Logo Loading

WHO
WE ARE

M-Sec is a collaborative project between the EU and Japan, strengthening connections in the technological spheres of Big Data, IoT, Blockchain and Cloud computing.

WHAT
WE DO

We empower social entrepreneurs, researchers, businesses, public authorities and citizens across the EU and Japan to work together, design and adopt new IoT applications, which improve the security and connectivity of smart cities, and facilitate trusted interactions between objects and people.

Want to be a part of it?

M-Sec has an ambitious approach to address the challenges of a secure and efficient IoT

OPEN TECHNOLOGIES AND ARCHITECTURAL PATTERNS

A low-cost, flexible and scalable IoT paradigm achieved through an open-reference architecture, adequate for hyperconnected smart cities

NEW BUSINESS AND ECONOMIC MODELS

Commercialisation of IoT devices through new models such as sharing economies, leading to a disruption in the IoT industry and the Internet of Value.

MULTI-LAYER SECURITY SUPPORT

Comprehensive security support ensuring security and privacy across all layers of the systems, from a network level to an application level.

IoT MARKETPLACE BASED ON BLOCKCHAINS

An IoT devices marketplace where information and services are exchanged through the use of virtual currencies, for real-time matching of supply and demand.

CITIZEN ENGAGEMENT AND CO-DESIGN

Citizen driven innovation supported by the involvement of cities, local businesses and developers in the solutions, building a strong smart city ecosystem.

REAL-LIFE PILOTS IN SPAIN AND JAPAN

Validation in real-life use cases in Santander and Fujisawa, recognised for their long-term “smart city” approach.

Join the M-Sec Marketplace

An innovative and open IoT market of applications, data and services

M-Sec Technologies

CLOUD

IoT

DEVICE LEVEL

BIG DATA SECURITY

BLOCKCHAINS

END TO END SECURITY

SMART CITIES

2

USE CASES

5

TECHNOLOGICAL SOLUTIONS

15

YEARS

3

M-Sec Architecture

Application
Layer
Application layer defines all the use the IoT technology or in
which IoT has deployed
Eclipse
sensiNact Studio TRL 7
Eclipse sensiNact Studio
SensiNact is designed to allow platforms to interoperate, thus coexist and benefit from the richness of the variety. Additionally, it provides a fine grained security mechanism to allow access to services by only authenticated and authorized entities
SAT &
DMSS TRL 4
Security Analysis Tool & Development Method for a secure service A security requirements modelling support system, for a misuse case diagram that enables the association of security knowledge with elements that constitute the diagram.
MTSA TRL 7
Modal Transition System Analyser A development tool for synthesizing behaviour specification for reactive systems with formal guarantee.
IoT
Marketplace TRL 9
IoT Marketplace The M-Sec IoT Marketplace is a novel Marketplace where smart objects and users can exchange information and services through the use of virtual currencies, allowing real-time matching of supply and demand, and thus enabling the creation of liquid markets with profitable business models of the IoT stakeholders.
Cloud
Layer
Cloud layer includes all the infrastructure upon which cloud services are based
Monitoring
& Visualisation Tool TRL 6
Monitoring & Visualisation Tool A software-based solution that collects and examines activity from IoT layer or agents embedded in the IoT gateway devices. This tool not only help with the security health checks by providing insight into how the security is being maintained at IoT gateways, but also helps in further analysis of devices under attack. Thereby, providing 24/7 security threat monitoring and alerts.
Crypto
Companion DB TRL 7
Crypto Companion Database> As the real world matches the digital world, ensuring that information remains secure, private and authentic has become an ongoing challenge. Using blockchain technology, some of the issues can be addressed. However, once data is stored on the blockchain it can’t be manipulated or altered. Our companion database is proposed as a parallel system to the blockchain for the encrypted storage. The blockchain saves a hash created from sensitive or personal data, and the companion database stores the sensitive data encrypted together with the hash.
Middleware
Layer
Middleware layer includes the infrastructure needed for both Peer-to-Peer and IoT-to-Cloud approaches
Eclipse
sensiNact platform TRL 7
Eclipse sensiNact platform SensiNact is designed to allow platforms to interoperate, thus coexist and benefit from the richness of the variety. Additionally, it provides a fine grained security mechanism to allow access to services by only authenticated and authorized entities.
Secure
SOXFire TRL 6
Secure SOXFire SOXFire can provide practical distributed and federated infrastructure for IoT sensor data sharing among various users/organisations in a way that is scalable, extensible, easy to use and secure, while preserving privacy.
Quorum Blockchain
Blockchain middleware TRL 7
Quorum Blockchain Blockchain middleware A distributed ledger and middleware services system which provides all the necessary groundwork for security/privacy-enhancing services related to transactions and interactions between actors of various ecosystems.
T&R Model
engine/tool TRL 6
Trust & Reputation Model/Engine The Trust & Reputation
Management Engine (T&RM Engine) is a tool working on top of the M-Sec
blockchain/Marketplace and in parallel with the corresponding
middleware so as to provide a ranking system assessing the
reliability, trustworthiness and reputation of resources providers
within the MSec ecosystem.
IoT
Layer
IoT Layer includes all the devices, sensors, and their
corresponding low-level networks that are met in IoT ecosystems
Secured components
for devices TRL 6
Secured components for devices A secure element, such as a
TPM, is added to the physical platform, It is used to store any
sensitive information that shall be protected from people having
physical Access to the electronics, such as IoT devices and gateways.
The secure element handles the integrity of the device during the
boot process and also handles the authentication and encryption for
external communication channels.
Intrusion
Detection System TRL 7
Intrusion Detection System Protect vulnerable IoT devices from
malicious activities using defense-in-depth mechanisms and threat
monitoring, thereby providing multi-layered security against policy
violations and cyber attacks, along with security health-checks
Stealth security TRL 5

