Formal security analysis of LoRaWAN
نویسندگان
چکیده
منابع مشابه
Formal Security Protocol Analysis
Not all of the protocol security flaws described at the SSR2014 conference were discovered using these new automated techniques. Several significant findings were the result of more traditional methods. These findings included flaws in standardized and deployed protocols, as well as important innovations to improve and extend the capabilities of long-used cryptographic techniques. Based on thes...
متن کاملFormal Analysis of Security APIs
An Application Program Interface (API) is considered a security API when it is designed not only to offer access to functionality but also to enforce a security policy, i.e. no matter what commands are sent to the interface, some security properties continue to hold. They are used, for example, as interfaces to cryptographic hardware modules and smartcards. They are very difficult to design, an...
متن کاملFormal integrated network security analysis tool: formal query-based network security configuration analysis
105 Formal integrated network security analysis tool: formal query-based network security configuration analysis Soumya Maity1, P. Bera2, Soumya K. Ghosh1, Ehab Al-Shaer3 School of Information Technology, Indian Institute of Technology, Kharagpur 721302, India School of Electrical Sciences, Indian Institute of Technology, Bhubaneswar 751013, India Department of Software and Information Systems,...
متن کاملFormal Analysis of Security Metrics and Risk
Security metrics are usually defined informally and, therefore, the rigourous analysis of these metrics is a hard task. This analysis is required to identify the existing relations between the security metrics, which try to quantify the same quality: security. Risk, computed as Annualised Loss Expectancy, is often used in order to give the overall assessment of security as a whole. Risk and sec...
متن کاملTowards Formal Analysis of Security Protocols
The pioneering and well-known work of Burrows, Abadi and Needham (the BAN logic) which dominates the area of security protocol analysis is shown to take an approach which is not fully formal and which consequently permits approval of dangerous protocols. Measures to make the BAN logic formal are then proposed. The formalisation is found to be desirable not only for its potential in providing ri...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Networks
سال: 2019
ISSN: 1389-1286
DOI: 10.1016/j.comnet.2018.11.017