Skip to main content

Secure and Safe Internet of Things

Deliverables

Application-driven virtual testing environment

The 1st version (M18) provides information of the overall testing environment. The final version (M26) extends the 1st version by including the outcomes and the results of the period in-between.

Cross-layer applications to support SerIoT application scenarios

Applications & HMIs for supporting the SerIoT use cases will be described hereing (e.g. OASA, DT; T-Sys., GRUVENTA, etc. for the Final version) This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M18 while the final version will follow in M30.

IoT Security threats digest and analysis

Detailed report, including market analysis in respect future challenges of IoT applications & ecosystems.

SerIoT requirements and guidelines

Technical report containing the user & system requirements of the IoT ecosystem that SerIoT envisions (based on JIRA & Volere methodology). This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M12, an updated version will follow in M24, while the final on shall be expected by M30.

Analysis of IoT devices & recommendations for the ad-hoc SerIoT honeypots developments

Detailed report analysing trends in dynamic honeypots & recommendations for the IoT ecosystem. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M24 while an updated version will follow in M30.

Use Cases definition and requirements document

Detailed report using formal description through UML for the use cases (stakeholders & actors, requirements, etc.). This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M6, two updates will follow in M12 and M24, respectivelly, while the final on shall be expected by M30.

Verification of SDN-Controller and Secure Router Design

Report on formal model of SDN routers and their flow rules, incremental verification methods to obtain an efficient tool for checking the correctness of distributed flow rules. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M12, an updated version will follow in M24, while the final on shall be expected by M36. In particular, the final version will also include an evaluation report of the proposed security and safety verification tools applied to SerIoT use cases.

SerIoT Architecture & Specifications

SerIoT End-to-end Architecture & Specifications, detailed report on dynamic SDN-based system architecture, including the SDN-Controller, secure SerIoT router, Analytics and Visual Analytics components and their interactions. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M12 while an updated version will follow in M24.

Plans for the dissemination and communication of project results

Deliverable reporting on the plans & the dissemination activities of SerIoT including dissemination & communication material. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M6, two updates will follow in M12 and M24, respectivelly, while the final on shall be expected by M36.

Project web site

Reporting on the Web site's layout & structure.

Pilots Installation Methodology, Evaluation Plans & Assessment Framework

The 1st version of this deliverable (M18) will include the methodology, evaluation and assessment plans, while the 2nd one (M26) will include any missing information stemming from the introduction of third parties scenarios, technologies to be benchmarked with SerIoT IoT ecosystem.

Architectural Formal Modelling, Analysis & Synthesis

Detailed report on formalization of SerIoT architectural models, including behavioural models, security policy architectures for SerIoT use cases, and global security and safety properties. In addition, the report includes a methodology and proposed tool chain for automated security verification and for synthesizing run-time monitors from security policy architectures. The final M36 version includes an evaluation of the proposed security and safety verification tool chain applied to SerIoT use cases. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M12 while an updated version will follow in M24.

Data Management Plan

Report describing the project’s data management plans. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M6, an updated version will follow in M24, while the final one will be delivered by the end of the project in M36.

Cross-layer anomaly detection framework

Technical report describing the novel algorithms developed in details. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M18 while an updated version will follow in M30.

Extension of the SDN-Controller

This deliverable will include a generic design and architecture of the privacy framework extension for the SDN-Controller, as well as a software prototype implementation based on the Open-Source ONOS controller, together with the corresponding documentation. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M18 while an updated version will follow in M29.

SerIoT malicious evidence collection infrastructure

Technical report detailing the datasets collected in SerIoT. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M18 while an updated version will follow in M22.

SerIoT SDN Security Framework

Technical Report describing the SDN security framework and specifying extensions to existing SDN controller. Also includes software that implements the extension to the Open-Source SDN controller ONOS. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M18 while an updated version will follow in M26.

SDN-enabled Secure Router

Technical Report describing the IoT router developed in SerIoT. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M18 while an updated version will follow in M26.

SerIoT multi-layer dataset access through WAPI interfaces

Technical report describing interoperability & API interfaces for supporting new experiments upon SerIoT architecture. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M18 while an updated version will follow in M33.

Automated penetration testing

Report on parameterizable models of the SerIoT IoT platform; Software tool for the automated generation of abstract test cases; methodology for deployment of the tool; implementation of adaptors that bridge the levels of abstraction between the model and the implementation; evaluation criteria for assessing the effectiveness and efficiency of the tool. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M12, an updated version will follow in M24, while the final on shall be expected by M36. In particular, the final version also contains an evaluation report on automated penetration testing applied to SerIoT use cases.

