Affiliation:
1. Campus Universitário—Trindade, UFSC—Federal University of Santa Catarina, Florianópolis 88040-380, SC, Brazil
Abstract
There are many security challenges in IoT, especially related to the authentication of restricted devices in long-distance and low-throughput networks. Problems such as impersonation, privacy issues, and excessive battery usage are some of the existing problems evaluated through the threat modeling of this work. A formal assessment of security solutions for their compliance in addressing such threats is desirable. Although several works address the verification of security protocols, verifying the security of components and their non-locking has been little explored. This work proposes to analyze the design-time security of the components of a multi-factor authentication mechanism with a reputation regarding security requirements that go beyond encryption or secrecy in data transmission. As a result, it was observed through temporal logic that the mechanism is deadlock-free and meets the requirements established in this work. Although it is not a work aimed at modeling the security mechanism, this document provides the necessary details for a better understanding of the mechanism and, consequently, the process of formal verification of its security properties.
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Reference98 articles.
1. Finding your way in the fog: Towards a comprehensive definition of fog computing;Vaquero;ACM SIGCOMM Comput. Commun. Rev.,2014
2. Yi, S., Hao, Z., Qin, Z., and Li, Q. (2015, January 12–13). Fog computing: Platform and applications. Proceedings of the 2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb), Washington, DC, USA.
3. A survey on security aspects for 3GPP 5G networks;Cao;IEEE Commun. Surv. Tutor.,2019
4. A survey of security and privacy issues in the Internet of Things from the layered context;Deep;Trans. Emerg. Telecommun. Technol.,2020
5. Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework;Osanaiye;J. Netw. Comput. Appl.,2016
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献