Ganonymizer TRL 7
Ganonymizer In situations where video data is used in various
IoT application use cases such as smart cities, personal information
is often a problem. GANonymizer is a technology that automatically
deletes personal information contained in such videos using AI
technology.
Cross
Layer
Cross layer is the layer that provides services to all the horizontal layers.
Security
Management Tool TRL 5
Security Management Tool A set of centralized security
functions that are necessary to ensure end-to-end security, privacy
and therefore digital trust. It is designed to support several
security functionalities aggregated in a single backend using the
LDAP standard. The central element for the security manager is a
directory service containing all information to manage security
services for clients, such services known as AAA for Authentication,
Accounting and Authorization.
Development & Design Tools
Development & Design Tools Functional Group
Devices Security
Devices Security Functional Group
Secure City Data Acc
Secure City Data Access Functional Group
IoT Marketplace
IoT Marketplace Functional Group
Secured&Trusted Storage
Secured & Trusted Storage Functional Group
Privacy Management
Privacy Management Functional Group
End-to-End Security
End-to-End Security FG
End-to-End Security
End-to-End Security FG
Key:
Layer
Layered Layered architecture patterns are n-tiered patterns
where the components are organized in horizontal layers. This is the
traditional method for designing most software and is meant to be
self-independent. This means that all the components are
interconnected but do not depend on each other.
Functional Group
Functional Groups represents a reusable, functional, identifiable part of the
whole framework that provides a set of functionalities based on the combination of other components.
Component
Component represents a smaller functional part that in a combination with other components,
introduce the functional group component. A component is an self-contained software which can
communicate with other components. In this representation a component can also represent a set of components. We are not representing interfaces and connectors.
Hint: cursor over element name shows more information…
SRL: SRL of level 3 – System Development & Demonstration

Functional Groups Product Sheets

Our Smart Cities

Santander and Fujisawa have fully committed to challenge their smart city needs by using M-Sec results.

SANTANDER

SANTANDER

A global leader in citizen-oriented technologies, Santander has developed its own “city brain” platform to manage all urban facilities.

FUJISAWA

FUJISAWA

A pioneer in technologies for citizen wellness, natural disaster protection and sustainable energy, Fujisawa stands out as one of Japan’s most innovative cities.

Latest news

Follow Us

RRSS-02
RRSS_Mesa de trabajo 1
RRSS-03
youtube_maior

Enter your keyword

X