WP8 – Integration, Pilots, and Validation
Coordinated by
HS (M09-M36)
Objective
This work package has the following objectives:
- Develop a cloud platform, according to the reference architecture of WP2, that host the verification and validation activities within BIECO, as well as the applications and datasets of the pilots.
- Develop the business case implementations.
- Provide a set of front-end applications for enabling the back-end services developed in the project.
- Establish a common integration, testing and verification strategy for the various software implementations of the BIECO framework.
- To test the BIECO framework and tools.
- To validate and verify the BIECO framework, consisting of platform, security tools and business case applications.
- To test and validate the use cases, both from the technological and business perspective.
Objectives
- D8.1 BIECO verification and testing strategy WP8 (8 – HS) Report Public M12
- D8.2 BIECO Assessment methodology WP8 (1 – UNINOVA) Report Public M20
- D8.3 BIECO Assessment report WP8 (1 – UNINOVA) Report Public M36
Outcomes
Monitoring Tool
The monitoring tool is an infrastructure in charge of setting up and managing a monitoring component. It is based on event messages and enables the collection of complex events.
Security Testing Tool
GdpR-based cOmbinatOrial Testing (GROOT) is a general combinatorial strategy for testing systems managing GDPR’s concepts (e.g., Data Subject, Personal Data or Controller).
Domain Specific Language
The domain specific language enables specification of digital twin behaviour in a manner that can enable a predicted evaluation of its trustworthy behaviour in a simulated environment
Fail-operation clock synchronization methodology
Synchronization loss can occur due to many reasons, either because of a device or link failure or due to a targeted attack on the reference node, which supplies the corrected time to the network’s nodes.
Time sensitive network simulation
Simulate the real time communication for the distributed based on the Time sensitive network simulation. Additionally, simulate the fail-operation clock synchronization methodology. This simulation will validate the communication stack.
Remote updating- upgrading of vehicle firmware
Securing remote and in-vehicle communications against cyber-attacks, possibly performed with quantum computers in the near future, is a major goal in the automotive sector.