Jump to content
AIT Logo

Secure COnnected Trustable Things

Creating trust in wireless solutions and increasing their social acceptance are major challenges to achieve the full potential of the Internet of Things (IoT). Therefore, SCOTT – Secure COnnected Trustable Things, a pan-European effort with more than 50 key partners from 10 countries, will provide comprehensive cost-efficient solutions of wireless, end-to-end secure, trustworthy connectivity and interoperability (Technology Readiness Level 6-7)) to bridge the last mile to the market. SCOTT will not just deal with 'things that are connected', but with 'trustable things that securely communicate', i.e. things interconnected by dependable wireless technology and valuing the end-users' privacy rules.
SCOTT will focus on wireless sensor and actuator networks and communication in the areas of mobility, building & home / smart infrastructure as well as health. This addresses numerous European societal challenges such as smart, green and integrated transport, secure and inclusive societies as well as health and wellbeing. SCOTT will enable efficient, trustworthy connectivity and facilitate ubiquity of intelligent embedded systems and systems of systems.

SCOTT takes user’s experience seriously and follows a user-centred design to put security and privacy really in the hands of the user. SCOTT will simplify activation and configuration of security and privacy, and will develop a metrics and a framework for ‘measurable security and privacy’ to finally create an unprecedented ‘privacy labelling’ for systems and systems of systems. This will lead to dedicated standardization efforts which also include work on ontologies for security and privacy concepts in the cyber-physical systems (CPS) and IoT domains.

SCOTT uses a standardized multi-domain reference architecture, created in a predecessor project (DEWI and its “Bubble concept”) and being fully compliant with ISO 29182 - Sensor Network Reference Architecture, which fosters reusability, scalability, and interoperability of SCOTT solutions. SCOTT also utilizes a clearly use-case driven approach with more than 20 use cases from different areas of high relevance to European society and industry; a specific focus will be put on cross-domain use cases and heterogeneous environments, emphasizing 5G and cloud computing aspects to build up digital ecosystems to achieve a broader market penetration.
Tangible results from all use cases will ultimately be shown to a broader public via more than 30 demonstrators all over Europe.Use Cases will be further substantiated by the development and utilization of 50 technical building blocks for security/safety, distributed cloud integration, energy efficiency by all means and autonomy of devices, which are all necessary to realize the SCOTT use cases and facilitate composability of systems as well as cross-domain sharing of trustable wireless technologies and services. The excellent partner consortium of SCOTT facilitates comprehensive vertical integration in different areas, covering the full value chain from silicon to end-users and operators. By providing reference implementations, SCOTT aims at establishing an eco-system for trustable wireless solutions and services for both professional and private users by attracting 3rd parties and particularly SMEs. This together with the involvement of open innovation approaches and stakeholder engagement will further boost and exploit the growing “Internet economy”.

SCOTT will open up new market opportunities for European industry, will significantly reduce time to market and decrease costs for trustable wireless solutions on the market, in particular by using new designs and technical building blocks. SCOTT will develop methods and tools capable of meeting prospect use-case requirements on reliability, robustness, security and functional safety even in harsh and/or not trusted environments.
Ultimately, SCOTT will foster the European leadership for Smart and Connected Things (including Internet of Things) and will strengthen Europe’s independence for security enabling components and systems.

Facts:

  • Starting date: May 2017
  • Duration: 3 Years
  • Funding: funded by the FFG (IKT der Zukunft - ECSEL 3. Ausschreibung 2016)