{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,22]],"date-time":"2024-07-22T06:35:37Z","timestamp":1721630137006},"reference-count":48,"publisher":"MDPI AG","issue":"20","license":[{"start":{"date-parts":[[2021,10,18]],"date-time":"2021-10-18T00:00:00Z","timestamp":1634515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["779899"],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"Today\u2019s IoT deployments are highly complex, heterogeneous and constantly changing. This poses severe security challenges such as limited end-to-end security support, lack of cross-platform cross-vertical security interoperability as well as the lack of security services that can be readily applied by security practitioners and third party developers. Overall, these require scalable, decentralized and intelligent IoT security mechanisms and services which are addressed by the SecureIoT project. This paper presents the definition, implementation and validation of a SecureIoT-enabled socially assisted robots (SAR) usage scenario. The aim of the SAR scenario is to integrate and validate the SecureIoT services in the scope of personalized healthcare and ambient assistive living (AAL) scenarios, involving the integration of two AAL platforms, namely QTrobot (QT) and CloudCare2U (CC2U). This includes risk assessment of communications security, predictive analysis of security risks, implementing access control policies to enhance the security of solution, and auditing of the solution against security, safety and privacy guidelines and regulations. Future perspectives include the extension of this security paradigm by securing the integration of healthcare platforms with IoT solutions, such as Healthentia with QTRobot, by means of a system product assurance process for cyber-security in healthcare applications, through the PANACEA toolkit.<\/jats:p>","DOI":"10.3390\/s21206912","type":"journal-article","created":{"date-parts":[[2021,10,21]],"date-time":"2021-10-21T01:31:26Z","timestamp":1634779886000},"page":"6912","source":"Crossref","is-referenced-by-count":9,"title":["Enabling Security Services in Socially Assistive Robot Scenarios for Healthcare Applications"],"prefix":"10.3390","volume":"21","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-1970-1117","authenticated-orcid":false,"given":"Alexandru","family":"Vulpe","sequence":"first","affiliation":[{"name":"Telecommunications Department, University Politehnica of Bucharest, 061071 Bucharest, Romania"},{"name":"Innovation Sprint Sprl, 1200 Brussels, Belgium"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0060-3306","authenticated-orcid":false,"given":"R\u0103zvan","family":"Cr\u0103ciunescu","sequence":"additional","affiliation":[{"name":"Telecommunications Department, University Politehnica of Bucharest, 061071 Bucharest, Romania"},{"name":"Innovation Sprint Sprl, 1200 Brussels, Belgium"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6096-5793","authenticated-orcid":false,"given":"Ana-Maria","family":"Dr\u0103gulinescu","sequence":"additional","affiliation":[{"name":"Telecommunications Department, University Politehnica of Bucharest, 061071 Bucharest, Romania"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8841-6558","authenticated-orcid":false,"given":"Sofoklis","family":"Kyriazakos","sequence":"additional","affiliation":[{"name":"Innovation Sprint Sprl, 1200 Brussels, Belgium"},{"name":"BTECH, Aarhus University, 7400 Herning, Denmark"}]},{"given":"Ali","family":"Paikan","sequence":"additional","affiliation":[{"name":"LuxAI S.A., Luxembourg 1724, Luxembourg"}]},{"given":"Pouyan","family":"Ziafati","sequence":"additional","affiliation":[{"name":"LuxAI S.A., Luxembourg 1724, Luxembourg"}]}],"member":"1968","published-online":{"date-parts":[[2021,10,18]]},"reference":[{"key":"ref_1","unstructured":"(2021, March 22). Ring Video Doorbell Pro Under the Scope\u2014Bitdefender Labs. Available online: https:\/\/labs.bitdefender.com\/2019\/11\/ring-video-doorbell-pro-under-the-scope\/."},{"key":"ref_2","unstructured":"(2021, March 28). Blink XT2 Sync Module Multiple Vulnerabilities\u2014Research Advisory|Tenable. Available online: https:\/\/www.tenable.com\/security\/research\/tra-2019-51."