A survey on formal verification and validation techniques for internet of things

M Krichen - Applied Sciences, 2023 - mdpi.com
The Internet of Things (IoT) has brought about a new era of connected devices and systems,
with applications ranging from healthcare to transportation. However, the reliability and …

Low-cost water quality sensors for IoT: A systematic review

ET de Camargo, FA Spanhol, JS Slongo, MVR da Silva… - Sensors, 2023 - mdpi.com
In many countries, water quality monitoring is limited due to the high cost of logistics and
professional equipment such as multiparametric probes. However, low-cost sensors …

Towards formal verification of IoT protocols: A Review

K Hofer-Schmitz, B Stojanović - Computer Networks, 2020 - Elsevier
Formal Verification is one of the crucial methods to detect possible weaknesses and
vulnerabilities at an early stage. This paper reviews formal methods for an extensive variety …

Develo** a Novel Ontology for Cybersecurity in Internet of Medical Things-Enabled Remote Patient Monitoring

KS Bughio, DM Cook, SAA Shah - Sensors, 2024 - mdpi.com
IoT has seen remarkable growth, particularly in healthcare, leading to the rise of IoMT. IoMT
integrates medical devices for real-time data analysis and transmission but faces challenges …

Formal verification for security and attacks in IoT physical layer

ZH Toman, L Hamel, SH Toman, M Graiet… - Journal of Reliable …, 2024 - Springer
IoT devices are more important than ever. In a connected world, IoT devices have many
uses. They are no longer merely used at work; they are part of our everyday lives. Security …

Threat modelling and beyond-novel approaches to cyber secure the smart energy system

H Vallant, B Stojanović, J Božić, K Hofer-Schmitz - Applied Sciences, 2021 - mdpi.com
Smart Grids (SGs) represent electrical power systems that incorporate increased information
processing and efficient technological solutions. The integration of local prosumers, demand …

Guided feature identification and removal for resource-constrained firmware

R Williams, T Ren, L De Carli, L Lu… - ACM Transactions on …, 2021 - dl.acm.org
IoT firmware oftentimes incorporates third-party components, such as network-oriented
middleware and media encoders/decoders. These components consist of large and mature …

Towards formal methods of IoT application layer protocols

K Hofer-Schmitz, B Stojanović - 2019 12th CMI conference on …, 2019 - ieeexplore.ieee.org
This paper provides an overview of the application of formal methods for two most commonly
used application layer protocols in IoT domain, MQTT and CoAP. Formal methods give the …

AIS for Malware Detection in a Realistic IoT System: Challenges and Opportunities

H Alrubayyi, G Goteng, M Jaber - Network, 2023 - mdpi.com
With the expansion of the digital world, the number of Internet of things (IoT) devices is
evolving dramatically. IoT devices have limited computational power and a small memory …

Intelligent Computing Collaboration for the Security of the Fog Internet of Things

H Zhao, G Sun, W Li, P Zuo, Z Li, Z Wei - Symmetry, 2023 - mdpi.com
The application of fog Internet of Things (IoT) technology helps solve the problem of weak
computing power faced by IoT terminals. Due to asymmetric differences in communication …