Formal Verification of an Efficient Architecture to Enhance the Security in IoT

被引:0
|
作者
Elsayed, Eman K. [1 ]
Diab, L. S. [1 ]
Ibrahim, Asmaa A. [1 ]
机构
[1] Al Azhar Univ, Math & Comp Sci, Cairo, Egypt
关键词
Internet of things (IoT); IoT architecture; IoT security; formal modeling and verification; Event-B;
D O I
10.14569/IJACSA.2021.0120317
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Internet of Things (IoT) is one of the world's newest intelligent communication technologies. There are several kinds of novels about IoT architectures, but they still suffer from security and privacy challenges. Formal verification is a vital method for detecting potential weaknesses and vulnerabilities at an early stage. During this paper, a framework in the Event-B formal method will be used to design a formal description of the secure IoT architecture to cover the security properties of the IoT architecture. As well as using various Event-B properties like formal verification, functional checks, and model checkers to design different formal spoofing attacks for the IoT environment. Additionally, the Accuracy of the IoT architecture can be obtained by executing different Event-B runs like simulations, proof obligation, and invariant checking. By applied formal verification, functional checks and model checkers verified models of IoT-EAA architecture have automatically discharged 82.35% of proof obligations through different Event-B provers. Finally, this paper will focus on introducing a well-defined IoT security infrastructure to address and reduce the security challenges.
引用
收藏
页码:134 / 139
页数:6
相关论文
共 50 条
  • [41] Formal Specification of Software Architecture Security Tactics
    Wyeth, Andrew
    Zhang, Cui
    22ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING & KNOWLEDGE ENGINEERING (SEKE 2010), 2010, : 172 - 175
  • [42] IoT based Smart home : Security Aspects and security architecture
    Ray, Abhay Kumar
    Bagwari, Ashish
    2020 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2020), 2020, : 218 - 222
  • [43] Fog Computing Over IoT: A Secure Deployment and Formal Verification
    Zahra, Samman
    Alam, Masoom
    Javaid, Qaisar
    Wahid, Abdul
    Javaid, Nadeem
    Malik, Saif Ur Rehman
    Khans, Muhammad Khurram
    IEEE ACCESS, 2017, 5 : 27132 - 27144
  • [44] Formal modelling and verification of scalable service composition in IoT environment
    Toman, Sarah Hussein
    Hamel, Lazhar
    Toman, Zinah Hussein
    Graiet, Mohamed
    Ouchani, Samir
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2023, 17 (03) : 213 - 231
  • [45] Formal modelling and verification of scalable service composition in IoT environment
    Sarah Hussein Toman
    Lazhar Hamel
    Zinah Hussein Toman
    Mohamed Graiet
    Samir Ouchani
    Service Oriented Computing and Applications, 2023, 17 : 213 - 231
  • [46] Ensuring the Functional Correctness of IoT through Formal Modeling and Verification
    Ouchani, Samir
    MODEL AND DATA ENGINEERING, MEDI 2018, 2018, 11163 : 401 - 417
  • [47] Formal Modeling and Verification of Blockchain Consensus Protocol for IoT Systems
    Baouya, Abdelhakim
    Chehida, Salim
    Bensalem, Saddek
    Bozga, Marius
    KNOWLEDGE INNOVATION THROUGH INTELLIGENT SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES (SOMET_20), 2020, 327 : 330 - 342
  • [48] Formal verification of security properties in trust management policy
    Niu, Jianwei
    Reith, Mark
    Winsborough, William
    JOURNAL OF COMPUTER SECURITY, 2014, 22 (01) : 69 - 153
  • [49] Design of Software Security Verification with Formal Method Tools
    Jang, Seung-Ju
    Ryoo, Jungwoo
    Lee, ChangYeol
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (9B): : 163 - 167
  • [50] Formal Verification of Finite State Transactional Security Policy
    Rajamanickam, N.
    Nadarajan, R.
    Elci, Atilla
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 363 - 376