top of page


Connected Mobile Machine Lifetime Cyber Security – COMMA
MAIN OBJECTIVE
The main focus of COMMA is how safety and security based value is created through the entire system lifespan and how new business is created from the identified value in mobile machine context.

More information

Marikka Heikkilä
Research Director
University Turku
Email: marikka.heikkila@utu.fi
Phone: +35850 440 2882

Bilhanan Silverajan
Post-Doctoral Research Fellow
Tampere University
Email: bilhanan.silverajan@tuni.fi
Phone: +35840 849 0757


OBJECTIVES
in more detail
The transition towards autonomous and electrified machines is rapidly changing the heavy mobile machinery sector. This transition brings new opportunities to technology enterprises and their supply networks.
The increasing role of software and the use of artificial intelligence, as well as increased connectivity with other systems, set new requirements for the design, operation, and maintenance of the machines. The requirements need to be considered throughout the entire lifetime and across the whole supply network.

Cybersecurity
and business continuity in inter-organizational relationships

Value-based sales and business logic of cybersecurity in mobile machinery

Integration of
cybersecurity and safety engineering approaches

Functional
safety of connected
data intensive machine
systems
bottom of page