To address the major challenges of securing the IoT ecosystem from cyber threats, the Cyber-Trust project has developed a revolutionary framework that will first identify, then analyse, and next mitigate these threats. To achieve this, the Cyber-Trust project conducts research in the following main cyber-security areas:

  • develop state of the Art (SOTA) cyber security tools
  • identify cyber-attack and mitigate their consequence
  • use of distributed ledger technologies

The Cyber-Trust project has developed an innovative platform based on end user specifications that formed the technical and functional requirements of the project. The validation of the Cyber-Trustplatform will be achieved in two (2) pilot phases. In both phases, Cyber-Trust functionality will be verified using several use case scenarios, developed by the potential end users: IoT device owners, Internet Service Providers (ISPs) and Law Enforcement Agencies (LEAs).

Currently, the Cyber-Trust platform is operational and ready to be tested, validated, and evaluated by its potential end-users. The testing procedures and the methodology that will be used to evaluate the platform are adequately documented in the evaluation plan of the platform. The objective of the platform evaluation is to ensure that the requested functionalities are delivered and that the end user requirements sufficiently met.

The evaluation planincludesthe measurement of Key Performance Indicators (KPI), verification of the platform functionalities while an assessment questionnaire will measure the effectiveness, efficiency, satisfaction, maintainability, and reliability of the platform. As a result of this process, the three end-user groups not only will evaluate the developed platform, but also will provide feedback to improve the platform and identify issues that should be addressed by the technical team.

The data processing methodology complies with all appropriate legal measures. The evaluation process will use both qualitative and quantitative methods to process end user inputs. Results from the three end user questionnaires will be reported, along with recommendations for future platform improvements. At the end of the platform evaluation a development phase will follow to satisfy additional end user requirementsand remedy any issues reported. The outcome of a successful and direct first pilot phasewould not beonlythe solid basis for the second and final pilot implementation phase, but also for futureachievements of the cybersecurity ecosystem.

PDF Version