Description of the authentication and identification solutions for IoT

This deliverable will describe the new protocols for authentication/identification solutions that will be developed in the SerIoT project. Apart from the basic identification/authentication solutions (e.g., certificates, biometrics), the deliverable will investigate also the use of intrinsic features at the physical layer, in order to identify even IoT components with limited processing power. The deliverable will include a prototype implementation to be integrated into the SerIoT framework. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M18 while an updated version will follow in M30.

Description of the Policy Based Framework

This deliverable will describe the architecture of the policy-based framework (PBF) and it will deliver a prototype implementation based on the existing iCore Security Toolkit developed by JRC. This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M12 while an updated version will follow in M24.

SerIoT SDN network design for IoT

Technical Report describing the SerIoT SDN design approach & automated mechanisms.

Analysis of the signal in space

This deliverable will first present an overview of the privacy threats in IoT based on signal processing and statistical analysis of the traffic. Then it will describe the new countermeasures developed in the project (design and implementation). This deliverable aims to be periodically updated throughout the project's lifetime. In particular, the initial version of this deliverable is foreseen to be produced in M18 while an updated version will follow in M30.

Searching for OpenAIRE data...

Publications

Synchrosqueezing Transform Based Methodology for Radiometric Identification

Author(s): Gianmarco Baldini, Gary Steri, Raimondo Giuliani
Published in: 2018 41st International Conference on Telecommunications and Signal Processing (TSP), 2018, Page(s) 1-5
DOI: 10.1109/tsp.2018.8441378

Security for Internet of Things: The SerIoT Project

Author(s): Erol Gelenbe, Joanna Domanska, Tadeusz Czachorski, Anastasis Drosou, Dimitrios Tzovaras
Published in: 2018 International Symposium on Networks, Computers and Communications (ISNCC), 2018, Page(s) 1-5
DOI: 10.1109/isncc.2018.8531004

Cybersecurity Risk Analysis in Automated Vehicle Architecture

Author(s): L.Gonzalez, M.Vaca, R.Lattarulo, I.Calvo, J.Perez, A.Ruiz
Published in: 2018 Jornadas de Automática (Automation Days, 6-7 September 2018), Badajoz, Spain., 2018

European Cybersecurity Research and the SerIoT Project

Author(s): Joanna Domańska, Mateusz Nowak, Sawomir Nowak, Tadeusz Czachórski
Published in: Computer and Information Sciences - 32nd International Symposium, ISCIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 20-21, 2018, Proceedings, Issue 935, 2018, Page(s) 166-173
DOI: 10.1007/978-3-030-00840-6_19

Maniobra Cooperativa STOP & GO para Vehículos Automatizados Basada en Entorno Virtual y Real

Author(s): L.Gonzalez, M.Vaca, R.Lattarulo, I.Calvo, J.Perez, A.Ruiz
Published in: 2018 Jornadas de Automática (Automation Days, 6-7 September 2018), Badajoz, Spain., 2018

Measures to Address the Lack of Portability of the RF Fingerprints for Radiometric Identification

Author(s): Gianmarco Baldini, Raimondo Giuliani, Claudio Gentile, Gary Steri
Published in: 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2018, Page(s) 1-5
DOI: 10.1109/ntms.2018.8328703

New vulnerabilities in 4G and 5G cellular access network protocols - exposing device capabilities

Author(s): Altaf Shaik, Ravishankar Borgaonkar, Shinjo Park, Jean-Pierre Seifert
Published in: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks - WiSec '19, 2019, Page(s) 221-231
DOI: 10.1145/3317549.3319728

Cognitive Packet Networks for the Secure Internet of Things

Author(s): Mateusz Nowak, Slawomir Nowak, Joanna Domanska, Tadeusz Czachorski
Published in: 2019 Global IoT Summit (GIoTS), 2019, Page(s) 1-4
DOI: 10.1109/giots.2019.8766380

Cognitive Routing for Improvement of IoT Security

Author(s): Mateusz Nowak, Sławomir Nowak, Joanna Domanska
Published in: 2019 IEEE International Conference on Fog Computing, 2019

An Architectural Framework Proposal for IoT Driven Agriculture

Author(s): Godlove Suila Kuaban, Piotr Czekalski, Ernest L. Molua, Krzysztof Grochla
Published in: Computer Networks - 26th International Conference, CN 2019, Kamień Śląski, Poland, June 25–27, 2019, Proceedings, Issue 1039, 2019, Page(s) 18-33
DOI: 10.1007/978-3-030-21952-9_2

An assessment of the impact of wireless interferences on IoT emitter identification using Time Frequency representations and CNN

