Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

RETRACTED ARTICLE: Verification and modeling of IoT time automata for gateway security system

Published: 01 May 2022 Publication History

Abstract

Internet of Things (IoT) is a multiple heterogeneous network, and its perception layer is often faced with various security threats. As the bridge between the perception layer and the network layer, the IoT gateway should have the security management function to prevent the security issue from spreading to the upper layer. According to the current security deficiencies in IoT gateway, a universal IoT gateway security system was proposed based on the IoT gateway middleware technology. Various security protocols or algorithms are embedded in IoT gateway security system, and the modeling and analysis can help the design and implementation of IoT gateway. The formal modeling and verification of the IoT gateway security system was performed by timed automata. The results show that the IoT gateway security system satisfies the security properties of confidentiality, availability, authenticity, robustness, integrity and freshness.

References

[1]
Clarke Jr, Edmund M., et al. (2018) Model checking. MIT Press
[2]
David A et al. Uppaal SMC tutorial Int J Softw Tools Technol Transfer 2015 17 4 397-415
[3]
Fraile F et al. Trustworthy industrial IoT gateways for interoperability platforms and ecosystems IEEE Internet Things J 2018 56 4506-4514
[4]
Gokhale P, Omkar B, and Sagar B Introduction to IOT Int Adv Res J Sci Eng Technol 2012 5.1 41-44
[5]
Guoqing WANG et al. Modeling and verifying based on timed automata of Internet of things gateway security system J Commun 2018 39 3 63
[6]
Hong N (2013) A security framework for the internet of things based on public key infrastructure. Adv Mater Res, vol. 671. Trans Tech Publications Ltd.
[7]
Junxiong W, Hongzhi W, and Chenxu Z Iteration acceleration for distributed learning systems Parallel Comput 2018 72 2941
[8]
Morabito R, Nicklas B (2017) A framework based on SDN and containers for dynamic service chains on IoT gateways. In: Proceedings of the Workshop on Hot Topics in Container Networking and Networked Systems.
[9]
Muniz ALN, Aline MSA, and George L Integrating UML and UPPAAL for designing, specifying and verifying component-based real-time systems Innov Syst Softw Eng 2010 61 29-37
[10]
Peng Z, et al. (2015) Intelligent home security system using agent-based IoT devices. ieeexplore. ieee. org., 313–314.
[11]
Qian ZH and Wang YJ IoT technology and application Acta Electron. Sinica 2012 40 5 1023-1029
[12]
Ramírez-Pisco R et al. Feasibility study for a mini-hydropower plant in Dreznica, Bosnia, and Herzegovina Lect Notes Elect Eng 2020 637 241-251
[13]
Sathyadevan S, et al (2017) Portguard-an authentication tool for securing ports in an IoT gateway. In: 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). IEEE
[14]
Senthil Murugan T and Jog VV Systematic investigation and performance study of authentication and authorization techniques of Internet of Things Int J Knowl Based Intell Eng Syst 2019 23.2 61-76
[15]
Serdaroglu KC, Tevfik K, Sebnem B (2018) Publish-subscribe based monitoring model for wireless sensor networks. In: New Advances in the Internet of Things. Springer, Cham, pp 45–58
[16]
Tseng S-S et al. CBR-based negotiation RBAC model for enhancing ubiquitous resources management Int J Inform Manag 2017 37.1 1539-1550
[17]
Wójcik M (2016) Internet of things–potential for libraries. Library Hi Tech.
[18]
Yin A and Wang S A novel encryption scheme based on timestamp in gigabit Ethernet passive optical network using AES-128 Optik 2014 125 3 1361-1365
[19]
Zhang L, Alharbe NR, and Atkins AS A self-adaptive distributed decision support model for Internet of Things applications Trans Inst Meas Control 2017 39 4 404-419
[20]
Zhang Y, Wenfeng S, Yuntao S (2020) Architecture and Implementation of Industrial Internet of Things (IIoT) Gateway. In: 2020 IEEE 2nd International Conference on Civil Aviation Safety and Information Technology (ICCASIT). IEEE

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Soft Computing - A Fusion of Foundations, Methodologies and Applications
Soft Computing - A Fusion of Foundations, Methodologies and Applications  Volume 26, Issue 10
May 2022
443 pages
ISSN:1432-7643
EISSN:1433-7479
Issue’s Table of Contents

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 01 May 2022
Accepted: 10 February 2022

Author Tags

  1. IoT gateway
  2. Middleware
  3. Model checking
  4. Security system
  5. Timed automata

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media