SciTransfer
SerIoT · Project

Smart Security Platform That Protects IoT Devices Across Entire Company Networks

digitalTestedTRL 6

Imagine every smart sensor, camera, and connected machine in your factory or building is like an unlocked door — anyone could walk in. SerIoT built a kind of intelligent security guard system that watches all those doors at once, spots suspicious activity across different layers of the network, and shuts down attacks before they cause damage. It uses smart routers, network traffic analysis, and even decoy devices (honeypots) to catch hackers. The team tested this across transport, manufacturing, food logistics, healthcare, and energy scenarios with 18 partners from 8 countries.

By the numbers
18
consortium partners
8
countries represented
10
industry partners in consortium
56%
industry participation ratio
67
total project deliverables
5
demo deliverables including testing environments and secure demonstrator
4
SMEs in the consortium
The business problem

What needed solving

Every company connecting machines, sensors, and devices to the internet faces a growing cybersecurity nightmare — IoT devices are notoriously easy to hack, and a single compromised sensor can give attackers access to an entire production network. Traditional IT security tools were not built for the scale and diversity of IoT, leaving factories, hospitals, and transport systems exposed to attacks that can cause physical damage, not just data breaches.

The solution

What was built

The project delivered a portable software-based IoT security platform with secure SDN routers, cross-layer anomaly detection, blockchain verification, and honeypot-based threat intelligence. Concrete outputs include a secure demonstrator with robotic control and PKI infrastructure, application-driven virtual testing environments, and cross-layer applications tested with partners like OASA and Deutsche Telekom across 5 industry domains.

Audience

Who needs this

Manufacturing companies running Industry 4.0 connected production linesTransport operators with IoT-based fleet management and surveillanceHospitals and home care providers using connected medical devicesEnergy utilities operating smart grid infrastructureFood logistics companies with IoT-enabled cold chain monitoring
Business applications

Who can put this to work

Manufacturing & Industry 4.0
mid-size
Target: mid-size manufacturers running connected production lines

If you are a manufacturer dealing with cybersecurity risks on your connected factory floor — this project developed a software-defined networking platform with secure routers and cross-layer anomaly detection that monitors IoT devices in real time. It was tested specifically for flexible manufacturing within Industry 4.0 scenarios. The system spots suspicious traffic patterns across your entire production network and triggers automated responses before an attack disrupts operations.

Transport & Logistics
enterprise
Target: transport operators and logistics companies using IoT tracking

If you are a transport or logistics company dealing with security vulnerabilities in your fleet tracking and surveillance systems — this project built a portable IoT security platform tested in intelligent transport use cases. The cross-layer applications were demonstrated with partners like OASA (a public transport operator), providing real-time anomaly detection across vehicle sensors, GPS trackers, and communication networks.

Healthcare
enterprise
Target: hospitals and home care providers using connected medical devices

If you are a healthcare provider worried about cyberattacks on connected medical devices in your hospital or home care network — this project developed and tested secure IoT infrastructure specifically for m-Health scenarios covering both hospital and home business cases. The platform includes a public key infrastructure and secure connectivity service demonstrated through a robotic control proof of concept.

Frequently asked

Quick answers

What would it cost to implement this IoT security platform?

The EU contribution amount is not available in the dataset, so specific development costs cannot be stated. As an open research project (RIA), the core software components may be available for adaptation. Deployment costs would depend on network size and the number of IoT devices to protect.

Can this scale to protect thousands of IoT devices across multiple sites?

The platform was designed for large-scale deployment and tested in pilots spanning 5 different domains: transport, manufacturing, food logistics, healthcare, and energy. The architecture uses Software Defined Networking with centralized control combined with distributed lightweight processing on individual devices, which is inherently scalable.

Who owns the intellectual property and can I license this technology?

The consortium of 18 partners across 8 countries jointly developed the technology under EU RIA funding. IP is typically shared among partners according to the grant agreement. Licensing inquiries should be directed to the coordinator at the Polish Academy of Sciences or individual technology partners.

How does this integrate with our existing IoT infrastructure?

SerIoT was designed as a portable software-based solution, not a hardware replacement. It layers on top of existing IoT platforms using software-defined networking and secure routers. The virtual testing environment deliverable suggests integration can be validated before live deployment.

What specific threats does this detect and prevent?

The platform uses cross-layer anomaly detection covering IoT platforms, devices, honeypots, SDN routers, and the operator's controller. It includes root cause analysis and mitigation capabilities, blockchain-based verification, and vulnerability assessment for attack prevention. The system was tested across 5 industry use cases.

Is this compliant with current cybersecurity regulations?

The project ran from 2018 to 2021 under the IoT-03-2017 EU topic on IoT security. While it predates the EU Cyber Resilience Act, the design-driven security approach and public key infrastructure components align with current regulatory directions. Compliance verification for specific regulations would need to be assessed.

When could we realistically deploy this?

The project closed in April 2021 with 67 deliverables completed, including working demonstrators and virtual testing environments. The technology reached proof-of-concept stage with tested pilots. Moving to commercial deployment would require engineering work to productize the research outputs.

Consortium

Who built it

The SerIoT consortium brings strong industry credibility with 10 out of 18 partners (56%) coming from the private sector, including 4 SMEs. The 8-country spread across Europe (AT, BE, CY, DE, EL, ES, PL, UK) ensures the solution was designed for diverse regulatory and infrastructure environments. With 6 research organizations and 2 universities providing the scientific backbone, the consortium balances academic rigor with commercial orientation. The coordinator is the Polish Academy of Sciences, a respected research institution, while industry partners like Deutsche Telekom (T-Sys.) and OASA (Greek public transport) provided real-world testing grounds. This mix suggests the technology was built with practical deployment in mind, not just academic publication.

How to reach the team

Coordinator is the Institute of Theoretical and Applied Informatics of the Polish Academy of Sciences (IITIS PAN). Contact can be found via the project website or CORDIS contact form.

Next steps

Talk to the team behind this work.

Want to explore how SerIoT's IoT security technology could protect your connected infrastructure? SciTransfer can arrange a direct introduction to the research team and help assess fit for your specific use case.