Author(s): Gianmarco Baldini, Raimondo Giuliani
Published in: 2019 Global IoT Summit (GIoTS), 2019, Page(s) 1-6
DOI: 10.1109/giots.2019.8766385

An assessment of the impact of IQ imbalances on the physical layer authentication of IoT wireless devices

Author(s): Gianmarco Baldini, Raimondo Giuliani, Claudio Gentile
Published in: 2019 Global IoT Summit (GIoTS), 2019, Page(s) 1-6
DOI: 10.1109/giots.2019.8766387

Zone Keys Trust Management in Vehicular Networks based on Blockchain

Author(s): Gianmarco Baldini, Jose L. Hernandez-Ramos, Gary Steri, Sara N. Matheu
Published in: 2019 Global IoT Summit (GIoTS), 2019, Page(s) 1-6
DOI: 10.1109/giots.2019.8766375

A Policy-based Framework in Fog enabled Internet of Things for Cooperative ITS

Author(s): Jose L. Hernandez-Ramos, Gianmarco Baldini, Ricardo Neisse, Mays Al-Naday, Martin J. Reed
Published in: 2019 Global IoT Summit (GIoTS), 2019, Page(s) 1-6
DOI: 10.1109/giots.2019.8766360

Runtime and Routing Security Policy Verification for Enhanced Quality of Service of IoT Networks

Author(s): Konstantinos Papachristou, Traianos Theodorou, Stavros Papadopoulos, Aikaterini Protogerou, Anastasios Drosou, Dimitrios Tzovaras
Published in: 2019 Global IoT Summit (GIoTS), 2019, Page(s) 1-6
DOI: 10.1109/giots.2019.8766404

Physical Layer Authentication and Identification of Wireless Devices Using the Synchrosqueezing Transform

Author(s): Gianmarco Baldini, Raimondo Giuliani, Gary Steri
Published in: Applied Sciences, Issue 8/11, 2018, Page(s) 2167, ISSN 2076-3417
DOI: 10.3390/app8112167

Architecture of security association establishment based on bootstrapping technologies for enabling secure IoT infrastructures

Author(s): Salvador Pérez, Dan Garcia-Carrillo, Rafael Marín-López, José L. Hernández-Ramos, Rafael Marín-Pérez, Antonio F. Skarmeta
Published in: Future Generation Computer Systems, Issue 95, 2019, Page(s) 570-585, ISSN 0167-739X
DOI: 10.1016/j.future.2019.01.038

Peer Prediction-Based Trustworthiness Evaluation and Trustworthy Service Rating in Social Networks

Author(s): Jun Du, Erol Gelenbe, Chunxiao Jiang, Haijun Zhang, Yong Ren, H. Vincent Poor
Published in: IEEE Transactions on Information Forensics and Security, Issue 14/6, 2019, Page(s) 1582-1594, ISSN 1556-6013
DOI: 10.1109/tifs.2018.2883000

Microphone Identification Using Convolutional Neural Networks

Author(s): Gianmarco Baldini, Irene Amerini, Claudio Gentile
Published in: IEEE Sensors Letters, Issue 3/7, 2019, Page(s) 1-4, ISSN 2475-1472
DOI: 10.1109/lsens.2019.2923590

Research and Innovation Action for the Security of the Internet of Things: The SerIoT Project

Author(s): Joanna Domanska, Erol Gelenbe, Tadek Czachorski, Anastasis Drosou, Dimitrios Tzovaras
Published in: Security in Computer and Information Sciences - First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers, Issue 821, 2018, Page(s) 101-118
DOI: 10.1007/978-3-319-95189-8_10

Towards a Mobile Malware Detection Framework with the Support of Machine Learning

Author(s): Dimitris Geneiatakis, Gianmarco Baldini, Igor Nai Fovino, Ioannis Vakalis
Published in: Security in Computer and Information Sciences - First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers, Issue 821, 2018, Page(s) 119-129
DOI: 10.1007/978-3-319-95189-8_11

Next Generation Internet of Things

Author(s): Ovidiu Vermesan, Joël Bacquet
Published in: Next Generation Internet of Things, Issue 1, 2018, Page(s) 1-352
DOI: 10.13052/rp-9788770220071

Security in Computer and Information Sciences - First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers

Author(s): E.Gelenbe, P.Campegiani, T.Czachórski, S.K.Katsikas, I.Komnios, L.Romano, D.Tzovaras
Published in: Communications in Computer and Information Science book series (CCIS, volume 821), Issue 821, 2018
DOI: 10.1007/978-3-319-95189-8