Formal Verification of an Efficient Architecture to Enhance the Security in IoT

被引:0
|
作者
Elsayed, Eman K. [1 ]
Diab, L. S. [1 ]
Ibrahim, Asmaa A. [1 ]
机构
[1] Al Azhar Univ, Math & Comp Sci, Cairo, Egypt
关键词
Internet of things (IoT); IoT architecture; IoT security; formal modeling and verification; Event-B;
D O I
10.14569/IJACSA.2021.0120317
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Internet of Things (IoT) is one of the world's newest intelligent communication technologies. There are several kinds of novels about IoT architectures, but they still suffer from security and privacy challenges. Formal verification is a vital method for detecting potential weaknesses and vulnerabilities at an early stage. During this paper, a framework in the Event-B formal method will be used to design a formal description of the secure IoT architecture to cover the security properties of the IoT architecture. As well as using various Event-B properties like formal verification, functional checks, and model checkers to design different formal spoofing attacks for the IoT environment. Additionally, the Accuracy of the IoT architecture can be obtained by executing different Event-B runs like simulations, proof obligation, and invariant checking. By applied formal verification, functional checks and model checkers verified models of IoT-EAA architecture have automatically discharged 82.35% of proof obligations through different Event-B provers. Finally, this paper will focus on introducing a well-defined IoT security infrastructure to address and reduce the security challenges.
引用
收藏
页码:134 / 139
页数:6
相关论文
共 50 条
  • [1] ArtiFact: Architecture and CAD Flow for Efficient Formal Verification of SoC Security Policies
    Nath, Atul Prasad Deb
    Bhunia, Swarup
    Ray, Sandip
    2018 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2018, : 411 - 416
  • [2] Formal verification for security and attacks in IoT physical layer
    Toman Z.H.
    Hamel L.
    Toman S.H.
    Graiet M.
    Valadares D.C.G.
    Journal of Reliable Intelligent Environments, 2024, 10 (1) : 73 - 91
  • [3] Verifying cache architecture vulnerabilities using a formal security verification flow
    Ghasempouri, Tara
    Raik, Jaan
    Paul, Kolin
    Reinbrecht, Cezar
    Hamdioui, Said
    Mottaqiallah
    MICROELECTRONICS RELIABILITY, 2021, 119
  • [4] Formal Verification of a Trusted Execution Environment-Based Architecture for IoT Applications
    Gomes Valadares, Dalton Cezane
    de Carvalho Cesar Sobrinho, Alvaro Alvares
    Perkusich, Angelo
    Gorgonio, Kyller Costa
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (23) : 17199 - 17210
  • [5] Towards a Formal IoT Security Model
    Martin, Tania
    Geneiatakis, Dimitrios
    Kounelis, Ioannis
    Kerckhof, Stephanie
    Fovino, Igor Nai
    SYMMETRY-BASEL, 2020, 12 (08): : 1 - 16
  • [6] Formal verification of security properties of the Lightweight Authentication and Key Exchange Protocol for Federated IoT devices
    Jarosz, Michal
    Wrona, Konrad
    Zielinski, Zbigniew
    PROCEEDINGS OF THE 2022 17TH CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENCE SYSTEMS (FEDCSIS), 2022, : 617 - 625
  • [7] Architecture Design and Security Evaluation of Secure Optical Transport Network Using Formal Verification
    Maeda, Shion
    Nakabayashi, Misato
    Okuda, Tetsuya
    2022 IEEE 46TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2022), 2022, : 1810 - 1815
  • [8] Formal Specification and Verification of Security Guidelines
    Zhioua, Zeineb
    Roudier, Yves
    Ameur, Rabea Boulifa
    2017 IEEE 22ND PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2017), 2017, : 267 - 273
  • [9] Formal Verification and Security Analysis of AMQP
    Liu, Huiying
    Dong, Wenting
    Zhu, Huibiao
    Su, Ziqing
    2024 IEEE 48TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC 2024, 2024, : 2177 - 2182
  • [10] Formal automatic verification of security protocols
    Xiao, Meihua
    Xue, Jinyun
    2006 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, 2006, : 566 - +