Formal Verification of an Efficient Architecture to Enhance the Security in IoT

被引:0
|
作者
Elsayed, Eman K. [1 ]
Diab, L. S. [1 ]
Ibrahim, Asmaa A. [1 ]
机构
[1] Al Azhar Univ, Math & Comp Sci, Cairo, Egypt
关键词
Internet of things (IoT); IoT architecture; IoT security; formal modeling and verification; Event-B;
D O I
10.14569/IJACSA.2021.0120317
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Internet of Things (IoT) is one of the world's newest intelligent communication technologies. There are several kinds of novels about IoT architectures, but they still suffer from security and privacy challenges. Formal verification is a vital method for detecting potential weaknesses and vulnerabilities at an early stage. During this paper, a framework in the Event-B formal method will be used to design a formal description of the secure IoT architecture to cover the security properties of the IoT architecture. As well as using various Event-B properties like formal verification, functional checks, and model checkers to design different formal spoofing attacks for the IoT environment. Additionally, the Accuracy of the IoT architecture can be obtained by executing different Event-B runs like simulations, proof obligation, and invariant checking. By applied formal verification, functional checks and model checkers verified models of IoT-EAA architecture have automatically discharged 82.35% of proof obligations through different Event-B provers. Finally, this paper will focus on introducing a well-defined IoT security infrastructure to address and reduce the security challenges.
引用
收藏
页码:134 / 139
页数:6
相关论文
共 50 条
  • [31] Efficient Formal Verification for the Linux Kernel
    de Oliveira, Daniel Bristot
    Cucinotta, Tommaso
    de Oliveira, Romulo Silva
    SOFTWARE ENGINEERING AND FORMAL METHODS (SEFM 2019), 2019, 11724 : 315 - 332
  • [32] Verification driven formal architecture and microarchitecture modeling
    Mahajan, Yogesh
    Chan, Carven
    Bayazit, Ali
    Malik, Sharad
    Qin, Wei
    MEMOCODE'07: FIFTH ACM & IEEE INTERNATIONAL CONFERENCE ON FORMAL METHODS AND MODELS FOR CO-DESIGN, PROCEEDINGS, 2007, : 123 - +
  • [33] A Methodology for Automatic Formal Verification of Enterprise Architecture
    Babkin, Eduard
    Malyzhenkov, Pavel
    Ivanova, Marina
    Ponomarev, Nikita
    INTERNATIONAL JOURNAL OF INFORMATION SYSTEM MODELING AND DESIGN, 2019, 10 (01) : 1 - 19
  • [34] VerificationTalk: A Verification and Security Mechanism for IoT Applications
    Shieh, Min-Zheng
    Lin, Yi-Bing
    Hsu, Yin-Jui
    SENSORS, 2021, 21 (22)
  • [35] A Survey on Verification of Security and Safety in IoT Systems
    Abuserrieh, Lobna
    Alalfi, Manar H.
    IEEE ACCESS, 2024, 12 : 138627 - 138645
  • [36] Intelligent SDN to enhance security in IoT networks
    Ibrahim, Safi
    Youssef, Aya M.
    Shoman, Mahmoud
    Taha, Sanaa
    EGYPTIAN INFORMATICS JOURNAL, 2024, 28
  • [37] An Efficient Q-KPABE Framework to Enhance Cloud-Based IoT Security and Privacy
    Singamaneni, Kranthi Kumar
    Budati, Anil Kumar
    Bikku, Thulasi
    WIRELESS PERSONAL COMMUNICATIONS, 2024,
  • [38] A Security Assurance Framework Combining Formal Verification and Security Functional Testing
    Wang, Weiguang
    Zeng, Qingkai
    Mathur, Aditya P.
    2012 12TH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE (QSIC), 2012, : 136 - 139
  • [39] Constructing Security Cases Based on Formal Verification of Security Requirements in Alloy
    Zeroual, Marwa
    Hamid, Brahim
    Adedjouma, Morayo
    Jaskolka, Jason
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2023 WORKSHOPS, 2023, 14182 : 15 - 25
  • [40] Formal and efficient enforcement of security policies
    Langar, A
    Mejri, M
    FCS '05: Proceedings of the 2005 International Conference on Foundations of Computer Science, 2005, : 143 - 149