1 00:00:00,160 --> 00:00:02,080 The International Chair of Smart Rural 2 00:00:02,080 --> 00:00:04,240 IoT and Secured Environments brings 3 00:00:04,240 --> 00:00:05,680 together activities such as the 4 00:00:05,680 --> 00:00:08,120 collection of information, analysis, and 5 00:00:08,120 --> 00:00:10,320 active dissemination, under different 6 00:00:10,320 --> 00:00:12,160 approaches, of the documentation 7 00:00:12,160 --> 00:00:14,640 accumulated in research, technologies, 8 00:00:14,640 --> 00:00:16,400 and disciplines that use artificial 9 00:00:16,400 --> 00:00:18,720 intelligence in the field of IoT, where 10 00:00:18,720 --> 00:00:20,240 it also provides training in 11 00:00:20,240 --> 00:00:21,120 cybersecurity. 12 00:00:21,881 --> 00:00:24,361 The development of the Internet of Things 13 00:00:24,601 --> 00:00:26,481 has facilitated the connection between 14 00:00:26,481 --> 00:00:29,361 the real world and the digital world. The 15 00:00:29,361 --> 00:00:31,441 sensing of information and the ability to 16 00:00:31,441 --> 00:00:33,441 act on the physical world has enabled the 17 00:00:33,441 --> 00:00:35,481 creation of a smart ecosystem that is 18 00:00:35,481 --> 00:00:37,681 being used to improve essential aspects 19 00:00:37,681 --> 00:00:40,201 of production, distribution and resource 20 00:00:40,201 --> 00:00:42,761 generation systems, energy, food, 21 00:00:42,841 --> 00:00:44,121 environment, etc. 22 00:00:45,252 --> 00:00:47,852 However, as is the case when a technology 23 00:00:47,852 --> 00:00:49,892 breaks into industrial and residential 24 00:00:49,892 --> 00:00:52,492 systems in such a direct way, the very 25 00:00:52,492 --> 00:00:54,452 benefits they provide make these IoT 26 00:00:54,452 --> 00:00:56,052 systems a coveted target for 27 00:00:56,052 --> 00:00:58,372 cybercriminals. The cyber threats are 28 00:00:58,372 --> 00:01:00,252 many and in common with those already 29 00:01:00,252 --> 00:01:02,452 defined for traditional server and/or 30 00:01:02,452 --> 00:01:04,652 computer environments. In the specific 31 00:01:04,652 --> 00:01:06,932 case of IoT, it is not only the 32 00:01:06,932 --> 00:01:08,852 securitization of the IoT devices 33 00:01:08,852 --> 00:01:10,572 themselves that needs to be taken into 34 00:01:10,572 --> 00:01:12,612 account, but also the transmission of 35 00:01:12,612 --> 00:01:15,412 information and data exchanged with IoT 36 00:01:15,412 --> 00:01:17,812 device fleet management systems. This 37 00:01:17,812 --> 00:01:19,292 makes the exposure surface of these 38 00:01:19,292 --> 00:01:21,732 systems very large and their dispersion 39 00:01:21,732 --> 00:01:23,732 also complicates the ability to correct 40 00:01:23,732 --> 00:01:26,532 problems, e.g. firmware updates or device 41 00:01:26,532 --> 00:01:27,572 anomaly issues. 42 00:01:28,903 --> 00:01:31,343 When considering urban environments, this 43 00:01:31,343 --> 00:01:34,063 deployment of IoT devices is associated 44 00:01:34,063 --> 00:01:36,783 with the concept of Smart Cities. For the 45 00:01:36,783 --> 00:01:39,663 smart management of certain areas: waste 46 00:01:39,663 --> 00:01:42,143 management, air quality monitoring, noise 47 00:01:42,143 --> 00:01:44,543 pollution monitoring, traffic congestion, 48 00:01:44,863 --> 00:01:47,583 energy consumption, automated parking, 49 00:01:47,903 --> 00:01:50,463 automatic lighting, among others. There 50 00:01:50,463 --> 00:01:52,263 are many projects and research in the 51 00:01:52,263 --> 00:01:54,543 field of smart cities and cybersecurity 52 00:01:54,543 --> 00:01:56,263 that cover different aspects of threat 53 00:01:56,263 --> 00:01:58,223 mechanisms and threat detection 54 00:01:58,223 --> 00:01:58,783 approaches. 55 00:01:59,655 --> 00:02:02,015 However, none of these projects cover the 56 00:02:02,015 --> 00:02:04,295 environment associated with rural areas, 57 00:02:04,455 --> 00:02:06,775 Smart Rural Areas, hereafter SRA. 58 00:02:07,415 --> 00:02:09,455 SRA is sometimes used as a term 59 00:02:09,455 --> 00:02:11,815 associated with smart villages, although 60 00:02:11,815 --> 00:02:14,095 the scope of SRA is much broader than 61 00:02:14,095 --> 00:02:16,175 this. The boundary conditions for the 62 00:02:16,175 --> 00:02:17,975 deployment of IoT systems are 63 00:02:17,975 --> 00:02:19,655 specifically different and apply to 64 00:02:19,655 --> 00:02:21,935 domains such as smart health, smart 65 00:02:21,935 --> 00:02:23,975 education, digital infrastructure 66 00:02:23,975 --> 00:02:25,895 development in villages, community 67 00:02:25,895 --> 00:02:27,735 infrastructure development, efficient 68 