Hybrid Access Control Model for IoT Environments: Formalization and Verification Using Timed Automata

被引:0
|
作者
Mohammed Walid Krakallah [1 ]
Safia Nait-Bahloul [2 ]
机构
[1] University Abdelhamid Ibn Badis,Department of Mathematics and Computer Science, Faculty of Exact Sciences And Computer Science
[2] University Oran1 Ahmed Ben Bella,Litio Laboratory
关键词
Access control; IoT; Formal verification; E-UACML; Timed automata; CTL;
D O I
10.1007/s42979-025-03674-2
中图分类号
学科分类号
摘要
The Internet of Things (IoT) represents a technological revolution by enabling the interconnection of multiple devices and systems. With this expansion of connected objects, security issues, particularly in access control, become paramount. Due to their complexity and diversity, IoT environments require sophisticated, dynamic, and flexible access control models capable of addressing their specific constraints. This article formalizes and extends the E-UACML model (Emergency Unified Access Control Modelling Language) for IoT environments. Using formal verification techniques, we translate E-UACML into timed automata to validate its properties with the UPPAAL tool. Timed automata enable the integration of timing and synchronization, which are essential for verifying spatio-temporal constraints in IoT systems. Verification, carried out through Computation Tree Logic (CTL), ensures that access control policies meet rigorous security requirements, including spatio-temporal constraints. The results demonstrate the effectiveness of this approach in ensuring flexible and secure access control in IoT environments.
引用
收藏
相关论文
共 50 条
  • [1] Verification of Spatio-Temporal Role Based Access Control using Timed Automata
    Geepalla, Emsaieb
    Bordbar, Behzad
    Okano, Kozo
    2012 IEEE 3RD INTERNATIONAL CONFERENCE ON NETWORKED EMBEDDED SYSTEMS FOR EVERY APPLICATION (NESEA), 2012,
  • [2] Verification of RabbitMQ with Kerberos Using Timed Automata
    Li, Ran
    Yin, Jiaqi
    Zhu, Huibiao
    Phan Cong Vinh
    MOBILE NETWORKS & APPLICATIONS, 2022, 27 (05): : 2049 - 2067
  • [3] Verification of RabbitMQ with Kerberos Using Timed Automata
    Ran Li
    Jiaqi Yin
    Huibiao Zhu
    Phan Cong Vinh
    Mobile Networks and Applications, 2022, 27 : 2049 - 2067
  • [4] Verification of Printer Datapaths Using Timed Automata
    Igna, Georgeta
    Vaandrager, Frits
    LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION, AND VALIDATION, PT II, 2010, 6416 : 412 - 423
  • [5] VERIFICATION OF A FIELDBUS SCHEDULING PROTOCOL USING TIMED AUTOMATA
    Petalidis, Nicholaos
    COMPUTING AND INFORMATICS, 2009, 28 (05) : 655 - 672
  • [6] Deadline Verification for Web Services Using Timed Automata
    El Touati, Yamen
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2022, 12 (01) : 8013 - 8016
  • [7] Timed verification of the generic architecture of a memory circuit using parametric timed automata
    Chevallier, Remy
    Encrenaz-Tiphene, Emmanuelle
    Fribourg, Laurent
    Xu, Weiwen
    FORMAL METHODS IN SYSTEM DESIGN, 2009, 34 (01) : 59 - 81
  • [8] Pervasive-Based Access Control Model for IoT Environments
    El Bouanani, Salim
    El Kiram, My Ahmed
    Achbarou, Omar
    Outchakoucht, Aissam
    IEEE ACCESS, 2019, 7 : 54575 - 54585
  • [9] Formal verification of multitasking applications based on timed automata model
    Libor Waszniowski
    Zdeněk Hanzálek
    Real-Time Systems, 2008, 38 : 39 - 65
  • [10] Formal verification of multitasking applications based on timed automata model
    Waszniowski, Libor
    Hanzalek, Zdenek
    REAL-TIME SYSTEMS, 2008, 38 (01) : 39 - 65