Towards formal verification of IoT protocols: A Review
K Hofer-Schmitz, B Stojanović - Computer Networks, 2020 - Elsevier
Formal Verification is one of the crucial methods to detect possible weaknesses and
vulnerabilities at an early stage. This paper reviews formal methods for an extensive variety …
vulnerabilities at an early stage. This paper reviews formal methods for an extensive variety …
[HTML][HTML] A review of functional encryption in IoT applications
The Internet of Things (IoT) represents a growing aspect of how entities, including humans
and organizations, are likely to connect with others in their public and private interactions …
and organizations, are likely to connect with others in their public and private interactions …
[PDF][PDF] The cyber security body of knowledge
D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …
The project would like organisations using, or intending to use, CyBOK for the purposes of …
Automated analysis of secure internet of things protocols
Formal security analysis has proven to be a useful tool for tracking modifications in
communication protocols in an automated manner, where full security analysis of revisions …
communication protocols in an automated manner, where full security analysis of revisions …
The sa4p framework: Sensing and actuation as a privilege
Popular consumer Internet of Things (IoT) devices provide increasingly diverse sensing and
actuation capabilities. Despite their benefits, such devices prompt numerous security …
actuation capabilities. Despite their benefits, such devices prompt numerous security …
Towards formal methods of iot application layer protocols
K Hofer-Schmitz, B Stojanović - 2019 12th CMI conference on …, 2019 - ieeexplore.ieee.org
This paper provides an overview of the application of formal methods for two most commonly
used application layer protocols in IoT domain, MQTT and CoAP. Formal methods give the …
used application layer protocols in IoT domain, MQTT and CoAP. Formal methods give the …
Crypsh: A novel iot data protection scheme based on bgn cryptosystem
The Internet of Things (IoT) is an emerging paradigm and has penetrated deeply into our
daily life. Due to the seamless connections of the IoT devices with the physical world through …
daily life. Due to the seamless connections of the IoT devices with the physical world through …
Lightweight mutual authentication strategy for Internet of Electric Things
B Zhao, S Zeng, H Feng, Z Chen, Z Wang… - Sustainable Energy …, 2021 - Elsevier
The identity authentication protocols for devices in Internet of Electric Things (IOET)
applications fall under stringent security, privacy protection, and resource consumption …
applications fall under stringent security, privacy protection, and resource consumption …
Opinion: Security lifetime labels-Overcoming information asymmetry in security of IoT consumer products
The installed base of Internet of Things (IoT) consumer products is steadily increasing, in
conjunction with the number of disclosed security vulnerabilities in these devices. In this …
conjunction with the number of disclosed security vulnerabilities in these devices. In this …
Long-term secure management of large scale Internet of Things applications
Abstract The Internet of Things (IoT) is an emerging paradigm, where the ubiquitous devices
can form the networks and connect to Internet. Security and management of devices remain …
can form the networks and connect to Internet. Security and management of devices remain …