2021
DOI: 10.26636/jtit.2021.153221
|View full text |Cite
|
Sign up to set email alerts
|

Security Verification in the Context of 5G Sensor Networks

Abstract: In order to develop reliable safety standards for 5G sensor networks (SN) and the Internet of Things, appropriate verification tools are needed, including those offering the ability to perform automated symbolic analysis process. The Tamarin prover is one of such software-based solutions. It allows to formally prove security protocols. This paper shows the modus operandi of the tool in question. Its application has been illustrated using an example of an exchange of messages between two agents, with asynchrono… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 9 publications
0
0
0
Order By: Relevance
“…This might correlate with how easy the NFR type is to quantify -Performance is perceived as easier to quantify (Rehmann et al 2016) than many other NFR types. It can also be attributed to growing external factors, such as societal pressures, which may explain the popularity of security testing in the studied companies since user privacy (Remlein and Stachowiak 2021) is expected to be secured in modern software.…”
Section: Rq1:what Types Of Nfrs Are Verified Through Automated Tests?mentioning
confidence: 99%
See 1 more Smart Citation
“…This might correlate with how easy the NFR type is to quantify -Performance is perceived as easier to quantify (Rehmann et al 2016) than many other NFR types. It can also be attributed to growing external factors, such as societal pressures, which may explain the popularity of security testing in the studied companies since user privacy (Remlein and Stachowiak 2021) is expected to be secured in modern software.…”
Section: Rq1:what Types Of Nfrs Are Verified Through Automated Tests?mentioning
confidence: 99%
“…Additionally, we noted that two NFRs may influence each other negatively. For example, client-server applications in a banking system could require extra security algorithms or protocols (Remlein and Stachowiak 2021) to exchange data across a network communication for better data integrity. When the system deals with a large number of user requests, the network performance may decline.…”
Section: Rq2: What Metrics Are Used For Automated Nfr Testing In Indu...mentioning
confidence: 99%