DOSS

DESIGN AND OPERATION OF SECURE IoT SUPPLY CHAIN

The Concept

The DOSS – Secure-By-Design IoT Operation With Supply Chain Control – project aims to improve the security and reliability of IoT operations by introducing an integrated monitoring and validation framework to IoT Supply Chains, including all the relevant stakeholders. DOSS elaborates on a secure-by-design methodology and implements related technology based on formalized data exchange, component testing, and architecture modeling.

Read more

USPs outline

What is this solution offering that’s different?
End-to-end communication

The DOSS “Supply Trust Chain” connects all relevant stakeholders with a formalized communication flow to facilitate monitoring of the movement of IoT devices from manufacturers all the way to decommissioning.

Multi-level security testing

DOSS establishes a comprehensive testing model covering all IoT components, including the binary testing of IoT devices, black-box analysis of 3rd party applications, vulnerability assessment on open-source applications, and internal developments the result of which will provide solid evidence of the existence or absence of vulnerabilities.

Security modeling in digital twin

DOSS will use an AI-assisted, flexibly configurable cybersecurity digital twin to simulate already in the design phase the architecture of selected IoT operations to identify potential attack scenarios, to analyze their impact, and to elaborate the necessary countermeasures. 

Security feedback from operation

The DOSS IoT “Supply Trust Chain” also comprises the highly protected IoT operation itself, which is integrated into the communication loop to provide relevant security-related information to other actors of the IoT supply chain. 

Use Cases

Proof of domain independence 

Consumer

use case

Smart home

Industrial /

Commercial

use case

Prosumer cell

Automated

Driving

use case

Automated car

Latest news

A mix of research updates, insights, and scientific publications
News

October is European Cybersecurity Month!

The European Cybersecurity Month (ECSM) is the European Union’s annual campaign dedicated to promoting cybersecurity among EU citizens and organisations. The ECSM campaign is coordinated by the European Union Agency for Cybersecurity (ENISA) and the European Commission, and supported by EU Member States and hundreds of partners (governments, universities, think…
Publications

Nakip M, Gelenbe E. 2024. An Associated Random Neural Network Detects Intrusions and Estimates Attack Graphs. EuroCyberSec 2024.

Conference: EuroCyberSec 2024, 23. October 2024, Krakow, Poland Authors: Nakip M, Gelenbe E. Abstract: Cyberattacks, especially Botnet Distributed Denial of Service (DDoS), increasingly target networked systems, compromise interconnected nodes by constantly spreading malware. In order to prevent these attacks in their early stages, which includes stopping the spread of malware,…
Publications

Nasereddin M, Nakip M, Gelenbe E. 2024. A Deep Learning based Intrusion Detection and Prevention System for Mitigating DoS Attacks. EuroCyberSec2024

Conference: EuroCyberSec 2024, 23. October 2024, Krakow, Poland Authors: Nasereddin M, Nakip M, Gelenbe E. Abstract: Internet of Things (IoT) networks are highly vulnerable to network attacks, the most common examples being DoS and DDoS attacks. Those attacks flood the limited system resources of IoT devices and overwhelm networks with…

Newsletter

Stay in the know and receive all the latest updates straight to your inbox.