A Verification Method for Security and Safety of IoT Applications through DSM Language and Lustre

Wentao Tang, Hao Feng, Kenji Hisazumi, Akira Fukuda

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Development of Internet of Things (IoT) brings a variety of IoT applications that involve housing, navigation, payment, and healthcare. Since IoT applications play an important role in our lives, security is critical to these applications and must be guaranteed. In order to realize this, the paper proposes a pre-execution verification method for downloaded IoT applications, which meets security and safety requirements of users using model checking. The model checking requires special models for verification, which is difficult to describe for developers. So we introduce a domain-specific modeling language (DSML) to describe IoT application and a generator from the DSML into the model to pre-execution verification and execution. Also, as a case study, we provide a study of our method used in a smart house application, which is one of the most representative examples in IoT applications.

Original languageEnglish
Title of host publicationProceedings of the 2020 3rd International Conference on Information Science and System, ICISS 2020
PublisherAssociation for Computing Machinery
Pages166-170
Number of pages5
ISBN (Electronic)9781450377256
DOIs
Publication statusPublished - 2020 Mar 19
Externally publishedYes
Event3rd International Conference on Information Science and System, ICISS 2020 - Virtual, Online, United Kingdom
Duration: 2020 Mar 192020 Mar 22

Publication series

NameACM International Conference Proceeding Series

Conference

Conference3rd International Conference on Information Science and System, ICISS 2020
Country/TerritoryUnited Kingdom
CityVirtual, Online
Period20/3/1920/3/22

Keywords

  • Code Generating
  • IoT; DSML
  • Lustre
  • Model-Checking
  • Smart House

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'A Verification Method for Security and Safety of IoT Applications through DSM Language and Lustre'. Together they form a unique fingerprint.

Cite this