Formal Verification of an Efficient Architecture to Enhance the Security in IoT

被引:0
|
作者
Elsayed, Eman K. [1 ]
Diab, L. S. [1 ]
Ibrahim, Asmaa A. [1 ]
机构
[1] Al Azhar Univ, Math & Comp Sci, Cairo, Egypt
关键词
Internet of things (IoT); IoT architecture; IoT security; formal modeling and verification; Event-B;
D O I
10.14569/IJACSA.2021.0120317
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Internet of Things (IoT) is one of the world's newest intelligent communication technologies. There are several kinds of novels about IoT architectures, but they still suffer from security and privacy challenges. Formal verification is a vital method for detecting potential weaknesses and vulnerabilities at an early stage. During this paper, a framework in the Event-B formal method will be used to design a formal description of the secure IoT architecture to cover the security properties of the IoT architecture. As well as using various Event-B properties like formal verification, functional checks, and model checkers to design different formal spoofing attacks for the IoT environment. Additionally, the Accuracy of the IoT architecture can be obtained by executing different Event-B runs like simulations, proof obligation, and invariant checking. By applied formal verification, functional checks and model checkers verified models of IoT-EAA architecture have automatically discharged 82.35% of proof obligations through different Event-B provers. Finally, this paper will focus on introducing a well-defined IoT security infrastructure to address and reduce the security challenges.
引用
收藏
页码:134 / 139
页数:6
相关论文
共 50 条
  • [21] Holistic Security Architecture for IoT Technologies
    Mbanaso, U. M.
    Chukwudebe, G. A.
    Adebisi, B.
    2017 13TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTER AND COMPUTATION (ICECCO), 2017,
  • [22] Formal verification logic for hybrid security protocols
    Newe, T
    Coffey, T
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2003, 18 (01): : 17 - 25
  • [23] Enhancing the security of the IoT LoraWAN architecture
    Naoui, Sarra
    Elhdhili, Mohamed Elhoucine
    Saidane, Leila Azouz
    5TH IFIP INTERNATIONAL CONFERENCE ON PERFORMANCE EVALUATION AND MODELING IN WIRED AND WIRELESS NETWORKS PEMWN 16, 2016,
  • [24] Security Analysis of an IoT Architecture for Healthcare
    Teresa Villalba, M.
    de Buenaga, Manuel
    Gachet, Diego
    Aparicio, Fernando
    INTERNET OF THINGS: IOT INFRASTRUCTURES, PT I, 2016, 169 : 454 - 460
  • [25] Formal Verification of Security Protocols Using Spin
    Chen, Shengbo
    Fu, Hao
    Miao, Huaikou
    2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2016, : 637 - 642
  • [26] Formal verification of security protocol implementations: a survey
    Avalle, Matteo
    Pironti, Alfredo
    Sisto, Riccardo
    FORMAL ASPECTS OF COMPUTING, 2014, 26 (01) : 99 - 123
  • [27] New Security Architecture for IoT Network
    Flauzac, Olivier
    Gonzalez, Carlos
    Nolot, Florent
    6TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2015), THE 5TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2015), 2015, 52 : 1028 - 1033
  • [28] Architecture for security monitoring in IoT environments
    Stergiou, Christos
    Psannis, Kostas E.
    Plageras, Andreas P.
    Kokkonis, Giorgos
    Ishibashi, Yutaka
    2017 IEEE 26TH INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2017, : 1382 - 1385
  • [29] Efficient debugging in a formal verification environment
    Fady Copty
    Amitai Irron
    Osnat Weissberg
    Nathan Kropp
    Gila Kamhi
    International Journal on Software Tools for Technology Transfer, 2003, 4 (3) : 335 - 348
  • [30] Efficient formal verification of hierarchical descriptions
    Alur, R
    FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE, 1998, 1530 : 269 - 269