Time sensitive network simulation
Coordinated by
TTTech
Simulate the real time communication for the distributed based on the Time sensitive network simulation. Additionally, simulate the fail-operation clock synchronization methodology. This simulation will validate the communication stack.
Description
Describe the innovation content of the result:
Simulate the real time communication for the distributed based on the Time sensitive network simulation. Additionally, simulate the fail-operation clock synchronization methodology. This simulation will validate the communication stack.
Who will be the customer?
OEMs, Tir1, Tire2
What benefit will it bring to the customers?
Possibility to analysis the safety and security for the communication system, early validate and validation concepts
When is the expected date of achievement in the project (Mth/yr)?
The prototype after the end of the project and we will keep enhancement it with the coming 2 years.
When is the time to market (Mth/yr)?
2-3 years
What are the costs to be incurred after the project and before exploitation?
N/A
What is the approximate price range of this result/price of licences?
The plan to use the simulation tools as approve of the concept for the secure and safe communication, based in the results of the tested services and technique will integrated in the different product line.
What are the market size in Millions € for this result and relevant trend?
N/A
How will this result rank against competing products in terms of price/performance?
We follow the standard that has been accepted by our customer. We are planning to extend the BIECO results and integrate it in the different product line.
Who are the competitors for this result?
Other communication simulation providers
How fast and in what ways will the competition respond to this result?
At the end of the project will be already some exiting communication tools available but we distinguished our self with focusing on the safety and security communication for the real- communication.
Who are the partners involved in the result?
TTTech
Who are the industrial partners interested in the result (partners, sponsors, etc.)?
N/A.
Have you protected or will you protect this result? How? When?
Research publications are provided along the way of the concept development and its validation.
Other results
ResilBlockly
This exploitation result consists in cybersecurity consultancy services supported by ResilBlockly (former Blockly4SoS), a Model-Driven Engineering tool that has been developed in the context of BIECO.
Security tools for AI Investments platform
Secured AI Investments platform using the outcome of the BIECO project.
Log Forgery Blocker
Log Forgery Blocker – a brand new product on the market.
Security evaluation methodology
Security evaluation methodology to evaluate the security of an ICT system. The methodology is based on standards such as ISO 31000 standard for Risk Management, the ISO 29119 standard for Security Testing or the MUD standard…
Monitoring Tool
The monitoring tool is an infrastructure in charge of setting up and managing a monitoring component. It is based on event messages and enables the collection of complex events.
Extended MUD file
The extended Manufacturer Usage Description (MUD) file is an extension of the MUD Internet Engineering Task Force (IETF) standard…