},{"key":"ref_3","unstructured":"(2021, March 25). Faxploit: New Check Point Research Reveals How Criminals Can Target Company and Private Fax Machines to Take Over Networks and Spread Malware|Check Point Software. Available online: https:\/\/www.checkpoint.com\/press\/2018\/faxploit-new-check-point-research-reveals-criminals-can-target-company-private-fax-machines-take-networks-spread-malware\/."},{"key":"ref_4","unstructured":"Maiti, A., and Jadliwala, M. Light Ears: Information Leakage via Smart Lights. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies."},{"key":"ref_5","unstructured":"Hilta, S., Kropotov, V., Merc\u00eas, F., Rosario, M., and Sancho, D. (2021, March 28). The Internet of Things in the Cybercrime Underground. Available online: https:\/\/documents.trendmicro.com\/assets\/white_papers\/wp-the-internet-of-things-in-the-cybercrime-underground.pdf."},{"key":"ref_6","unstructured":"(2021, March 27). Justice Department Announces Actions to Disrupt Advanced Persistent Threat 28 Botnet, Available online: https:\/\/www.justice.gov\/opa\/pr\/justice-department-announces-actions-disrupt-advanced-persistent-threat-28-botnet-infected."},{"key":"ref_7","unstructured":"(2021, March 29). Why the DDoS Attack Happened and What Can Be Done to Prevent More Episodes. Available online: https:\/\/theinternetofallthings.com\/why-the-ddos-attack-happened-10262016\/."},{"key":"ref_8","unstructured":"(2021, March 30). Pacemaker Controllers still Vulnerable 18 Months after Flaws Reported. Available online: https:\/\/nakedsecurity.sophos.com\/2018\/08\/14\/pacemaker-controllers-still-vulnerable-18-months-after-flaws-reported\/."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"MacDermott, A., Kendrick, P., Idowu, I., Ashall, M., and Shi, Q. (2019, January 17\u201321). Securing Things in the Healthcare Internet of Things. Proceedings of the 2019 Global IoT Summit (GIoTS), Aarhus, Denmark.","DOI":"10.1109\/GIOTS.2019.8766383"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Kunnappilly, A., Marinescu, R., and Seceleanu, C. (2019). A Model-Checking-Based Framework for Analyzing Ambient Assisted Living Solutions. Sensors, 19.","DOI":"10.3390\/s19225057"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Brezulianu, A., Geman, O., Zbancioc, M.D., Hagan, M., Aghion, C., Hemanth, D.J., and Son, L.H. (2019). IoT Based Heart Activity Monitoring Using Inductive Sensors. Sensors, 19.","DOI":"10.3390\/s19153284"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"75822","DOI":"10.1109\/ACCESS.2020.2989143","article-title":"A Joint Deep Learning and Internet of Medical Things Driven Framework for Elderly Patients","volume":"8","author":"Zhang","year":"2020","journal-title":"IEEE Access"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Bigini, G., Freschi, V., and Lattanzi, E. (2020). A Review on Blockchain for the Internet of Medical Things: Definitions, Challenges, Applications, and Vision. Future Internet, 12.","DOI":"10.3390\/fi12120208"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Dr\u0103gulinescu, A.M.C., Manea, A.F., Fratu, O., and Dr\u0103gulinescu, A. (2020). LoRa-Based Medical IoT System Architecture and Testbed. Wirel. Pers. Commun.","DOI":"10.1007\/s11277-020-07235-z"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"101079","DOI":"10.1109\/ACCESS.2020.2997831","article-title":"Edge-Cloud Computing and Artificial Intelligence in Internet of Medical Things: Architecture, Technology and Application","volume":"8","author":"Sun","year":"2020","journal-title":"IEEE Access"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Srilakshmi, A., Mohanapriya, P., Harini, D., and Geetha, K. (2019, January 21\u201322). IoT based Smart Health Care System to Prevent Security Attacks in SDN. Proceedings of the 2019 Fifth International Conference on Electrical Energy Systems (ICEES), Chennai, India.","DOI":"10.1109\/ICEES.2019.8719236"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1567","DOI":"10.1016\/j.jiph.2020.06.027","article-title":"Secure and energy-efficient framework using Internet of Medical Things for e-healthcare","volume":"13","author":"Saba","year":"2020","journal-title":"J. Infect. Public Health"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Butpheng, C., Yeh, K.H., and Xiong, H. (2020). Security