A model-based approach for vulnerability analysis of IoT security protocols: The Z-Wave case study

C Braghin, M Lilli, E Riccobene - Computers & Security, 2023 - Elsevier
Abstract IoT (Internet of Things) devices are extensively used in security-critical services, as
for example home door opening, gas monitoring, alarm systems, etc. Often, they use …

A formal approach to specify and verify Internet of Things architecture

A Saidi, MH Kacem, I Tounsi, AH Kacem - Internet of Things, 2023 - Elsevier
Abstract The Internet of Things (IoT) aims to interconnect the physical world with the digital
world, presenting complex challenges that require accurate models to ensure …

A Formal Verification of a Reputation Multi-Factor Authentication Mechanism for Constrained Devices and Low-Power Wide-Area Network Using Temporal Logic

WR Bezerra, JE Martina, CB Westphall - Sensors, 2023 - mdpi.com
There are many security challenges in IoT, especially related to the authentication of
restricted devices in long-distance and low-throughput networks. Problems such as …

A Review of Formal Security Verification of Common Internet of Things (IoT) Communication Protocols

I Bouziane, H Belmokadem… - 2023 7th IEEE Congress …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is characterized by a myriad of communication protocols that
enable seamless connectivity among devices. However, the open nature of the internet …

[PDF][PDF] Kant: A Domain-Specific Language for Modeling Security Protocols.

C Braghin, M Lilli, E Riccobene, M Baba - MODELSWARD, 2024 - scitepress.org
Designing a security protocol is a complex process that requires a deep understanding of
security principles and best practices. To ensure protocol effectiveness and resilience …

Engineering of Trust Analysis-Driven Digital Twins for a Medical Device

MM Bersani, C Braghin, A Gargantini… - … Conference on Software …, 2022 - Springer
The DT paradigm has emerged as a suitable way to cope with the complexity of analyzing,
controlling, and adapting complex systems in diverse domains. For medical systems …

APROVER: A Framework For The Development Of Security Protocols

M Lilli - 2024 - air.unimi.it
In the dynamic landscape of emerging technologies such as IoT and 5G, the integration of
advanced cryptographic protocols becomes essential for fostering secure and data-driven …

[PDF][PDF] Formal Analysis and Improvement of Z-Wave Protocol

JZ Du, JW Liu, T Feng, ZT Yuan - Journal of Computers, 2023 - csroc.org.tw
In order to verify the security of the Z-Wave communication protocol, the possible attacks in
the protocol are analyzed to reduce user privacy security vulnerabilities. For the …

[PDF][PDF] Edge AI LoRa Mesh Technologies

O Vermesan, KV Walde, R Bahr, C Conrady… - Advancing Edge … - library.oapen.org
Intelligent connectivity at the edge combines wireless communication, edge artificial
intelligence (AI), edge computing and internet of things (IoT) technologies to perform …

Red mallada con dispositivos de bajo consumo para iot

MA Orellana Placencia - 2022 - repositorio.utmachala.edu.ec
Con el constante avance en la tecnología y los conocimientos conjuntos del ser humano
para asumir el fin de satisfacer los problemas de la sociedad en los diferentes ámbitos …