Chapter 6 Inter-Ledger Platform for Cyber-Threat Information Sharing and Lifecycle Security

By Jesús García-Rodríguez, University of Murcia, Department of Information and Communication Engineering, University of Murcia, 30100 Murcia, Spain, jesus.garcia15@um.es | Ekam Puri Nieto, University of Murcia, Department of Information and Communication Engineering, University of Murcia, 30100, Murcia, Spain, ekam.purin@um.es | Juan Francisco Martínez Gil, University of Murcia, Department of Information and Communication Engineering, University of Murcia, 30100, Murcia, Spain, juanfrancisco.martinezg@um.es | Agustín Marín Frutos, University of Murcia, Department of Information and Communication Engineering, University of Murcia, 30100, Murcia, Spain, agustin.marinf@um.es

Downloaded: 157 times

Published: 07 May 2025

© 2025 Jesús García-Rodríguez | Ekam Puri Nieto | Juan Francisco Martínez Gil | Agustín Marín Frutos

Abstract

Exploration in the crucial role of cyber threat intelligence (CTI) sharing and lifecycle security in IoT ecosystems. It examines how the ERATOSTHENES project leverages distributed ledger technology (DLT) and an inter-ledger approach to facilitate secure and privacy-preserving CTI exchange across different domains. The chapter also discusses the use of Manufacturer Usage Description (MUD) files, including the proposed Threat MUD extension, to manage security configurations and mitigation actions throughout the device lifecycle. Additionally, it highlights the integration of these components to achieve a system that dynamically responds to cybersecurity incidents, ensuring the ongoing protection of devices and domains.