and Privacy in IoT-Cloud-Based e-Health Systems\u2014A Comprehensive Review. Symmetry, 12.","DOI":"10.3390\/sym12071191"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Pal, S., Hitchens, M., Rabehaja, T., and Mukhopadhyay, S. (2020). Security Requirements for the Internet of Things: A Systematic Approach. Sensors, 20.","DOI":"10.3390\/s20205897"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1080\/00051144.2019.1660036","article-title":"Seamless connectivity architecture and methods for IoT and wearable devices","volume":"61","author":"Celic","year":"2020","journal-title":"Automatika"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Bendavid, Y., Bagheri, N., Safkhani, M., and Rostampour, S. (2018). IoT Device Security: Challenging \u201cA Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function\u201d. Sensors, 18.","DOI":"10.3390\/s18124444"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Aman, M.N., Chua, K.C., and Sikdar, B. (2017, January 7\u201310). Physically secure mutual authentication for IoT. Proceedings of the 2017 IEEE Conference on Dependable and Secure Computing, Taipei, Taiwan.","DOI":"10.1109\/DESEC.2017.8073853"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Liu, X., Zhao, M., Li, S., Zhang, F., and Trappe, W. (2017). A Security Framework for the Internet of Things in the Future Internet Architecture. Future Internet, 9.","DOI":"10.3390\/fi9030027"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Agarwal, S., Oser, P., and Lueders, S. (2019). Detecting IoT Devices and How They Put Large Heterogeneous Networks at Security Risk. Sensors, 19.","DOI":"10.20944\/preprints201908.0295.v1"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Zaky, A., Elmitwalli, E., Hemeda, M., Ismail, Y., and Salah, K. (2019, January 29\u201330). Ultra Low-Power Encryption\/Decryption Core for Lightweight IoT Applications. Proceedings of the 2019 15th International Computer Engineering Conference (ICENCO), Cairo, Egypt.","DOI":"10.1109\/ICENCO48310.2019.9027471"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Abu-Tair, M., Djahel, S., Perry, P., Scotney, B., Zia, U., Carracedo, J.M., and Sajjad, A. (2020). Towards Secure and Privacy-Preserving IoT Enabled Smart Home: Architecture and Experimental Study. Sensors, 20.","DOI":"10.3390\/s20216131"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Ramalingam, S., Gan, H., Epiphaniou, G., and Mistretta, E. (2020). A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT Deployments. Sensors, 20.","DOI":"10.3390\/s20185252"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1038\/s41928-020-0372-5","article-title":"Physical unclonable functions","volume":"3","author":"Gao","year":"2020","journal-title":"Nat. Electron."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.dcan.2019.08.006","article-title":"A survey of edge computing-based designs for IoT security","volume":"6","author":"Sha","year":"2020","journal-title":"Digit. Commun. Netw."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1145\/3351882","article-title":"A User-Centric Security Solution for Internet of Things and Edge Convergence","volume":"4","author":"Puthal","year":"2020","journal-title":"ACM Trans. Cyber-Phys. Syst."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/MNET.2018.1700284","article-title":"Reconfigurable security: Edge-computing-based framework for IoT","volume":"32","author":"Hsu","year":"2018","journal-title":"IEEE Netw."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Satamraju, K.P., and Malarkodi, B. (2019, January 17\u201320). Design and Evaluation of a Lightweight Security Framework for IoT Applications. Proceedings of the TENCON 2019\u20142019 IEEE Region 10 Conference (TENCON), Kochi, India.","DOI":"10.1109\/TENCON.2019.8929306"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Maskeli\u016bnas, R., Dama\u0161evi\u010dius, R., and Segal, S. (2019). A Review of Internet of Things Technologies for Ambient Assisted Living Environments. Future Internet, 11.","DOI":"10.3390\/fi11120259"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Butun, I., Sari, A., and \u00d6sterberg, P. (2020). Hardware Security of Fog End-Devices for the Internet of Things. Sensors, 