture

Cyber Security Strategy

Securing Europe's Information Society

ENISA EU Threat Landscape

Regional Development Forum For the Arab States(RDF-ARB) 2018

Call for Expressions of Interest

The European Platform in Network and Information Security (NIS) Fabio Martinelli

Commonwealth Cyber Declaration

Cybersecurity Standards Coordination and Deployment Strategies: CITEL Initiatives

Upcoming EC Systems Research Perspectives

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Angela McKay Director, Government Security Policy and Strategy Microsoft

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Leading the Digital Transformation from the Centre of Government

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:

Bradford J. Willke. 19 September 2007

Control System Security for Social Infrastructure

Legal and Regulatory Developments for Privacy and Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Critical Information Infrastructure Protection Law

BEST PRACTICE GUIDELINES ON POLICY AND REGULATORY INCENTIVE FOR AFFORDABLE ACCESS TO DIGITAL SERVICES

Panel 1 Service Platform and Network Infrastructure for Ubiquitous Services

European Cybersecurity PPP European Cyber Security Organisation - ECSO November 2016

Strategic Transport Research and Innovation Agenda - STRIA

Innovation policy for Industry 4.0

Fundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment

Secure Societies Work Programme Call

Strategy for information security in Sweden

N a t i o n a l I C T R & D a n d I n n o v a t i o n R o a d m a p

ACARE WG 4 Security Overview

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

Driving Internet of Things (IoT) standardization to build smart sustainable cities. Cristina Bueti, Adviser, ITU

Global cybersecurity and international standards

Legislative Framework

Security and Privacy in the Internet of Things : Antonio F. Skarmeta

DIGITAL TRUST Making digital work by making digital secure

European Cybersecurity cppp and ECSO. org.eu

716 West Ave Austin, TX USA

RESOLUTION 45 (Rev. Hyderabad, 2010)

European Transport Policy: ITS in action ITS Action Plan Directive 2010/40/EU

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

Striving for efficiency

EU policy on Network and Information Security & Critical Information Infrastructures Protection

DG GROW meeting with Member States in preparation of Space Strategy 8 th July Working document#1: Vision and Goals

Implementing ITIL v3 Service Lifecycle

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

Abu Dhabi e Government Strategy and ICT Standardization. Abu Dhabi, November 2014

H2020-LEIT-ICT WP European Data Infrastructure ICT-13 Supporting the emergence of data markets and the data economy

Green Treatment Center

Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions, Leidos

About Issues in Building the National Strategy for Cybersecurity in Vietnam

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level

Medical Device Cybersecurity: FDA Perspective

IPv6 Task Force - Phase II. Welcome

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

RESOLUTION 130 (Rev. Antalya, 2006)

UAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory

IPv6-based Beyond-3G Networking

Liberia ICT Policy

Key Features of ITU-T T NGN and Future Vision

Secure Societies in 2015

standards and so the text is not to be used for commercial purposes, gain or as a source of profit. Any changes to the slides or incorporation in

Developing a Legal Foundation and Establishing Effective Enforcement: Case Study Kenya

IPv6 Deployment Overview & Policy Update

The HUMANE roadmaps towards future human-machine networks Oxford, UK 21 March 2017

L2 - Internet of Things

The Network of the Future Future Networked Society

DIGITAL AGENDA FOR EUROPE

Towards Future Internet

Twilio cloud communications SECURITY

EISAS Enhanced Roadmap 2012

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs)

Forum. Ningbo, China 25 February

Digital Security. Rafael Tesoro Carretero DG CNECT, Unit H1 - Cybersecurity & Digital Privacy

Security Survey Executive Summary October 2008

Appendix 12 Risk Assessment Plan

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

2. What do you think is the significance, purpose and scope of enhanced cooperation as per the Tunis Agenda? a) Significance b) Purpose c) Scope

NATIONAL BROADBAND POLICY AND IMPLEMENTATION STRATEGY. Task Team Leader

GENERIC CONTROL SYSTEM ARCHITECTURE FOR CRITICAL INFRASTRUCTURE PROTECTION

Transcription:

