A survey on formal verification and validation techniques for internet of things
M Krichen - Applied Sciences, 2023 - mdpi.com
The Internet of Things (IoT) has brought about a new era of connected devices and systems,
with applications ranging from healthcare to transportation. However, the reliability and …
with applications ranging from healthcare to transportation. However, the reliability and …
Low-cost water quality sensors for IoT: A systematic review
In many countries, water quality monitoring is limited due to the high cost of logistics and
professional equipment such as multiparametric probes. However, low-cost sensors …
professional equipment such as multiparametric probes. However, low-cost sensors …
Towards formal verification of IoT protocols: A Review
K Hofer-Schmitz, B Stojanović - Computer Networks, 2020 - Elsevier
Formal Verification is one of the crucial methods to detect possible weaknesses and
vulnerabilities at an early stage. This paper reviews formal methods for an extensive variety …
vulnerabilities at an early stage. This paper reviews formal methods for an extensive variety …
Develo** a Novel Ontology for Cybersecurity in Internet of Medical Things-Enabled Remote Patient Monitoring
IoT has seen remarkable growth, particularly in healthcare, leading to the rise of IoMT. IoMT
integrates medical devices for real-time data analysis and transmission but faces challenges …
integrates medical devices for real-time data analysis and transmission but faces challenges …
Formal verification for security and attacks in IoT physical layer
IoT devices are more important than ever. In a connected world, IoT devices have many
uses. They are no longer merely used at work; they are part of our everyday lives. Security …
uses. They are no longer merely used at work; they are part of our everyday lives. Security …
Threat modelling and beyond-novel approaches to cyber secure the smart energy system
Smart Grids (SGs) represent electrical power systems that incorporate increased information
processing and efficient technological solutions. The integration of local prosumers, demand …
processing and efficient technological solutions. The integration of local prosumers, demand …
Guided feature identification and removal for resource-constrained firmware
IoT firmware oftentimes incorporates third-party components, such as network-oriented
middleware and media encoders/decoders. These components consist of large and mature …
middleware and media encoders/decoders. These components consist of large and mature …
Towards formal methods of IoT application layer protocols
K Hofer-Schmitz, B Stojanović - 2019 12th CMI conference on …, 2019 - ieeexplore.ieee.org
This paper provides an overview of the application of formal methods for two most commonly
used application layer protocols in IoT domain, MQTT and CoAP. Formal methods give the …
used application layer protocols in IoT domain, MQTT and CoAP. Formal methods give the …
AIS for Malware Detection in a Realistic IoT System: Challenges and Opportunities
With the expansion of the digital world, the number of Internet of things (IoT) devices is
evolving dramatically. IoT devices have limited computational power and a small memory …
evolving dramatically. IoT devices have limited computational power and a small memory …
Intelligent Computing Collaboration for the Security of the Fog Internet of Things
H Zhao, G Sun, W Li, P Zuo, Z Li, Z Wei - Symmetry, 2023 - mdpi.com
The application of fog Internet of Things (IoT) technology helps solve the problem of weak
computing power faced by IoT terminals. Due to asymmetric differences in communication …
computing power faced by IoT terminals. Due to asymmetric differences in communication …