20.","DOI":"10.3390\/s20205729"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Akhbarifar, S., Javadi, H.H.S., Rahmani, A.M., and Hosseinzadeh, M. (2020). A secure remote health monitoring model for early disease diagnosis in cloud-based IoT environment. Pers. Ubiquitous Comput.","DOI":"10.1007\/s00779-020-01475-3"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1016\/j.procs.2015.04.245","article-title":"Understanding DDoS Attack & its Effect in Cloud Environment","volume":"49","author":"Deshmukh","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Soliman, A.K., Salama, C., and Mohamed, H.K. (2018, January 18\u201319). Detecting DNS Reflection Amplification DDoS Attack Originating from the Cloud. Proceedings of the 2018 13th International Conference on Computer Engineering and Systems (ICCES), Cairo, Egypt.","DOI":"10.1109\/ICCES.2018.8639414"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"155014771774146","DOI":"10.1177\/1550147717741463","article-title":"A survey of distributed denial-of-service attack, prevention, and mitigation techniques","volume":"13","author":"Mahjabin","year":"2017","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"221","DOI":"10.13052\/jsn2445-9739.2017.011","article-title":"A Secure Service-Specific OverlayComposition Model for Cloud Networks","volume":"2017","author":"Ridhawi","year":"2017","journal-title":"Softw. Netw."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Nebbione, G., and Calzarossa, M.C. (2020). Security of IoT Application Layer Protocols: Challenges and Findings. Future Internet, 12.","DOI":"10.3390\/fi12030055"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Iyer, S., Bansod, G.V., Naidu, P., and Garg, S. (2018, January 14\u201315). Implementation and Evaluation of Lightweight Ciphers in MQTT Environment. Proceedings of the 2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), Msyuru, India.","DOI":"10.1109\/ICEECCOT43722.2018.9001599"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1016\/j.jamda.2010.10.002","article-title":"Socially Assistive Robots in Elderly Care: A Systematic Review into Effects and Effectiveness","volume":"13","author":"Bemelmans","year":"2012","journal-title":"J. Am. Med Dir. Assoc."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"103924","DOI":"10.1016\/j.compedu.2020.103924","article-title":"A systematic review of the literature regarding socially assistive robots in pre-tertiary education","volume":"155","author":"Papadopoulos","year":"2020","journal-title":"Comput. Educ."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"eabc9014","DOI":"10.1126\/scirobotics.abc9014","article-title":"The potential of socially assistive robots during infectious disease outbreaks","volume":"5","author":"Scassellati","year":"2020","journal-title":"Sci. Robot."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Vulpe, A., Paikan, A., Craciunescu, R., Ziafati, P., Kyriazakos, S., Hemmer, A., and Badonnel, R. (2019, January 24\u201327). IoT Security Approaches in Social Robots for Ambient Assisted Living Scenarios. Proceedings of the 2019 22nd International Symposium on Wireless Personal Multimedia Communications (WPMC), Lisbon, Portugal.","DOI":"10.1109\/WPMC48795.2019.9096127"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"1092","DOI":"10.1109\/TNSM.2020.3038172","article-title":"Comparative Assessment of Process Mining for Supporting IoT Predictive Security","volume":"18","author":"Hemmer","year":"2021","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_47","unstructured":"(2021, September 29). Healthentia Platform. Available online: http:\/\/www.healthentia.com\/."},{"key":"ref_48","unstructured":"(2021, September 27). PANACEA H2020 Project. Available online: http:\/\/www.panacearesearch.eu\/."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/20\/6912\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T11:22:41Z","timestamp":1721474561000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/20\/6912"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,18]]},"references-count":48,"journal-issue":{"issue":"20","published-online":{"date-parts":[[2021,10]]}},"alternative-id":["s21206912"],"URL":"https:\/\/doi.org\/10.3390\/s21206912","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,18]]}}}