A survey on formal verification and validation techniques for internet of things

M Krichen - Applied Sciences, 2023 - mdpi.com
The Internet of Things (IoT) has brought about a new era of connected devices and systems,
with applications ranging from healthcare to transportation. However, the reliability and …

Unveiling the core of IoT: comprehensive review on data security challenges and mitigation strategies

K Kaur, A Kaur, Y Gulzar, V Gandhi - Frontiers in Computer Science, 2024 - frontiersin.org
The Internet of Things (IoT) is a collection of devices such as sensors for collecting data,
actuators that perform mechanical actions on the sensor's collected data, and gateways …

Formal analysis of an AUTOSAR-based basic software module

C Bodei, M De Vincenzi, I Matteucci - International Journal on Software …, 2024 - Springer
The widespread use of advanced driver assistance systems in modern vehicles, together
with their integration with the Internet and other road nodes, has made vehicle more …

Enhancing IoT security: A comprehensive exploration of privacy, security measures, and advanced routing solutions

AC Naik, LK Awasthi, P Rathee, TP Sharma, A Verma - Computer Networks, 2025 - Elsevier
Abstract The Internet of Things (IoT) is an advanced concept in computer networking that
enables smooth interconnection and communication across different types of devices …

Service to service communication based on CBPS system: refinement and verification

SH Toman, A Lahouij, S Kotel, L Hamel, ZH Toman… - Soft Computing, 2024 - Springer
Abstract The Internet of Things (IoT) is a network of devices that can communicate and
cooperate over the Internet. As the IoT expands, guaranteeing the dependability and …

[PDF][PDF] Collaborative Detection and Prevention of Sybil Attacks against RPL-Based Internet of Things.

MA Khan, RN Bin Rais, O Khalid - Computers, Materials & …, 2023 - cdn.techscience.cn
ABSTRACT The Internet of Things (IoT) comprises numerous resource-constrained devices
that generate large volumes of data. The inherent vulnerabilities in IoT infrastructure, such …

Ensuring the Correctness and Reliability of CBPS System Using Event‐B

S Hussein Toman, L Hamel, A Lahouij… - Software Testing …, 2025 - Wiley Online Library
During the early phases of software system development, error detection can be challenging
due to the complexity of both the requirements and the operating environments. This paper …

Securing UAV Communications with Homomorphic Encryption and Key Regeneration: A Model Checking Approach.

MY Alzahrani - International Journal of Advances in Soft …, 2024 - search.ebscohost.com
Abstract Unmanned Aerial Vehicles (UAVs) are at the centre of multiple applications across
various fields, including delivery, disaster response, and surveillance. However, its use of …

A Correct by Construction Model for CBPS Systems Verification

SH Toman, A Lahouij, L Hamel… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) comprises a group of interconnected devices that communicate
through the internet, necessitating a robust infrastructure and security protocols. Within this …

Enhancing Computer Security through Formal Verification of Cryptographic Protocols Using Model Checking and Partial Order Techniques

M Saeed, M Ibrar, D Mahmood, A Delshadi - The Asian Bulletin of Big …, 2024 - abbdm.com
This study explores the integration of partial, order reduction techniques with model
checking to enhance the verification of cryptographic protocols. Cryptographic, protocols are …