European Technology Platforms Future Research Challenges in ICT Trust, Security, Privacy and Dependability a view from emobility Presented by Prof. Rahim Tafazolli University of Surrey Future Internet, Bled 31March-02-Apr-2008 Trust, Security, Privacy & Dependability [1]

emobility vision Improving the individual s quality of life, achieved through the availability of an environment for the instant provision of and access to meaningful, multi-sensory information and content Future Internet, Bled 31March-02-Apr-2008 Trust, Security, Privacy & Dependability [2]

Future Internet & Mobile/Wireless developments of Future Internet and Future Mobile intimately bound together f IN depends on f Mob for user connectivity f Mob depends on f IN for service richness each is constrained without the other both are totally dependent on trust, security, privacy and dependability (TSPD) to reach envisaged goals Future Internet, Bled 31March-02-Apr-2008 Trust, Security, Privacy & Dependability [3]

S E T Simplicity, Efficiency, Trust Environment Education & Training Health Care Employment Energy Intelligent Transport End-to-End Integrated Solutions Corporate Individuals WMAN WLAN Ubiquitous Connectivity SMEs Efficiency Broadcast Ubiquitous Services Simplicity Families Operators Cellular Seamless User Experience WPAN Security, Trust, Dependability (STD) WSN Groups Fixed Trust Communities B2B Environment Education & Training Health Care Employment Energy Intelligent Transport Future Internet, Bled 31March-02-Apr-2008 Trust, Security, Privacy & Dependability [4]

Common Issues (1) TECHNOLOGY CONVERGENCE = KEY DRIVER TSPD fundamental to integration of converging technologies TSPD solutions should evolve through open standards GLOBAL INTERCONNECTION OF NETWORKS Hazardous multiple level dimensions to security threats Environment mixed of computation and communication INTERDEPENDENCIES A vast number of interdependencies is progressively being built between systems and diverse areas of social and economic activity COMPLEXITY IS INCREASING Products, value nets, services and telecommunication solutions are getting more complex Society Business Citizens Technology Future Internet, Bled 31March-02-Apr-2008 Trust, Security, Privacy & Dependability [5]

Common Issues (2) STRICT PRODUCT DEVELOPMENT SCHEDULES Markets set more and more strict time schedules to products, creating challenges to quality and security Security awareness needed DIFFUSION OF ICT SOLUTIONS TO EVERYWHERE E.g. IP based solutions and wireless technology are used in industrial automation and critical infrastructures Security by obscurity paradigm does not work anymore REACTIVE CYCLES not FAST The timeliness of reactive security solutions (such as antivirus, firewall and IDS/IPS products) is challenging Need for proactive solutions! Future Internet, Bled 31March-02-Apr-2008 Trust, Security, Privacy & Dependability [6]

Technical Research Priorities 1(2) SECURITY MECHANISMS Evolved protection mechanisms needed Confidentiality, integrity, authentication & authorisation, non-repudiation, privacy, anonymity and content protection Mobility and identity management are big challenges in ubiquitous environment TRUSTED DEVICES End-user devices have an essential role Management of connections Multi-modal and context-aware security mechanisms Change of authentication paradigm: from device authentication to user authentication Safe and secure SW download HOLISTIC TSPD ENGINEERING & MANAGEMENT Throughout the product, service and infrastructure lifecycles Trust, security, Privacy and dependability metrics for security assurance (testing, monitoring and analysis) and design Future Internet, Bled 31March-02-Apr-2008 Trust, Security, Privacy & Dependability [7]

Technical Research Priorities 2(2) USER TRUST Commercial success depends heavily on user trust and confidence on security and privacy FUTURE BUSINESS MODELS Security transactions between business infrastructures (multi-business environment) Security & privacy providers REGULATORY ISSUES AND LEGISLATION Early detection of regulatory and legislation issues REACTIVE SOLUTIONS Defensive and forensic mechanisms Complementary protection to proactive solutions Future Internet, Bled 31March-02-Apr-2008 Trust, Security, Privacy & Dependability [8]

Working Group established emobility Expert Group recently established WG on Trust, Security, Privacy and Dependability Call for participants Objectives broaden participation of members for inputs to the next version of the emobility Strategic Research Agenda. Contact person Reijo Savola <Reijo.Savola@vtt.fi> Conduct cross platform cooperation in these areas! Future Internet, Bled 31March-02-Apr-2008 Trust, Security, Privacy & Dependability [9]