2016
DOI: 10.4204/eptcs.223.9
|View full text |Cite
|
Sign up to set email alerts
|

A Step Towards Checking Security in IoT

Abstract: The Internet of Things (IoT) is smartifying our everyday life. Our starting point is IOT-LYSA, a calculus for describing IoT systems, and its static analysis, which will be presented at Coordination 2016. We extend the mentioned proposal in order to begin an investigation about security issues, in particular for the static verification of secrecy and some other security properties.

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
3
3

Relationship

4
2

Authors

Journals

citations
Cited by 7 publications
(12 citation statements)
references
References 18 publications
0
12
0
Order By: Relevance
“…For example, the graph built from the analysis results can be used: to check whether a system respects policies that rule information flows among nodes, by allowing some flows and forbidding others; to carry out a taint analysis for detecting whether critical decisions may depend on tainted data. To this aim, we could integrate our present analysis with the one in [3] in the first case and with the taint analysis of [8] in the second one. Answering to these questions can help designers to detect the potential vulnerabilities related to the presence of dangerous nodes, and can determine possible solutions and mitigation strategies.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…For example, the graph built from the analysis results can be used: to check whether a system respects policies that rule information flows among nodes, by allowing some flows and forbidding others; to carry out a taint analysis for detecting whether critical decisions may depend on tainted data. To this aim, we could integrate our present analysis with the one in [3] in the first case and with the taint analysis of [8] in the second one. Answering to these questions can help designers to detect the potential vulnerabilities related to the presence of dangerous nodes, and can determine possible solutions and mitigation strategies.…”
Section: Discussionmentioning
confidence: 99%
“…We briefly present a version of IoT-LySa [4,3,9], a specification language recently proposed for designing IoT systems. It is, in turn, an adaption of LySa [2], a process calculus introduced to specify and analyse cryptographic protocols and checking their security properties (see e.g.…”
Section: Overview Of Iot-lysamentioning
confidence: 99%
See 1 more Smart Citation
“…More precisely, the first branch is executed when the node receives a message with guard temp (line 7). The node checks if the temperature x is below or above a given threshold, instructs the actuator, and sends an acknowledgement accordingly (lines [8][9][10][11][12][13][14]. The second case is when the node receives the message with guard quit (line 17): the process sends an acknowledgement and terminates.…”
Section: An Overview Of Iot-lysamentioning
confidence: 99%
“…Otherwise, the r-tuple is not accepted. The present variant of IoT-LySa has external choices not originally included in [9,8] 5 that is rendered by two branches guarded by two different input actions. Note that input and output actions may contain tags c ∈ C .…”
Section: A Iot-lysa Syntaxmentioning
confidence: 99%