Abstract
In this paper, an approach for verifying data exchange requirements in the context of IoT with regard to resource constraints is described. The verification is done using Event-B method. The security requirements are defined based on the correlation concept. The capacity requirements are defined as a set of constraints on the exchanged data. The proposed approach starts by formalizing the data exchange process. Second, it extends this formalization with the data exchange security and capacity requirements. The consistency of each model and the relationship between an abstract model and its refinements are obtained by formal proofs. Finally, we use ProB model-checker to trace possible design errors.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I.: Internet of things: vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497–1516 (2012)
Whitmore, A., Agarwal, A., Da Xu, L.: The internet of thingsa survey of topics and trends. Inf. Syst. Front. 17(2), 261–274 (2015)
Ma, H.-D.: Internet of things: Objectives and scientific challenges. J. Comput. Sci. Technol. 26(6), 919–924 (2011)
Grasland, C.: Initiation aux methodes statistiques en sciences’ sociales. Univ Paris VIIUFR GHSS (2000)
Meadows, C.: Open issues in formal methods for cryptographic protocol analysis. In: Proceedings of the DARPA Information Survivability Conference and Exposition, DISCEX 2000, vol. 1, pp. 237–250. IEEE (2000)
Leuschel, M., Butler, M.: ProB: a model checker for B. In: Araki, K., Gnesi, S., Mandrioli, D. (eds.) FME 2003. LNCS, vol. 2805, pp. 855–874. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-45236-2_46
Banik, S., et al.: Midori: a block cipher for low energy. In: Iwata, T., Cheon, J.H. (eds.) ASIACRYPT 2015. LNCS, vol. 9453, pp. 411–436. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-48800-3_17
Izadi, M., Sadeghiyan, B., Sadeghian, S.S., Khanooki, H.A.: MIBS: a new lightweight block cipher. In: Garay, Juan A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 334–348. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-10433-6_22
Yang, G., Zhu, B., Suder, V., Aagaard, M.D., Gong, G.: The Simeck family of lightweight block ciphers. In: Güneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 307–329. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-48324-4_16
Kolbl, S., Roy, A.: A brief comparison of simon and¨ simeck. IACR Cryptology ePrint Archive, vol. 2015, p. 706 (2015)
Baysal, A., Şahin, S.: RoadRunneR: a small and fast bitslice block cipher for low cost 8-bit processors. In: Güneysu, T., Leander, G., Moradi, A. (eds.) LightSec 2015. LNCS, vol. 9542, pp. 58–76. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-29078-2_4
Abrial, J.: Modeling in Event-B: System and Software Engineering. Cambridge University Press, Cambridge (2010)
Abrial, J.-R., Butler, M., Hallerstede, S., Voisin, L.: An open extensible tool environment for Event-B. In: Liu, Z., He, J. (eds.) ICFEM 2006. LNCS, vol. 4260, pp. 588–605. Springer, Heidelberg (2006). https://doi.org/10.1007/11901433_32
Christiansen, M.M., Duffy, K.R., du Pin Calmon, F., Medard, M.: Brute force searching, the typical set and Guesswork. In: 2013 IEEE International Symposium on Information Theory, pp. 1257–1261 (2013)
Omrani, T., Rhouma, R., Sliman, L.: Lightweight cryptography for resource-constrained devices: a comparative study and rectangle cryptanalysis. In: Bach Tobji, M.A., Jallouli, R., Koubaa, Y., Nijholt, A. (eds.) ICDEc 2018. LNBIP, vol. 325, pp. 107–118. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-97749-2_8
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Abbassi, I., Sliman, L., Graiet, M., Gaaloul, W. (2019). On the Verification of Data Encryption Requirements in Internet of Things Using Event-B. In: Jallouli, R., Bach Tobji, M., Bélisle, D., Mellouli, S., Abdallah, F., Osman, I. (eds) Digital Economy. Emerging Technologies and Business Innovation. ICDEc 2019. Lecture Notes in Business Information Processing, vol 358. Springer, Cham. https://doi.org/10.1007/978-3-030-30874-2_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-30874-2_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-30873-5
Online ISBN: 978-3-030-30874-2
eBook Packages: Computer ScienceComputer Science (R0)