On the Verification of Data Encryption Requirements in Internet of Things Using Event-B

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this paper, an approach for verifying data exchange requirements in the context of IoT with regard to resource constraints is described. The verification is done using Event-B method. The security requirements are defined based on the correlation concept. The capacity requirements are defined as a set of constraints on the exchanged data. The proposed approach starts by formalizing the data exchange process. Second, it extends this formalization with the data exchange security and capacity requirements. The consistency of each model and the relationship between an abstract model and its refinements are obtained by formal proofs. Finally, we use ProB model-checker to trace possible design errors.

Original languageEnglish
Title of host publicationDigital Economy. Emerging Technologies and Business Innovation - 4th International Conference, ICDEc 2019, Proceedings
EditorsRim Jallouli, Mohamed Anis Bach Tobji, Deny Bélisle, Sehl Mellouli, Farid Abdallah, Ibrahim Osman
PublisherSpringer
Pages147-156
Number of pages10
ISBN (Print)9783030308735
DOIs
Publication statusPublished - 1 Jan 2019
Event4th International Conference on Digital Economy, ICDEc 2019 - Beirut, Lebanon
Duration: 15 Apr 201918 Apr 2019

Publication series

NameLecture Notes in Business Information Processing
Volume358
ISSN (Print)1865-1348
ISSN (Electronic)1865-1356

Conference

Conference4th International Conference on Digital Economy, ICDEc 2019
Country/TerritoryLebanon
CityBeirut
Period15/04/1918/04/19

Fingerprint

Dive into the research topics of 'On the Verification of Data Encryption Requirements in Internet of Things Using Event-B'. Together they form a unique fingerprint.

Cite this