2017
DOI: 10.23638/lmcs-13(3:5)2017
|View full text |Cite
|
Sign up to set email alerts
|

Tracing where IoT data are collected and aggregated

Abstract: The Internet of Things (IoT) offers the infrastructure of the information society. It hosts smart objects that automatically collect and exchange data of various kinds, directly gathered from sensors or generated by aggregations. Suitable coordination primitives and analysis mechanisms are in order to design and reason about IoT systems, and to intercept the implied technological shifts. We address some of these issues from a foundational point of view. To study them, we define IoT-LySa, a process calculus end… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 37 publications
0
5
0
Order By: Relevance
“…This may prevent us from statically determining safe approximants of aggregated data, because we cannot establish how many applications of aggregation functions are necessary by only inspecting the code. The analysis of [10] resorts therefore to tree grammars for keeping finite the abstract values and for improving the precision of the analysis in [9], where instead trees are cut at a fixed depth.…”
Section: An Overview Of Iot-lysamentioning
confidence: 99%
See 3 more Smart Citations
“…This may prevent us from statically determining safe approximants of aggregated data, because we cannot establish how many applications of aggregation functions are necessary by only inspecting the code. The analysis of [10] resorts therefore to tree grammars for keeping finite the abstract values and for improving the precision of the analysis in [9], where instead trees are cut at a fixed depth.…”
Section: An Overview Of Iot-lysamentioning
confidence: 99%
“…Indeed, one can inspect the component κ and see if a secret value flows in clear on the network. Other policies are also checked in [10].…”
Section: An Overview Of Iot-lysamentioning
confidence: 99%
See 2 more Smart Citations
“…The goal of the paper is to verify the effectiveness of a process calculus approach to formalise runtime enforcement of specification compliance in networks of PLCs injected with colluding malware that may forge/drop both actuator commands and inter-controller communications 3 . Process calculi represent a successful and widespread formal approach in concurrency theory relying on a variety of behavioural equivalences (e.g., trace equivalence and bisimilarity) for studying complex systems, such as distributed migrating objects [22], IoT systems [12,6,13] and cyber-physical systems [16], and used in many areas, including verification of security protocols [1,18] and security analysis of cyber-physical attacks [15]. On the other hand, runtime enforcement [26,17,8] is a powerful verification/validation technique aiming at correcting possibly-incorrect executions of a system-under-scrutiny (SuS) via a kind of monitor that acts as a proxy between the SuS and its environment.…”
Section: Introductionmentioning
confidence: 99%