M-Sec IoT Infrastructure
One of the expected results of M-Sec is to have distributed, robust and trusted smart city platforms, based on IoT, cloud, Big Data and blockchain technologies, that empower IoT stakeholders to develop, deploy and operate novel multipurpose IoT applications for smart cities on top of smart objects.
The specific infrastructure paradigm is being piloted in real-life smart city contexts in Santander (Spain) and Fujisawa (Japan) cities through 5 Use Cases.
Take a closer look at the research conducted and the activities held in order to achieve this project result.
How will M-Sec achieve this result
M-Sec IoT Infrastructure result will be achieved through 4 main activities:
With a simplified view of M-Sec’s multilayered architecture, the project will be able to easily explain and present its approach to a broader technical and non-technical audience
M-Sec intends to organize a series of community webinars to better explain each layer of the M-Sec’s architecture to a broader audience, both from the industry and the academia, as well as to the common citizen
The M-Sec architecture will be piloted in a real-life environment, through a set of 5 Use Cases in Santander (Spain) and Fujisawa (Japan) cities
The status of the implementation of M-Sec Use Cases will be monitored by the project and main achievements and results will be disseminated to a broader audience, through a series of blogposts and videos
Simplified view of M-Sec's architecture
which IoT has deployed
SensiNact is designed to allow platforms to interoperate, thus coexist and benefit from the richness of the variety. Additionally, it provides a fine grained security mechanism to allow access to services by only authenticated and authorized entities
& Visualisation Tool
Management Engine (T&RM Engine) is a tool working on top of the M-Sec
blockchain/Marketplace and in parallel with the corresponding
middleware so as to provide a ranking system assessing the
reliability, trustworthiness and reputation of resources providers
within the MSec ecosystem.
corresponding low-level networks that are met in IoT ecosystems
TPM, is added to the physical platform, It is used to store any
sensitive information that shall be protected from people having
physical Access to the electronics, such as IoT devices and gateways.
The secure element handles the integrity of the device during the
boot process and also handles the authentication and encryption for
external communication channels.
malicious activities using defense-in-depth mechanisms and threat
monitoring, thereby providing multi-layered security against policy
violations and cyber attacks, along with security health-checks
IoT application use cases such as smart cities, personal information
is often a problem. GANonymizer is a technology that automatically
deletes personal information contained in such videos using AI
functions that are necessary to ensure end-to-end security, privacy
and therefore digital trust. It is designed to support several
security functionalities aggregated in a single backend using the
LDAP standard. The central element for the security manager is a
directory service containing all information to manage security
services for clients, such services known as AAA for Authentication,
Accounting and Authorization.
where the components are organized in horizontal layers. This is the
traditional method for designing most software and is meant to be
self-independent. This means that all the components are
interconnected but do not depend on each other.
whole framework that provides a set of functionalities based on the combination of other components.
introduce the functional group component. A component is an self-contained software which can
communicate with other components. In this representation a component can also represent a set of components. We are not representing interfaces and connectors.