Summary
iTrust6G aims at designing and implementing a network architecture implementing the zero-trust principles to increase the trustworthiness of 6G networks at several levels: AI/ML algorithm exploited for threat handling, asset compliance, explainable security policies and asset observability.
The prioject aims to improve the accuracy and the efficiency of the (i) methodologies used for trust determination (e.g. time to share cyber-threat intelligence, duration of the vulnerability assessment procedure, number of the assurance conformity check), (ii) the performance of the security procedures involved (e.g. number of classes of monitored resources, mean time-to-detection of threat, mean time-to-reaction), and (iii) the induced overhead over network resources exploitation (e.g. performance overhead due to the programmability models).
The prioject aims to improve the accuracy and the efficiency of the (i) methodologies used for trust determination (e.g. time to share cyber-threat intelligence, duration of the vulnerability assessment procedure, number of the assurance conformity check), (ii) the performance of the security procedures involved (e.g. number of classes of monitored resources, mean time-to-detection of threat, mean time-to-reaction), and (iii) the induced overhead over network resources exploitation (e.g. performance overhead due to the programmability models).
Unfold all
/
Fold all
More information & hyperlinks
Web resources: | https://cordis.europa.eu/project/id/101139198 |
Start date: | 01-01-2024 |
End date: | 30-06-2026 |
Total budget - Public funding: | 4 516 787,50 Euro - 4 236 558,00 Euro |
Cordis data
Original description
iTrust6G aims at designing and implementing a network architecture implementing the zero-trust principles to increase the trustworthiness of 6G networks at several levels: AI/ML algorithm exploited for threat handling, asset compliance, explainable security policies and asset observability.The prioject aims to improve the accuracy and the efficiency of the (i) methodologies used for trust determination (e.g. time to share cyber-threat intelligence, duration of the vulnerability assessment procedure, number of the assurance conformity check), (ii) the performance of the security procedures involved (e.g. number of classes of monitored resources, mean time-to-detection of threat, mean time-to-reaction), and (iii) the induced overhead over network resources exploitation (e.g. performance overhead due to the programmability models).
Status
SIGNEDCall topic
HORIZON-JU-SNS-2023-STREAM-B-01-04Update Date
12-03-2024
Images
No images available.
Geographical location(s)
Structured mapping