A Step Towards Checking Security in IoT
نویسندگان
چکیده
The Internet of Things (IoT) is pervading our everyday life. As a consequence, it is crucial to formally reason about IoT systems, to understand and govern the emerging technology shifts. In a companion paper [6], we introduced IOT-LYSA, a dialect of LYSA [5, 8], within the process calculi approach to IoT [16, 18]. It has primitive constructs to describe the activity of sensors and of actuators, and to manage the coordination and communication of smart objects. More precisely, our calculus consists of:
منابع مشابه
Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns
The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...
متن کاملA Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملA First Step Towards Security for Internet of Small Things
Industrial and research organizations expect that tens of billions of daily life objects can communicate with each other in the near future for realizing a hyper connected society that is called Internet of Things (IoT). They also agree that security is one of the most important concerns to provide smart and intelligent services successfully in the IoT. The author notes in this paper that the f...
متن کاملA survey on RPL attacks and their countermeasures
RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...
متن کاملQuantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems
Denial of Service (DoS) attacks constitute a major security threat to today’s Internet. This challenge is especially pertinent to the Internet of Things (IoT) as devices have less computing power, memory and security mechanisms to mitigate DoS attacks. This paper presents a model that mimics the unique characteristics of a network of IoT devices, including components of the system implementing ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016