Skip to main content
Log in

Securing IoT Applications with Smart Objects: Framework and a Socially Assistive Robots Case Study

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The expanded deployment of smart objects in IoT applications is pushing existing IoT platform architectures and their security functionalities to their limits. Indeed, smart objects exhibit semi-autonomous behaviours, are not centrally controlled all the time and therefore need more dynamic approaches in protecting them against vulnerabilities and security incidents. In this paper, we introduce a novel framework for securing the latest generation of IoT applications that involve smart objects, while illustrating its application in securing an Ambient Assisted Living (AAL) system that comprises socially assistive robots. The framework’s innovative aspects lie in the use of predictive analytics for anticipating the behaviour of smart objects, including abnormalities in their security behaviour. The importance of anticipating such abnormalities is validated, demonstrated and discussed in the context of the AAL application.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Roukounaki, A., Efremidis, S., Soldatos, J., Neises, J., Walloschke, T., & Kefalakis, N. (2019). Scalable and configurable end-to-end collection and analysis of IoT security data: Towards end-to-end security in IoT systems. GIoTS 1–6.

  2. Soldatos, J, Kefalakis, N., Hauswirth, M., Serrano, M., Calbimonte, J. P., Riahi, M., et al. (2014). Reinhard herzog: OpenIoT: open source internet-of-things in the cloud. OpenIoT@SoftCOM 13–25.

  3. Ma, Z., Hudic, A., Shaaban A., & Plosz, S. (2017). Security viewpoint in a reference architecture model for cyber-physical production systems. In 2017 IEEE European symposium on security and privacy workshops (EuroS&PW) (pp. 153–159). Paris. https://doi.org/10.1109/EuroSPW.2017.65.

  4. Schrecker, S., Soroush, H., & Molina, J. (2016). Industrial internet of things volume G4: Security framework. IIC Security Framework, IIC:PUB:G4:V1.0:PB:20160926.

  5. Hogan, D. B., MacKnight, C., & Bergman, H. (2003). Models, definitions, and criteria of frailty. Aging Clinical and Experimental Research, 15(3), 1–29.

    Google Scholar 

  6. Fried, L. P., Tangen, C. M., Walston, J., Newman, A. B., et al. (2001). Frailty in older adults: evidence for a phenotype. The Journals of Gerontology Series A: Biological Sciences and Medical Sciences, 56(3), M146–M156.

    Article  Google Scholar 

  7. Rockwood, K., Song, X., MacKnigh, C., et al. (2005). A global clinical measure of fitness and frailty in elderly people. CMAJ, 173(5), 489–495.

    Article  Google Scholar 

  8. Kyriazakos, S., Prasad, R., Mihovska, A., Pnevmatikakis, A., & Wireless Personal Communications, (2017). eWALL: An open-source cloud-based ehealth platform for creating home caring environments for older adults living with chronic diseases or frailty. Wireless Personal Communications, 97(2), 1835–1875.

    Article  Google Scholar 

  9. ISO 9241–11:1998 Ergonomic requirements for office work with visual display terminals (VDTs)—Part 11: Guidance on usability.

  10. ISO 9241–210:2010 Ergonomics of human-system interaction—Part 210: Human-centred design for interactive systems.

  11. Siciliano, O., & Khatib, B. (2008). Springer Handbook of Robotics. Berlin: Springer.

    Book  Google Scholar 

  12. Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54(15), 2787–2805.

    Article  Google Scholar 

  13. Grieco, L. A., Rizzo, A., Colucci, S., Sicari, S., Piro, G., Di Paola, D., et al. (2014). IoT-aided robotics applications. Computer Communications, 54, 32–47.

    Article  Google Scholar 

Download references

Acknowledgements

This work has been carried out in the scope of the H2020 SecureIoT project, which is funded by the European Commission in the scope of its H2020 programme (Contract Number 779899). The authors acknowledge valuable help and contributions from all partners of the project.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to John Soldatos.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Soldatos, J., Kyriazakos, S., Ziafati, P. et al. Securing IoT Applications with Smart Objects: Framework and a Socially Assistive Robots Case Study. Wireless Pers Commun 117, 261–280 (2021). https://doi.org/10.1007/s11277-020-07039-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07039-1

Keywords

Navigation