Towards formal verification of IoT protocols: A Review

K Hofer-Schmitz, B Stojanović - Computer Networks, 2020 - Elsevier
Formal Verification is one of the crucial methods to detect possible weaknesses and
vulnerabilities at an early stage. This paper reviews formal methods for an extensive variety …

An overview of wireless IoT protocol security in the smart home domain

S Marksteiner, VJE Jiménez, H Valiant… - 2017 Internet of Things …, 2017 - ieeexplore.ieee.org
While the application of IoT in smart technologies becomes more and more proliferated, the
pandemonium of its protocols becomes increasingly confusing. More seriously, severe …

Improving smart home security: Integrating logical sensing into smart home

AC Jose, R Malekian - IEEE Sensors Journal, 2017 - ieeexplore.ieee.org
This paper explains various security issues in the existing home automation systems and
proposes the use of logic-based security algorithms to improve home security. This paper …

A model-based approach for vulnerability analysis of IoT security protocols: The Z-Wave case study

C Braghin, M Lilli, E Riccobene - Computers & Security, 2023 - Elsevier
Abstract IoT (Internet of Things) devices are extensively used in security-critical services, as
for example home door opening, gas monitoring, alarm systems, etc. Often, they use …

Context aware intrusion detection for building automation systems

Z Pan, S Hariri, J Pacheco - Computers & Security, 2019 - Elsevier
Abstract The Internet of Things (IoT) will connect not only computers and mobile devices, but
also smart cities, buildings, and homes, as well as electrical grids, gas, and water networks …

SLoRa: Towards secure LoRa communications with fine-grained physical layer features

X Wang, L Kong, Z Wu, L Cheng, C Xu… - Proceedings of the 18th …, 2020 - dl.acm.org
LoRa, which is considered as an appealing wireless technique for Low-Power Wide-Area
Networks (LPWANs), has found wide applications in fields such as smart cities, intelligent …

Design and evaluation of resilient infrastructures systems for smart cities

J Pacheco, C Tunc, S Hariri - 2016 IEEE International Smart …, 2016 - ieeexplore.ieee.org
Cities are rapidly converging toward digital technologies in order to provide advanced
information services, efficient management, and resource utilization that will positively …

[PDF][PDF] Formal Proof of a Vulnerability in Z-Wave IoT Protocol.

M Lilli, C Braghin, E Riccobene - SECRYPT, 2021 - scitepress.org
Nowadays, IoT (Internet of Things) devices are becoming part of our daily life. Unfortunately,
many of them do not use standardized communication protocols with a provable security …

Anomaly behavior analysis system for ZigBee in smart buildings

B Al Baalbaki, J Pacheco, C Tunc… - 2015 IEEE/ACS 12th …, 2015 - ieeexplore.ieee.org
Smart Building (SB) exploits advances in information and communication technologies in
order to provide the next generation of information and automation services that will …

Anomaly behavior analysis for building automation systems

Z Pan, J Pacheco, S Hariri - 2016 IEEE/ACS 13th International …, 2016 - ieeexplore.ieee.org
Advanced networking technology and increasing information services have led to extensive
interconnection between Building Automation Systems (BAS) communication protocols and …