Formal security analysis of LoRaWAN

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Formal Security Protocol Analysis

Not all of the protocol security flaws described at the SSR2014 conference were discovered using these new automated techniques. Several significant findings were the result of more traditional methods. These findings included flaws in standardized and deployed protocols, as well as important innovations to improve and extend the capabilities of long-used cryptographic techniques. Based on thes...

متن کامل

Formal Analysis of Security APIs

An Application Program Interface (API) is considered a security API when it is designed not only to offer access to functionality but also to enforce a security policy, i.e. no matter what commands are sent to the interface, some security properties continue to hold. They are used, for example, as interfaces to cryptographic hardware modules and smartcards. They are very difficult to design, an...

متن کامل

Formal integrated network security analysis tool: formal query-based network security configuration analysis

105 Formal integrated network security analysis tool: formal query-based network security configuration analysis Soumya Maity1, P. Bera2, Soumya K. Ghosh1, Ehab Al-Shaer3 School of Information Technology, Indian Institute of Technology, Kharagpur 721302, India School of Electrical Sciences, Indian Institute of Technology, Bhubaneswar 751013, India Department of Software and Information Systems,...

متن کامل

Formal Analysis of Security Metrics and Risk

Security metrics are usually defined informally and, therefore, the rigourous analysis of these metrics is a hard task. This analysis is required to identify the existing relations between the security metrics, which try to quantify the same quality: security. Risk, computed as Annualised Loss Expectancy, is often used in order to give the overall assessment of security as a whole. Risk and sec...

متن کامل

Towards Formal Analysis of Security Protocols

The pioneering and well-known work of Burrows, Abadi and Needham (the BAN logic) which dominates the area of security protocol analysis is shown to take an approach which is not fully formal and which consequently permits approval of dangerous protocols. Measures to make the BAN logic formal are then proposed. The formalisation is found to be desirable not only for its potential in providing ri...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer Networks

سال: 2019

ISSN: 1389-1286

DOI: 10.1016/j.comnet.2018.11.017