Securing IoT Applications with Smart Objects: Framework and a Socially Assistive Robots Case Study

The expanded deployment of smart objects in IoT applications is pushing existing IoT platform architectures and their security functionalities to their limits. Indeed, smart objects exhibit semi-autonomous behaviours, are not centrally controlled all the time and therefore need more dynamic approaches in protecting them against vulnerabilities and security incidents. In this paper, we introduce a novel framework for securing the latest generation of IoT applications that involve smart objects, while illustrating its application in securing an Ambient Assisted Living (AAL) system that comprises socially assistive robots. The framework’s innovative aspects lie in the use of predictive analytics for anticipating the behaviour of smart objects, including abnormalities in their security behaviour. The importance of anticipating such abnormalities is validated, demonstrated and discussed in the context of the AAL application.

[1]  L. Fried,et al.  Frailty in older adults: evidence for a phenotype. , 2001, The journals of gerontology. Series A, Biological sciences and medical sciences.

[2]  I. McDowell,et al.  A global clinical measure of fitness and frailty in elderly people , 2005, Canadian Medical Association Journal.

[3]  Alexandru Vulpe,et al.  eWALL: An Open-Source Cloud-Based eHealth Platform for Creating Home Caring Environments for Older Adults Living with Chronic Diseases or Frailty , 2017, Wirel. Pers. Commun..

[4]  Howard Bergman,et al.  Models, definitions, and criteria of frailty. , 2003, Aging clinical and experimental research.

[5]  Donato Di Paola,et al.  IoT-aided robotics applications: Technological implications, target domains and open issues , 2014, Comput. Commun..

[6]  Zhendong Ma,et al.  Security Viewpoint in a Reference Architecture Model for Cyber-Physical Production Systems , 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[7]  John Soldatos,et al.  Scalable and Configurable End-to-End Collection and Analysis of IoT Security Data : Towards End-to-End Security in IoT Systems , 2019, 2019 Global IoT Summit (GIoTS).

[8]  Springer Handbook of Robotics , 2008 .

[9]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[10]  Prem Prakash Jayaraman,et al.  OpenIoT: Open Source Internet-of-Things in the Cloud , 2014, OpenIoT@SoftCOM.

[11]  Oussama Khatib,et al.  Springer Handbook of Robotics , 2007, Springer Handbooks.