
CYENTIFIC AS
CYENTIFIC AS
1 Projects, page 1 of 1
Open Access Mandate for Publications and Research data assignment_turned_in Project2025 - 2027Partners:University of Peloponnese, UNIVERSITY OF PORTSMOUTH HIGHER EDUCATION CORPORATION, HELLENIC DATA PROTECTION AUTHORITY, TELEFONICA INNOVACION DIGITAL SL, HELLENIC DATA PROTECTION AUTHORITY +28 partnersUniversity of Peloponnese,UNIVERSITY OF PORTSMOUTH HIGHER EDUCATION CORPORATION,HELLENIC DATA PROTECTION AUTHORITY,TELEFONICA INNOVACION DIGITAL SL,HELLENIC DATA PROTECTION AUTHORITY,ERICSSON TELECOMUNICAZIONI,ADITESS,ED LUXEMBOURG,INCITES CONSULTING SA,TELEFONICA INNOVACION DIGITAL SL,Telekom Slovenije (Slovenia),Public Power Corporation (Greece),CYENTIFIC AS,Public Power Corporation (Greece),K3Y,UL,IQUADRAT,Telekom Slovenije (Slovenia),CERTH,IQUADRAT,Summit Tec Group LTD,TUT,University of Peloponnese,UNIVERSITY OF PORTSMOUTH HIGHER EDUCATION CORPORATION,CYENTIFIC AS,CENTRE FOR RESEARCH AND TECHNOLOGY HELLAS CERTH,ERICSSON TELECOMUNICAZIONI,ED LUXEMBOURG,ADITESS,University Of Thessaly,Summit Tec Group LTD,K3Y,INCITES CONSULTINGFunder: European Commission Project Code: 101192749Overall Budget: 8,480,400 EURFunder Contribution: 7,998,600 EURThe project aims to establish a robust security framework for 6G ecosystems, underpinned by the zero-trust principle and emphasizing core tenets like resilience, privacy, and dependability. Dynamic access control via a context-aware risk-based policy engine, leveraging rich cyber-threat intelligence and behavioral insights gathered from the 6G infrastructure, is at the core of the proposed approach. Micro-segmentation of vulnerable virtualized functions from critical O-RAN assets is a primary goal to prevent attackers’ lateral movement capabilities and minimize damage. Proactive security measures, will be deployed alongside sophisticated AI tools to optimize attack surface reduction and enhance intrusion detection capabilities. An intelligent extended detection and response solution will be developed, covering all layers of a 6G network; this entails the integration of collaborative intrusion detection networks and graph-based threat models, facilitating real-time and optimal responses to sophisticated multi-stage attacks targeting the 6G ecosystem. Automation will be pivotal in various aspects, including threat modeling, and response orchestration, aided by blockchain to secure integration and lifecycle management of 6G applications. Moreover, the project will prioritize supply chain security by implementing automated vulnerability scanning and introducing O-RAN application certification. Quantum-safe technologies (QKD and PQC) and AI-driven solutions will be employed to safeguard against physical layer attacks, ensuring uninterrupted and secure data transmission in 6G networks. Additionally, privacy-preserving and trusted AI/ML schemes will be developed upholding principles like fairness, explainability, and sustainability to ensure high energy efficiency and minimal environmental footprint of the proposed solutions. These efforts aim to ensure that critical 6G communications infrastructure achieves high security and resilience of against evolving cyber-threats.
All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=corda_____he::a4a7b0eb83156e01cadff31c897deca2&type=result"></script>'); --> </script>For further information contact us at helpdesk@openaire.eumore_vert All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=corda_____he::a4a7b0eb83156e01cadff31c897deca2&type=result"></script>'); --> </script>For further information contact us at helpdesk@openaire.eu