If you are a manufacturer dealing with cybersecurity risks on your connected factory floor — this project developed a software-defined networking platform with secure routers and cross-layer anomaly detection that monitors IoT devices in real time. It was tested specifically for flexible manufacturing within Industry 4.0 scenarios. The system spots suspicious traffic patterns across your entire production network and triggers automated responses before an attack disrupts operations.
Smart Security Platform That Protects IoT Devices Across Entire Company Networks
Imagine every smart sensor, camera, and connected machine in your factory or building is like an unlocked door — anyone could walk in. SerIoT built a kind of intelligent security guard system that watches all those doors at once, spots suspicious activity across different layers of the network, and shuts down attacks before they cause damage. It uses smart routers, network traffic analysis, and even decoy devices (honeypots) to catch hackers. The team tested this across transport, manufacturing, food logistics, healthcare, and energy scenarios with 18 partners from 8 countries.
What needed solving
Every company connecting machines, sensors, and devices to the internet faces a growing cybersecurity nightmare — IoT devices are notoriously easy to hack, and a single compromised sensor can give attackers access to an entire production network. Traditional IT security tools were not built for the scale and diversity of IoT, leaving factories, hospitals, and transport systems exposed to attacks that can cause physical damage, not just data breaches.
What was built
The project delivered a portable software-based IoT security platform with secure SDN routers, cross-layer anomaly detection, blockchain verification, and honeypot-based threat intelligence. Concrete outputs include a secure demonstrator with robotic control and PKI infrastructure, application-driven virtual testing environments, and cross-layer applications tested with partners like OASA and Deutsche Telekom across 5 industry domains.
Who needs this
Who can put this to work
If you are a transport or logistics company dealing with security vulnerabilities in your fleet tracking and surveillance systems — this project built a portable IoT security platform tested in intelligent transport use cases. The cross-layer applications were demonstrated with partners like OASA (a public transport operator), providing real-time anomaly detection across vehicle sensors, GPS trackers, and communication networks.
If you are a healthcare provider worried about cyberattacks on connected medical devices in your hospital or home care network — this project developed and tested secure IoT infrastructure specifically for m-Health scenarios covering both hospital and home business cases. The platform includes a public key infrastructure and secure connectivity service demonstrated through a robotic control proof of concept.
Quick answers
What would it cost to implement this IoT security platform?
The EU contribution amount is not available in the dataset, so specific development costs cannot be stated. As an open research project (RIA), the core software components may be available for adaptation. Deployment costs would depend on network size and the number of IoT devices to protect.
Can this scale to protect thousands of IoT devices across multiple sites?
The platform was designed for large-scale deployment and tested in pilots spanning 5 different domains: transport, manufacturing, food logistics, healthcare, and energy. The architecture uses Software Defined Networking with centralized control combined with distributed lightweight processing on individual devices, which is inherently scalable.
Who owns the intellectual property and can I license this technology?
The consortium of 18 partners across 8 countries jointly developed the technology under EU RIA funding. IP is typically shared among partners according to the grant agreement. Licensing inquiries should be directed to the coordinator at the Polish Academy of Sciences or individual technology partners.
How does this integrate with our existing IoT infrastructure?
SerIoT was designed as a portable software-based solution, not a hardware replacement. It layers on top of existing IoT platforms using software-defined networking and secure routers. The virtual testing environment deliverable suggests integration can be validated before live deployment.
What specific threats does this detect and prevent?
The platform uses cross-layer anomaly detection covering IoT platforms, devices, honeypots, SDN routers, and the operator's controller. It includes root cause analysis and mitigation capabilities, blockchain-based verification, and vulnerability assessment for attack prevention. The system was tested across 5 industry use cases.
Is this compliant with current cybersecurity regulations?
The project ran from 2018 to 2021 under the IoT-03-2017 EU topic on IoT security. While it predates the EU Cyber Resilience Act, the design-driven security approach and public key infrastructure components align with current regulatory directions. Compliance verification for specific regulations would need to be assessed.
When could we realistically deploy this?
The project closed in April 2021 with 67 deliverables completed, including working demonstrators and virtual testing environments. The technology reached proof-of-concept stage with tested pilots. Moving to commercial deployment would require engineering work to productize the research outputs.
Who built it
The SerIoT consortium brings strong industry credibility with 10 out of 18 partners (56%) coming from the private sector, including 4 SMEs. The 8-country spread across Europe (AT, BE, CY, DE, EL, ES, PL, UK) ensures the solution was designed for diverse regulatory and infrastructure environments. With 6 research organizations and 2 universities providing the scientific backbone, the consortium balances academic rigor with commercial orientation. The coordinator is the Polish Academy of Sciences, a respected research institution, while industry partners like Deutsche Telekom (T-Sys.) and OASA (Greek public transport) provided real-world testing grounds. This mix suggests the technology was built with practical deployment in mind, not just academic publication.
- INSTYTUT INFORMATYKI TEORETYCZNEJ ISTOSOWANEJ POLSKIEJ AKADEMII NAUKCoordinator · PL
- HIT HYPERTECH INNOVATIONS LTDparticipant · CY
- ETHNIKO KENTRO EREVNAS KAI TECHNOLOGIKIS ANAPTYXISparticipant · EL
- FUNDACION TECNALIA RESEARCH & INNOVATIONparticipant · ES
- AUSTRIATECH - GESELLSCHAFT DES BUNDES FUR TECHNOLOGIEPOLITISCHE MASSNAHMEN GMBHparticipant · AT
- TECHNISCHE UNIVERSITAT BERLINparticipant · DE
- UNIVERSITY OF ESSEXparticipant · UK
- ORGANISMOS ASTIKON SYGKOINONION ATHINON AEparticipant · EL
- ATOS SPAIN SAparticipant · ES
- T-SYSTEMS INTERNATIONAL GMBHthirdparty · DE
- ATOS IT SOLUTIONS AND SERVICES IBERIA SLthirdparty · ES
- EREVNITIKO PANEPISTIMIAKO INSTITOUTO SYSTIMATON EPIKOINONION KAI YPOLOGISTONparticipant · EL
- DEUTSCHE TELEKOM AGparticipant · DE
- DEUTSCHE TELEKOM SECURITY GMBHthirdparty · DE
- LIBELIUM LAB SLparticipant · ES
- JRC -JOINT RESEARCH CENTRE- EUROPEAN COMMISSIONparticipant · BE
Coordinator is the Institute of Theoretical and Applied Informatics of the Polish Academy of Sciences (IITIS PAN). Contact can be found via the project website or CORDIS contact form.
Talk to the team behind this work.
Want to explore how SerIoT's IoT security technology could protect your connected infrastructure? SciTransfer can arrange a direct introduction to the research team and help assess fit for your specific use case.