Formal UML-based Modeling and Analysis for Securing Location-based IoT Applications

被引:0
|
作者
Cardenas, Hector [1 ]
Zimmerman, Ryan [2 ]
Viesca, Antonio Rosales [1 ]
Al Lail, Mustafa [1 ]
Perez, Alfredo J. [3 ]
机构
[1] Texas A&M Int Univ, Laredo, TX 78041 USA
[2] Columbus State Univ, Columbus, GA USA
[3] Univ Nebraska Omaha, Omaha, NE USA
基金
美国国家科学基金会;
关键词
UML; Formal methods; Security; Internet of Things;
D O I
10.1109/MASS56207.2022.00109
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a process and a tool to apply formal methods in Internet of Things (IoT) applications using the Unified Modeling Language (UML). As there are no best practices to develop secured IoT systems, we have developed a plug-in tool that integrates a framework to validate UML software models and we present the design of a location-based IoT application as a use case for the validation tool.
引用
收藏
页码:722 / 723
页数:2
相关论文
共 50 条
  • [41] Automated UML-based Formal Model of E-Health System
    Khalid, Marrium
    Afzaal, Hamra
    Hassan, Shoaib
    Zafar, Nazir Ahmad
    Latif, Saba
    Rehman, Aniqa
    2019 13TH INTERNATIONAL CONFERENCE ON MATHEMATICS, ACTUARIAL SCIENCE, COMPUTER SCIENCE AND STATISTICS (MACS-13), 2019,
  • [42] Formal verification and validation of embedded systems: the UML-based MADES approach
    Luciano Baresi
    Gundula Blohm
    Dimitrios S. Kolovos
    Nicholas Matragkas
    Alfredo Motta
    Richard F. Paige
    Alek Radjenovic
    Matteo Rossi
    Software & Systems Modeling, 2015, 14 : 343 - 363
  • [43] UML4IoT-A UML-based approach to exploit IoT in cyber-physical manufacturing systems
    Thramboulidis, Kleanthis
    Christoulakis, Foivos
    COMPUTERS IN INDUSTRY, 2016, 82 : 259 - 272
  • [44] Formal verification and validation of embedded systems: the UML-based MADES approach
    Baresi, Luciano
    Blohm, Gundula
    Kolovos, Dimitrios S.
    Matragkas, Nicholas
    Motta, Alfredo
    Paige, Richard F.
    Radjenovic, Alek
    Rossi, Matteo
    SOFTWARE AND SYSTEMS MODELING, 2015, 14 (01): : 343 - 363
  • [45] Propositional logic constraint patterns and their use in UML-based conceptual modeling and analysis
    Davis, James P.
    Bonnell, Ronald D.
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2007, 19 (03) : 427 - 440
  • [46] Securing Cislunar Missions: A Location-Based Authentication Approach
    Benchoubane, Nesrine
    Donmez, Baris
    Ben Yahia, Olfa
    Kurt, Gunes Karabulut
    2024 SECURITY FOR SPACE SYSTEMS CONFERENCE, 3S 2024, 2024,
  • [47] A location-based naming mechanism for securing sensor networks
    Zhou, Yun
    Fang, Yuguang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2006, 6 (03): : 347 - 355
  • [48] FMEA for UML-based Software
    Wang Wentao
    Zhang Hong
    2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 3, PROCEEDINGS, 2009, : 456 - 460
  • [49] A Comparison of Six UML-Based Languages for Software Process Modeling
    Bendraou, Reda
    Jezequel, Jean-Marc
    Gervais, Marie-Pierre
    Blanc, Xavier
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2010, 36 (05) : 662 - 675
  • [50] Location-Based Software Modeling and Analysis: Tropos-Based Approach
    Ali, Raian
    Dalpiaz, Fabiano
    Giorgini, Paolo
    CONCEPTUAL MODELING - ER 2008, PROCEEDINGS, 2008, 5231 : 169 - 182