A Step Towards Checking Security in IoT

نویسندگان

  • Chiara Bodei
  • Pierpaolo Degano
  • Gian Luigi Ferrari
  • Letterio Galletta
چکیده

The Internet of Things (IoT) is pervading our everyday life. As a consequence, it is crucial to formally reason about IoT systems, to understand and govern the emerging technology shifts. In a companion paper [6], we introduced IOT-LYSA, a dialect of LYSA [5, 8], within the process calculi approach to IoT [16, 18]. It has primitive constructs to describe the activity of sensors and of actuators, and to manage the coordination and communication of smart objects. More precisely, our calculus consists of:

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns

The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

A First Step Towards Security for Internet of Small Things

Industrial and research organizations expect that tens of billions of daily life objects can communicate with each other in the near future for realizing a hyper connected society that is called Internet of Things (IoT). They also agree that security is one of the most important concerns to provide smart and intelligent services successfully in the IoT. The author notes in this paper that the f...

متن کامل

A survey on RPL attacks and their countermeasures

RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...

متن کامل

Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems

Denial of Service (DoS) attacks constitute a major security threat to today’s Internet. This challenge is especially pertinent to the Internet of Things (IoT) as devices have less computing power, memory and security mechanisms to mitigate DoS attacks. This paper presents a model that mimics the unique characteristics of a network of IoT devices, including components of the system implementing ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016