Towards a Formal IoT Security Model

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Step Towards Checking Security in IoT

The Internet of Things (IoT) is pervading our everyday life. As a consequence, it is crucial to formally reason about IoT systems, to understand and govern the emerging technology shifts. In a companion paper [6], we introduced IOT-LYSA, a dialect of LYSA [5, 8], within the process calculi approach to IoT [16, 18]. It has primitive constructs to describe the activity of sensors and of actuators...

متن کامل

Reconstructing a formal security model

Role-based access control (RBAC) is a flexible approach to access control, which has generated great interest in the security community. The principal motivation behind RBAC is to simplify the complexity of administrative tasks. Several formal models of RBAC have been introduced. However, there are a few works specifying RBAC in a way which system developers or software engineers can easily und...

متن کامل

IOT: Formal Security Analysis of Smart Embedded Systems

Smart embedded systems are core components of Internet of Things (IoT). Many vulnerabilities and attacks have been discovered against di↵erent classes of IoT devices. Therefore, developing a systematic mechanism to analyze the security of smart embedded systems will help developers discover new attacks, and improve the design and implementation of the system. In this paper, we formally model th...

متن کامل

IoT Security: A Survey

The Internet of Things (IoT) is still at the top of the Gartner Hype Cycle as the most hyped technology, which means that it is the hottest topic that has gained the most attraction of the researchers currently. In recent years, there have been huge amount of research that have investigated different aspects and concerns of this field. Meanwhile, supplying privacy and security is an inseparable...

متن کامل

Towards an Integrated IoT Capability Maturity Model

Through the Internet of Things companies obtain more and more data everyday that has potential in creating unique value. However, extracting beneficial information becomes more complex with this huge pool of data. Therefore, organizations need to improve their Internet of Things management and carefully facilitate the transformation from data to useful knowledge. Accordingly, this research aims...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Symmetry

سال: 2020

ISSN: 2073-8994

DOI: 10.3390/sym12081305