Skip to main content

On the Verification of Data Encryption Requirements in Internet of Things Using Event-B

  • Conference paper
  • First Online:
Digital Economy. Emerging Technologies and Business Innovation (ICDEc 2019)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 358))

Included in the following conference series:

Abstract

In this paper, an approach for verifying data exchange requirements in the context of IoT with regard to resource constraints is described. The verification is done using Event-B method. The security requirements are defined based on the correlation concept. The capacity requirements are defined as a set of constraints on the exchanged data. The proposed approach starts by formalizing the data exchange process. Second, it extends this formalization with the data exchange security and capacity requirements. The consistency of each model and the relationship between an abstract model and its refinements are obtained by formal proofs. Finally, we use ProB model-checker to trace possible design errors.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I.: Internet of things: vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497–1516 (2012)

    Article  Google Scholar 

  2. Whitmore, A., Agarwal, A., Da Xu, L.: The internet of thingsa survey of topics and trends. Inf. Syst. Front. 17(2), 261–274 (2015)

    Article  Google Scholar 

  3. Ma, H.-D.: Internet of things: Objectives and scientific challenges. J. Comput. Sci. Technol. 26(6), 919–924 (2011)

    Article  Google Scholar 

  4. Grasland, C.: Initiation aux methodes statistiques en sciences’ sociales. Univ Paris VIIUFR GHSS (2000)

    Google Scholar 

  5. Meadows, C.: Open issues in formal methods for cryptographic protocol analysis. In: Proceedings of the DARPA Information Survivability Conference and Exposition, DISCEX 2000, vol. 1, pp. 237–250. IEEE (2000)

    Google Scholar 

  6. Leuschel, M., Butler, M.: ProB: a model checker for B. In: Araki, K., Gnesi, S., Mandrioli, D. (eds.) FME 2003. LNCS, vol. 2805, pp. 855–874. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-45236-2_46

    Chapter  Google Scholar 

  7. Banik, S., et al.: Midori: a block cipher for low energy. In: Iwata, T., Cheon, J.H. (eds.) ASIACRYPT 2015. LNCS, vol. 9453, pp. 411–436. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-48800-3_17

    Chapter  Google Scholar 

  8. Izadi, M., Sadeghiyan, B., Sadeghian, S.S., Khanooki, H.A.: MIBS: a new lightweight block cipher. In: Garay, Juan A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 334–348. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-10433-6_22

    Chapter  Google Scholar 

  9. Yang, G., Zhu, B., Suder, V., Aagaard, M.D., Gong, G.: The Simeck family of lightweight block ciphers. In: Güneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 307–329. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-48324-4_16

    Chapter  Google Scholar 

  10. Kolbl, S., Roy, A.: A brief comparison of simon and¨ simeck. IACR Cryptology ePrint Archive, vol. 2015, p. 706 (2015)

    Google Scholar 

  11. Baysal, A., Şahin, S.: RoadRunneR: a small and fast bitslice block cipher for low cost 8-bit processors. In: Güneysu, T., Leander, G., Moradi, A. (eds.) LightSec 2015. LNCS, vol. 9542, pp. 58–76. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-29078-2_4

    Chapter  MATH  Google Scholar 

  12. Abrial, J.: Modeling in Event-B: System and Software Engineering. Cambridge University Press, Cambridge (2010)

    Book  Google Scholar 

  13. Abrial, J.-R., Butler, M., Hallerstede, S., Voisin, L.: An open extensible tool environment for Event-B. In: Liu, Z., He, J. (eds.) ICFEM 2006. LNCS, vol. 4260, pp. 588–605. Springer, Heidelberg (2006). https://doi.org/10.1007/11901433_32

    Chapter  Google Scholar 

  14. Christiansen, M.M., Duffy, K.R., du Pin Calmon, F., Medard, M.: Brute force searching, the typical set and Guesswork. In: 2013 IEEE International Symposium on Information Theory, pp. 1257–1261 (2013)

    Google Scholar 

  15. Omrani, T., Rhouma, R., Sliman, L.: Lightweight cryptography for resource-constrained devices: a comparative study and rectangle cryptanalysis. In: Bach Tobji, M.A., Jallouli, R., Koubaa, Y., Nijholt, A. (eds.) ICDEc 2018. LNBIP, vol. 325, pp. 107–118. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-97749-2_8

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Layth Sliman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Abbassi, I., Sliman, L., Graiet, M., Gaaloul, W. (2019). On the Verification of Data Encryption Requirements in Internet of Things Using Event-B. In: Jallouli, R., Bach Tobji, M., Bélisle, D., Mellouli, S., Abdallah, F., Osman, I. (eds) Digital Economy. Emerging Technologies and Business Innovation. ICDEc 2019. Lecture Notes in Business Information Processing, vol 358. Springer, Cham. https://doi.org/10.1007/978-3-030-30874-2_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-30874-2_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-30873-5

  • Online ISBN: 978-3-030-30874-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics