« CI Cybersécurité des drones et robots/en » : différence entre les versions
De Wiki Campus Cyber
(Page créée avec « ==Logbook== ''''Conclusion of the Initiation Phase''' * The community of interest will meet once every 2 Wednesdays from 9.30am to 11am. ») |
Aucun résumé des modifications |
||
(8 versions intermédiaires par 3 utilisateurs non affichées) | |||
Ligne 3 : | Ligne 3 : | ||
|ShortDescription EN=Developing the safety of drones and robots and their specific features | |ShortDescription EN=Developing the safety of drones and robots and their specific features | ||
|Tag=Drones, IOT, Robots | |Tag=Drones, IOT, Robots | ||
|Status=En cours | |||
}} | }} | ||
== Description == | == Description == | ||
Ligne 23 : | Ligne 24 : | ||
'''Progress of the reflection phase''' | |||
''' | |||
The community selected priority themes as well as associated work issues: | |||
* Protection of transmission transmitted information | |||
* Protection | ::- How to know the state of the art of defense and attack systems? | ||
* | ::- How to know involved actors in drone and robot defense ? | ||
* | * Industry of the future regulations | ||
* | * Training and skills | ||
* | ::- How can we anticipate the needs for cybersecurity skills in drones and robots? | ||
::- How to integrate skills related to drone cybersecurity into training? | |||
* Authentication | |||
::- How to certify the identity of operators? | |||
::- How to assess the level of safety and energy efficiency of drones? | |||
* Swarm Safety | |||
::- How to manage authentication in swarms? | |||
::- How to ensure friend-enemy drone tracking? | |||
The community has identified the following topics and assigned them a lower priority | |||
* Jamming and anti-jamming techniques | |||
* | * Interception techniques | ||
* | * Security repository | ||
* | |||
* Drone as a service | * Drone as a service | ||
{{PageSubHeader Communauté d'intérêt}} | {{PageSubHeader Communauté d'intérêt}} |
Dernière version du 11 janvier 2024 à 11:01
Description
Share best practices on securing drones and robots and their specific features Move towards interoperability of identities and authentication methods for drones and robots. Use drone cybersecurity as an example to positively influence IoT cybersecurity in general. Develop a reference framework for the development of a trusted European drone
Deliverables
- Proposal of safety criteria for the "European Trusted Drone" label (Cf. DG MOVE Drone Strategy 2.0 Flagship Action 19)
- Once the label criteria have been adopted by the European Commission, test methodology
- White paper on trusted drones and robots
- White paper on identity management and strong authentication for drones and robots
Logbook
'Conclusion of the Initiation Phase
- The community of interest will meet once every 2 Wednesdays from 9.30am to 11am.
Progress of the reflection phase
The community selected priority themes as well as associated work issues:
- Protection of transmission transmitted information
- - How to know the state of the art of defense and attack systems?
- - How to know involved actors in drone and robot defense ?
- Industry of the future regulations
- Training and skills
- - How can we anticipate the needs for cybersecurity skills in drones and robots?
- - How to integrate skills related to drone cybersecurity into training?
- Authentication
- - How to certify the identity of operators?
- - How to assess the level of safety and energy efficiency of drones?
- Swarm Safety
- - How to manage authentication in swarms?
- - How to ensure friend-enemy drone tracking?
The community has identified the following topics and assigned them a lower priority
- Jamming and anti-jamming techniques
- Interception techniques
- Security repository
- Drone as a service
Groupes de travail
Status | Description | |
---|---|---|
GT Sécurisation des drones et robots - Authentification dans les essaims | En cours | Gestion de l'authentification dans les essaims de drones |
GT Sécurisation des drones et robots - Etat de l’art des attaques et des défenses | En cours | Dresser l’état de l’art des attaques et des défenses sur les drones et robots afin d'établir un protocole de pentest |
GT Sécurisation des drones et robots - Repérage de drone ami-ennemi | En cours | Dresser l'état des lieux des technologies FFI applicables aux drones |