Security

The quest for security is a basic human need. We interact with increasingly complex systems daily, often entrusting them with our lives. We rely on the fact that we can drive safely when the traffic lights turn green, that service robots will place the weld seam in the right place, or that the pacemaker we use will bring our heartbeat into a normal rhythm. We rely on technologies so deeply interwoven with our everyday lives that it is hard to imagine life without them.

Electronic applications in almost every industry have long been fundamental to our society. Microelectronics form the basis for the functional safety and efficient operation of all these applications - whether in automated, networked driving, industrial production, communication, or medical technology.

 

Technological sovereignty through secure systems

 

With their research and development on microelectronic systems and components that are safe and intended to guarantee safety, the institutes cooperating in the FMD make an important contribution to technological sovereignty in the fields:

  • Trustworthy electronics
  • Protection of critical infrastructures
  • Space surveillance
  • Secure communication

The aim is to develop processes and standards to establish safety in everyday applications - from design and production to microelectronic components and systems.

Fields of application

 

Trustworthy electronics

 

Research areas:

  • Trustworthy manufacturing processes
  • Design and IP protection
  • Labeling and analysis
 

Protecting critical infrastructure

 

Research areas:

  • Self-sufficient microsystems
  • Smart grids
  • AI-supported monitoring
  • Sensor data transmission
 

Space surveillance

 

Research areas:

  • Space Situational Awareness (SSA) using radar
 

Secure communication

 

Research areas:

  • Overall architecture for systems for quantum-safe communication
  • Novel quantum keys

Project examples and background information

 

QuNET

The BMBF's QuNET funding initiative aims to enable long-term data security. The focus of the work is the so-called quantum key exchange.

 

CoDro

Common AI Algorithms for Autonomous Drones Operation (CoDro) stands for AI-based and drone-supported condition monitoring on extra-high-voltage lines.

 

ASTROSE®

Self-sufficient sensor network for monitoring high-voltage lines.

 

Trusted Resource Aware ICT

TRAICT

Development of trustworthy hardware and software components for modern 5G communication technology, etc.

 

Platform for trustworthy electronics

Velektronik

Research into the design, manufacture, and analysis of the microelectronics value chain.

 

Radar systems

TIRA and GESTRA

Monitoring of objects in near-Earth space.