本文へジャンプ

成果報告書詳細
管理番号20190000000675
タイトル*平成30年度中間年報 戦略的イノベーション創造プログラム( SIP )第 2期/IoT 社会に対応したサイバー・フィジカル・セキュリティ/(B2) 信頼チェーンに関わる情報の安全な流通技術研究開発
公開日2019/6/25
報告書年度2018 - 2018
委託先名富士通株式会社
プロジェクト番号P18015
部署名IoT推進部
和文要約
英文要約Title:R&D project for safe distribution technology of information related to trust chain /Cyber Physical Security for the IoT Society (FY2018-FY2022) FY2018 Annual Report

(1) Technology for authentication and traceability required for building trust chain during data distribution
The control nodes of the supply chain autonomously distribute information for maintenance and operation of the supply chain to the control nodes each other by mutual agreement circulation between the control nodes of companies, organizations and sites participating in the supply chain. Our target is to realize a sharing information validness, high reliability, traceability.
In order to realize the above, certificates are given to information distributed / shared among members participating in the supply chain, guaranteeing the validity of the attribute data in the certificate, the signature, the hash code verification, and the distributed ledger technology We investigated a method of distributing and sharing information by utilizing it. Also, by describing the operation history in the ledger, we examined a method to realize traceability.
In 2018, Conceptual design to proceed with the above study was carried out.
Specifically, we have developed functional requirements for distributed ledger and certification required for supply chain. In addition, data distribution method that shares data distribution operation information with the distribution ledger and performs data transaction according to the shared data distribution operation, and distributed / A prototype version (verification level) of the distributed authentication method judged by processing was designed externally.

(2) Technology for visualizing the impact of cyberattacks related to data distribution
In 2018, by monitoring the communication packets inside the supply chain that the control nodes making up the supply chain and the back-end system monitor, and analyzing the communication behavior focusing on the action process, it is possible to determine whether or not there is a remote operation, the type of the device egardless of whether it is an unknown attack, we have developed functional requirements to visualize.

(3) Technology for minimizing any impact on the system by cyberattacks
In 2018, by analyzing the detection result of (2) of the control node making up the supply chain and the security log detected by the defense function such as the firewall and IPS, and calculating the risk level of the control node, We set up a functional requirement concerning the technology to take initial countermeasures.

(4)Technology for assuring resiliency related to safe data distribution
In 2018, we analyze security information detected in (2) and (3) shared through (1) and security incidents generated in each control node in order to secure supply chain resilience We have developed functional requirements concerning measures to deal with, recommendations for action to be taken in the system.
ダウンロード成果報告書データベース(ユーザ登録必須)から、ダウンロードしてください。

▲トップに戻る