TII
Zero Trust approach to Autonomous Systems

The Zero Trust paradigm allows security teams to plan for the possibility that vulnerabilities may exist throughout a chain of interactions among multiple systems, such as across several cloud services, data processes, storage services, and networks. The fundamental concept is to never trust and always verify the provenance of each request. Another basic principle is to assume that a breach has already occurred, making it essential to limit the blast radius of any breach.

Secure Systems for autonomous drones are designed from silicon to application, from edge to cloud and from on-premise to mobile- via zero- trust communications that entail never trusting and always verifying every component.

SSRC is developing and embedding security and resilience features in each of the key components which are based on the open-source ecosystem. We aim to leverage the flexibility, innovation and freedom offered by the open-source ecosystems to not only add value to these ecosystems but also develop our own IP on top of them. An example is the rich ecosystem and state-of-the-art RISC-V Processor, PX4 Auto Pilot, ROS2/SROS (Secure Robot Operating System), KVM/seL4 Hypervisor, Nuttx Real Time OS and Linux OS with TII/SSRC Modular Secure stack.

TII
Secure Technologies

Secure Technologies delivers a complete secure software stack that can be used in smart phones and communicators, secure network modules and appliances, and secure autonomous drones.

SSRC is developing and embedding security and resilience features in each of the key components which are based on the open-source ecosystem. We aim to leverage the flexibility, innovation and freedom offered by the open-source ecosystems to not only add value to these ecosystems but also develop our own IP on top of them. An example is the rich ecosystem and state-of-the-art ARM/RISC-V processors KVM/seL4 Hypervisor, Linux OS, and application stack (P2P Chat Application, Cloud based Android and App Virtualization).

TII
Secure Mesh Shield

A Secure and Resilient Mesh Communication protecting against a wide variety of security vulnerabilities and attacks (e.g., De-auth, MitM, Penetration, Routing, flooding, exfiltration).

This will enable:

  • Secure and resilient human-to-human communication capabilities independent of traditional communication infrastructure.
  • Secure and resilient machine-to-machine communication adaptable to changing environments and conditions.
  • Setup of ad-hoc, non-permanent coverage-based deployment for mobile/static communication capabilities.
  • Contributing to Open Sourcing Secure Comms technologies (BATMAN-adv routing improvements; OSF, BT-based Synchronous Flooding Mesh).