A survey on formal verification and validation techniques for internet of things
M Krichen - Applied Sciences, 2023 - mdpi.com
The Internet of Things (IoT) has brought about a new era of connected devices and systems,
with applications ranging from healthcare to transportation. However, the reliability and …
with applications ranging from healthcare to transportation. However, the reliability and …
Unveiling the core of IoT: comprehensive review on data security challenges and mitigation strategies
The Internet of Things (IoT) is a collection of devices such as sensors for collecting data,
actuators that perform mechanical actions on the sensor's collected data, and gateways …
actuators that perform mechanical actions on the sensor's collected data, and gateways …
Formal analysis of an AUTOSAR-based basic software module
The widespread use of advanced driver assistance systems in modern vehicles, together
with their integration with the Internet and other road nodes, has made vehicle more …
with their integration with the Internet and other road nodes, has made vehicle more …
Enhancing IoT security: A comprehensive exploration of privacy, security measures, and advanced routing solutions
Abstract The Internet of Things (IoT) is an advanced concept in computer networking that
enables smooth interconnection and communication across different types of devices …
enables smooth interconnection and communication across different types of devices …
Service to service communication based on CBPS system: refinement and verification
SH Toman, A Lahouij, S Kotel, L Hamel, ZH Toman… - Soft Computing, 2024 - Springer
Abstract The Internet of Things (IoT) is a network of devices that can communicate and
cooperate over the Internet. As the IoT expands, guaranteeing the dependability and …
cooperate over the Internet. As the IoT expands, guaranteeing the dependability and …
[PDF][PDF] Collaborative Detection and Prevention of Sybil Attacks against RPL-Based Internet of Things.
ABSTRACT The Internet of Things (IoT) comprises numerous resource-constrained devices
that generate large volumes of data. The inherent vulnerabilities in IoT infrastructure, such …
that generate large volumes of data. The inherent vulnerabilities in IoT infrastructure, such …
Ensuring the Correctness and Reliability of CBPS System Using Event‐B
During the early phases of software system development, error detection can be challenging
due to the complexity of both the requirements and the operating environments. This paper …
due to the complexity of both the requirements and the operating environments. This paper …
Securing UAV Communications with Homomorphic Encryption and Key Regeneration: A Model Checking Approach.
MY Alzahrani - International Journal of Advances in Soft …, 2024 - search.ebscohost.com
Abstract Unmanned Aerial Vehicles (UAVs) are at the centre of multiple applications across
various fields, including delivery, disaster response, and surveillance. However, its use of …
various fields, including delivery, disaster response, and surveillance. However, its use of …
A Correct by Construction Model for CBPS Systems Verification
SH Toman, A Lahouij, L Hamel… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) comprises a group of interconnected devices that communicate
through the internet, necessitating a robust infrastructure and security protocols. Within this …
through the internet, necessitating a robust infrastructure and security protocols. Within this …
Enhancing Computer Security through Formal Verification of Cryptographic Protocols Using Model Checking and Partial Order Techniques
This study explores the integration of partial, order reduction techniques with model
checking to enhance the verification of cryptographic protocols. Cryptographic, protocols are …
checking to enhance the verification of cryptographic protocols. Cryptographic, protocols are …