The Challenges behind Independent Living Support Systems

  • Giampaolo Bella
  • Pekka Jäppinen
  • Jussi Laakkonen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8610)


Despite their crucial goal of assisting the elderly through their daily routine, Independent Living Support systems still are at their inception. This paper postulates that such systems be designed with a number of requirements in mind, and in particular with safety, security and privacy as fundamental ones. It then correspondingly articulates the three main challenges behind the development of Independent Living Support systems: requirement elicitation, design and correctness analysis. It is found that requirement elicitation will have to cope with a large variety of issues; that design will have to proceed from modularity; and, notably, that correctness analysis will have to be socio-technical. The last finding in particular emphasises that, for a system that prescribes vast interaction with the human, system correctness only makes sense if the system is analysed in combination with the human, rather than in isolation from the human. Building upon previous experience with the socio-technical analysis of Internet browsers, this paper identifies the specific socio-technical challenges that Independent Living Support systems pose, and indicates an approach to succeed in taking them.


Smart Home Elderly User Requirement Elicitation Internet Browser Internet Security 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Heinilä, P. (ed.): Deliverable 3.1: Technical Specifications, Test and Implementations Scenarios. Technical report, Mobiserv project report (2010)Google Scholar
  2. 2.
    URL: Fluorouracil Incident Root Cause Analysis (2007),
  3. 3.
    Radke, K., Boyd, C., Gonzalez Nieto, J., Brereton, M.: Ceremony Analysis: Strengths and Weaknesses. In: Camenisch, J., Fischer-Hübner, S., Murayama, Y., Portmann, A., Rieder, C. (eds.) SEC 2011. IFIP AICT, vol. 354, pp. 104–115. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  4. 4.
    URL: How the Nokia Browser Decrypts SSL traffic: “A Man in the Client” (2013),
  5. 5.
    URL: Mobiserv project website (2014),
  6. 6.
    Laakkonen, J., Annala, S., Jäppinen, P.: Abstracted architecture for Smart Grid privacy analysis. In: 2013 ASE/IEEE International Conference on Privacy, Security, Risk and Trust (2013)Google Scholar
  7. 7.
    Hui, K.L., Png, I.: The Economics of Privacy. Industrial Organization 0505007, EconWPA (2005)Google Scholar
  8. 8.
    Ward, M.R.: The economics of online retail markets (2001)Google Scholar
  9. 9.
    Solove, D.: ’I’ve Got Nothing to Hide’ and Other Misunderstandings of Privacy. Social Science Research Network Working Paper Series (2007)Google Scholar
  10. 10.
    Bella, G., Coles-Kemp, L.: Layered analysis of security ceremonies. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IFIP AICT, vol. 376, pp. 273–286. Springer, Heidelberg (2012)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Giampaolo Bella
    • 1
  • Pekka Jäppinen
    • 2
  • Jussi Laakkonen
    • 2
  1. 1.Dipartimento di Matematica e InformaticaUniversità di CataniaItaly
  2. 2.Software Engineering and Information ManagementLappeenranta University of TechnologyFinland

Personalised recommendations