ROBUST-6G

Automatic threat detection and mitigation in 6G-enabled IoT environments

The UC proposes scenarios of increasing complexity, focused on the 6G far/extreme edge where IoT platforms and devices are all orchestrable, and leverage the ROBUST-6G platform for their validation. In particular, the key enabler elements are the Zero-touch Security management, the Data Fabric, and AI/ML-enabled decision agents that interact to implement required closed loops for threat detection, reaction decision, and mitigation/corrective actions enforcement. Scenario 1 considers the compromission of a Smart HVAC system to cause economic harm. With the same end, Scenario 3 considers the compromission of IoT devices in a Smart Agriculture environment. Scenario 2 is focused on the compromission and fraudulent usage of smart devices for crypto mining (cryptojacking). All the scenarios exploit network traffic and sensor data to detect anomalies and closed-loop based mechanisms for automatic zero-touch remediation.

Type of experiment:
Proof of Concept

Functionality:
Intelligent Network Architecture

Location(s):
Italy

Vertical sector(s):
Cybersecurity

ROBUST-6G


Duration:

GA Number: 101139068

SNS JU Call (Stream):
Call 2
Stream B