00:02:27,735 --> 00:02:30,615 energy management,precision, agriculture, 69 00:02:30,615 --> 00:02:33,095 or rural heritage conservation. In this 70 00:02:33,095 --> 00:02:35,295 case, projects integrating IoT 71 00:02:35,295 --> 00:02:36,775 infrastructure protection in these 72 00:02:36,775 --> 00:02:39,255 domains are very restricted to efficient 73 00:02:39,255 --> 00:02:41,735 energy management, smart grids of rural 74 00:02:41,735 --> 00:02:44,535 areas. This is the reason for focusing 75 00:02:44,535 --> 00:02:46,135 the proposal on the analysis of the 76 00:02:46,135 --> 00:02:48,775 security and privacy of IoT systems in 77 00:02:48,775 --> 00:02:50,975 rural environments and the capacity to 78 00:02:50,975 --> 00:02:52,855 respond to cyber incidents in these 79 00:02:52,855 --> 00:02:53,655 environments. 80 00:02:54,135 --> 00:02:55,895 Taking into account the context defined 81 00:02:55,895 --> 00:02:57,695 above, the overall objective of the 82 00:02:57,695 --> 00:03:00,215 proposal is to create an IoT network 83 00:03:00,215 --> 00:03:03,015 laboratory for experimentation, research, 84 00:03:03,015 --> 00:03:04,775 and transfer of the development of 85 00:03:04,775 --> 00:03:07,255 techniques for analysis and detection of 86 00:03:07,255 --> 00:03:09,575 cyber threats in rural environments. 87 00:03:09,895 --> 00:03:11,935 Therefore, the following objectives are 88 00:03:11,935 --> 00:03:14,855 proposed: IoT Cyber Threat Analysis 89 00:03:14,855 --> 00:03:17,495 Laboratory Intelligent Rural IoT 90 00:03:17,495 --> 00:03:20,375 LaboratoryDevelopment of AI techniques 91 00:03:20,375 --> 00:03:22,455 for the detection of cyber threats for 92 00:03:22,455 --> 00:03:24,455 smart rural IoT environments. 93 00:03:24,855 --> 00:03:27,535 Optimization and deployment of AI-based 94 00:03:27,535 --> 00:03:29,815 predictive models in IoT devices. 95 00:03:31,391 --> 00:03:32,991 of the generation of knowledge within the 96 00:03:32,991 --> 00:03:35,711 chair, and as a contribution to society, 97 00:03:35,711 --> 00:03:38,351 an observatory of AI techniques and their 98 00:03:38,351 --> 00:03:40,831 application in IoT will also be created: 99 00:03:41,391 --> 00:03:43,791 AI for IoT Observatory. The 100 00:03:43,791 --> 00:03:46,071 observatory aims to become a benchmark in 101 00:03:46,071 --> 00:03:47,951 the field of artificial intelligence 102 00:03:47,951 --> 00:03:50,271 application in IoT environments and 103 00:03:50,271 --> 00:03:52,951 deployments. Among its objectives, it 104 00:03:52,951 --> 00:03:55,151 aims to actively monitor and disseminate 105 00:03:55,151 --> 00:03:56,751 the state-of-the-art in research, 106 00:03:57,071 --> 00:03:59,111 technologies, and adoption of the main 107 00:03:59,111 --> 00:04:00,991 techniques and disciplines that use 108 00:04:00,991 --> 00:04:02,831 artificial intelligence in the field of 109 00:04:02,831 --> 00:04:05,111 IoT and more specifically in rural 110 00:04:05,111 --> 00:04:06,751 environments, environments with 111 00:04:06,751 --> 00:04:09,751 limitations. Additionally, it aims to 112 00:04:09,751 --> 00:04:11,751 raise awareness about the advantages and 113 00:04:11,751 --> 00:04:14,191 disadvantages of this application of AI 114 00:04:14,191 --> 00:04:16,031 in different domains, such as the 115 00:04:16,031 --> 00:04:18,111 development of digital infrastructures in 116 00:04:18,111 --> 00:04:20,511 villages, efficient energy management, 117 00:04:20,751 --> 00:04:23,391 precision, agriculture, or rural heritage 118 00:04:23,391 --> 00:04:24,191 conservation. 119 00:04:26,582 --> 00:04:28,742 The chair is not only oriented towards 120 00:04:28,742 --> 00:04:31,222 research, but also towards training both 121 00:04:31,222 --> 00:04:33,382 the general public through a MOOC course 122 00:04:33,542 --> 00:04:35,222 and the creation of experts through 123 00:04:35,222 --> 00:04:37,062 various specialization courses. 124 00:04:38,198 --> 00:04:40,518 The participating institutions are UNED, 125 00:04:40,758 --> 00:04:43,398 Universidade Nova Delis Boa, Casorcio 126 00:04:43,398 --> 00:04:45,878 Centro Associado UNED and Ponferrada, 127 00:04:46,198 --> 00:04:48,398 and is funded by the Ministry of Digital 128 00:04:48,398 --> 00:04:50,838 Transformation and Public Administration 129 00:04:51,078 --> 00:04:52,078 through INCYBE. 130 00:04:53,245 --> 00:04:54,765 Thanks for your attention, and you can 131 00:04:54,765 --> 00:04:56,525 find more info about our chair and our 132 00:04:56,525 --> 00:04:57,085 website 133 00:04:57,205 --> 00:05:00,925 https://srisi. 134 00:05:01,325 --> 00:05:03,405 informatica dot uned dot es