本文へジャンプ

成果報告書詳細
管理番号20170000000295
タイトル*平成28年度中間年報 戦略的イノベーション創造プログラム(SIP)/重要インフラ等におけるサイバーセキュリティの確保 (a1)制御・通信機器のセキュリティ確認技術
公開日2017/6/7
報告書年度2016 - 2016
委託先名日本電信電話株式会社
プロジェクト番号P15011
部署名IoT推進部
和文要約
英文要約Development item: R&D project on security confirmation technologies for control and communication devices

R&D Overview and Results
Research and development on technologies that enable to confirm device securities in terms of authenticity and integrity in an effective and an efficient manner during system operation phase as well as system shipment and installation phases were carried out. These technologies consist of the following three development items

1. R&D on a platform for authenticity and integrity confirmation based on the technology to secure the root of trust.
In this theme, we are aiming to realize the scalable technology considering the life cycle of the system, to enable to confirm integrity of the system using a trust chain based on a root of trust.
In 2016, the prototype system is implemented based on the functional requirements developed in 2015 and the feasibility of the basic method is confirmed. And its effectiveness is confirmed by evaluating the prototype system in the test environment based on the reference model of important infrastructures.
And a functional requirement document for the practical system with the following features is developed, which will be implemented in 2017.
- Abnormal operation like back door communication is prevented by constantly monitoring unauthorized software changes.
- The system is provided as the platform and can be introduced in the monitored system without modifying it.

2. R&D for the configuration method of the technology to secure the root of trust to realize authenticity and integrity confirmation
In this theme, we are aiming to realize the technology to configure the root of trust to confirm authenticity and integrity throughout the lifecycle of the control and communication devices.
In 2016, its configuration method is established by the research based on the functional requirements about the root of trust and the feasibility and usefulness is demonstrated by the prototype system.
After 2017, a trust of proof technology based on this configuration method is applied to the first research theme “R&D on a platform for authenticity and integrity confirmation based on the technology to secure the root of trust”.

3. R&D of inspection technology for threats against the technology to secure the root of trust based authenticity and integrity confirmation function
In this theme, we are aiming to realize the following inspection technologies with authenticity and integrity confirmation function based on the technologies developed in the first and the second research theme.
(1) Confirmation technology for retaining authenticity and integrity confirmation functions in the control and communication devices
(2) Vulnerability inspection technology in case of functional loss and unauthorized operation for the control and communication devices
In 2016, the basic method is established by the research based on the functional requirements studied in 2015. And the usefulness of the method is evaluated by the prototype system.
And a functional requirement document for the practical system is developed, which will be implemented in 2017.

Research Publication
- Special Equipment Exhibition & Conference for Anti-Terrorism (SEECAT) (Oct.2016, in Tokyo)
- FUJITSU Security Forum 2016 (Nov.2016, in Tokyo)
ダウンロード成果報告書データベース(ユーザ登録必須)から、ダウンロードしてください。

▲トップに戻る