Projects
Securing tunnelling and Internet protocols across the network stack KU Leuven
In this research project, the security of tunnelling and Internet protocols will be studied. We take a systems-wide perspective and study properties such as reliability, privacy, integrity, authenticity, and so on, across the full network stack. The first focus will be on tunnelling protocols, such as IPIP, GRE, IPsec, and other VPN protocols. A second focus is on the security of (virtual or private) networks where users distrust each other, ...
Security and Privacy for Cyber-Physical Systems and the Internet of Things KU Leuven
Internet connectivity has been extending its reach from servers and clients into mobile devices, consumer products and increasingly also embedded systems that connect to industrial processes, vehicles, home automation, and even the human body. The resulting cyber-physical systems create a huge potential for the development of smarter and more efficient manufacturing, tele-medecine, traffic management and so forth. Maintaining security and ...
5th GeneratiOn Security for Telecom Services KU Leuven
5GhOSTS (5th GeneratiOn Security for Telecom Services) will analyze and improve the security of service-based implementations of 5G networks, relevant to protect the EU’s critical communication infrastructure. Based on the upcoming service-based architecture for 5G by the 3GPP, which includes virtualization of network functions, 5GhOSTS aims to strengthen the security of light-weight virtualization. State-of-the-art technologies in this field ...
SOURCE: Virtual centre of excellence for research support and coordination on societal security. Vrije Universiteit Brussel
Cross-Layer Management of Security Policies in Cloud-Native Networking KU Leuven
Many industries and companies are migrating to a virtualized and orchestrated environment, allowing the deployment of Virtual Network Functions (VNFs) on cloud infrastructure. As a result, there is increasing popularity of the container orchestration frameworks for automating, scaling and managing high-availability applications towards the edge. With this trend, the security of these frameworks has become increasingly important, yet also ...
Watermarking in an end-to-end security chain. Vrije Universiteit Brussel
The Recursive Internet Architecture as a solution for optimal resource consumption, security and scalability of sensor netowrks: RINAiSense. Ghent University
RINA is a novel internet architecture, currently being designed and investigated. Wireless sensor networks consist of extremely resource-constrained devices. This environment represents the ultimate test scenario for RINA. The RINAiSense project will improve the scalability and security of wireless sensor networks, while investigating the applicability of RINA to resource-constrained systems.
A security architecture for the Internet of Things KU Leuven
Ever since the birth of the Internet in the seventies, the number of devices connected to this network has been growing exponentially. While the Internet was initially a network of generalpurpose computers, it is now common to find consumer products that contain embedded technology to have Internet connectivity. An even more recent trend is that a wide variety of devices, including industrial control systems, robots, cars, but also small ...
Groundwater Security in Africa: Groundwater enhancement through Sustainable Land Management (SLM) and Managed Artificial Recharge (MAR) Ghent University
This short visit or stay in UGent will be devoted to prepare a proposal on Enhancing water security in Africa through Sustainable Land Management (SLM) and Managed Aquifer Recharge (MAR). The proposal will be designed to bring together the networks of the North and South promoters and be founded on the results and achievements of previous hydrogeology projects of both research groups.