A Formal Verification Centred Development Process for Security Protocols

Author(s):  
Tom Coffey

This chapter concerns the correct and reliable design of modern security protocols. It discusses the importance of formal verification of security protocols prior to their release by publication or implementation. A discussion on logic-based verification of security protocols and its automation provides the reader with an overview of the current state-of-the-art of formal verification of security protocols. The authors propose a formal verification centred development process for security protocols. This process provides strong confidence in the correctness and reliability of the designed protocols. Thus, the usage of weak security protocols in communication systems is prevented. A case-study on the development of a security protocol demonstrates the advantages of the proposed approach. The case-study concludes with remarks on the performance of automated logic-based verification and presents an overview of formal verification results of a range of modern security protocols.

2008 ◽  
pp. 981-1005
Author(s):  
P. Giorgini ◽  
H. Mouratidis ◽  
N. Zannone

Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter, we present an approach that considers security and trust throughout the software development process. Our approach integrates two prominent software engineering approaches, one that provides a security-oriented process and one that provides a trust management process. The result is the de-velopment of a methodology that considers security and trust issues as part of its development process. Such integration represents an advance over the current state of the art by providing the ?rst effort to consider security and trust issues under a single software engineering methodology. A case study from the health domain is employed to illustrate our approach.


Author(s):  
P. Giorgini ◽  
H. Mouratidis ◽  
N. Zannone

Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter, we present an approach that considers security and trust throughout the software development process. Our approach integrates two prominent software engineering approaches, one that provides a security-oriented process and one that provides a trust management process. The result is the de-velopment of a methodology that considers security and trust issues as part of its development process. Such integration represents an advance over the current state of the art by providing the ?rst effort to consider security and trust issues under a single software engineering methodology. A case study from the health domain is employed to illustrate our approach.


2018 ◽  
Vol 108 (05) ◽  
pp. 319-324
Author(s):  
I. Bogdanov ◽  
A. Nuffer ◽  
A. Sauer

Der vorliegende Beitrag behandelt den Themenkomplex Ressourcen-effizienz und digitale Transformation im verarbeitenden Gewerbe sowie die dabei entstehenden Wechselwirkungen. Neben dem aktuellen Stand der Technik werden die im Rahmen einer aktuellen Studie durchgeführte Fallbeispielanalyse und die entwickelte Methodik zur Ermittlung der Ressourceneffizienzpotenziale vorgestellt. Diese Potenziale und die eingesetzten digitalen Maßnahmen sind zentrale Bausteine des vorliegenden Beitrags.   This article deals with the topic complex of resource efficiency and digital transformation in the manufacturing sector as well as the resulting interactions. In addition to the current state of the art and perspectives, the case study analysis carried out as part of a current study, as well as the developed method for establishing the resource efficiency potentials will be presented. The resultant potential and the digital measures are central components of this article.


Offering efficient key management scheme (KMS) in WSN faces many challenges that will significantly impact the design and implementation of security protocols for WSN. The goal of KMS is to provide an effective environment in which the sensor node can communicate in a secure manner. It should be able to resolve the issue of generate, allocate the cryptographic keys in WSN in an efficient and effective manner. Hence, the methods for trustworthy allocation and management of these keys are very important for security of WSN. Many KMSs have been developed in recent years. However inherent characteristics of a WSN make incorporating security a great challenge. This paper presents a comprehensive review of current state-of-the-art of KMS designed for WSN security and compare with respect to several evaluation metrics. This paper also investigates the security requirements, goals and challenges of KMS based on existing literature reviews. We also attempt to provide insight in to potential research trends in the area of WSN security and outline the approaches that are likely to play a very important role.


2015 ◽  
Vol 14 (4) ◽  
pp. 5621-5631
Author(s):  
AJAYI ADEBOWALE ◽  
NICULAE GOGA ◽  
OTUSILE OLUWABUKOLA ◽  
ABEL SAMUEL

Formal methods use mathematical models for analysis and verification at any part of the program life-cycle. The use of formal methods is admitted, recommended, and sometimes prescribed in safety-and security-related standards dealing, e.g., with avionics, railways, nuclear energy, and secure information systems. This paper describes the state of the art in the industrial use of formal methods ininformation security with a focus on verification of security protocols. Given the vast scope of available solutions, attention has been focused just on the most popular and most representative ones, without exhaustiveness claims. We describe some of the highlights of our survey by presenting a series of industrial projects, and we draw some observations from these surveys and records of experience. Based on this, we discuss issues surrounding the industrial adoption of formal methods in security protocol engineering.


2019 ◽  
Vol 11 (7) ◽  
pp. 2963-2986 ◽  
Author(s):  
Nikos Dipsis ◽  
Kostas Stathis

Abstract The numerous applications of internet of things (IoT) and sensor networks combined with specialized devices used in each has led to a proliferation of domain specific middleware, which in turn creates interoperability issues between the corresponding architectures and the technologies used. But what if we wanted to use a machine learning algorithm to an IoT application so that it adapts intelligently to changes of the environment, or enable a software agent to enrich with artificial intelligence (AI) a smart home consisting of multiple and possibly incompatible technologies? In this work we answer these questions by studying a framework that explores how to simplify the incorporation of AI capabilities to existing sensor-actuator networks or IoT infrastructures making the services offered in such settings smarter. Towards this goal we present eVATAR+, a middleware that implements the interactions within the context of such integrations systematically and transparently from the developers’ perspective. It also provides a simple and easy to use interface for developers to use. eVATAR+ uses JAVA server technologies enhanced by mediator functionality providing interoperability, maintainability and heterogeneity support. We exemplify eVATAR+ with a concrete case study and we evaluate the relative merits of our approach by comparing our work with the current state of the art.


Author(s):  
Kevin R. Anderson ◽  
Wael Yassine

Abstract This paper presents modeling of the Puna Geothermal Venture as a case study in understanding how the technology of geothermal can by successfully implemented. The paper presents a review of the Puna Geothermal Venture specifications, followed by simulation results carried out using NREL SAM and RETSCREEN analysis tools in order to quantify the pertinent metrics associated with the geothermal powerplant by retrofitting its current capacity of 30 MW to 60 MW. The paper closes with a review of current state-of-the art H2S abatement strategies for geothermal power plants, and presents an outline of how these technologies can be implemented at the Puna Geothermal Venture.


Designs ◽  
2018 ◽  
Vol 2 (4) ◽  
pp. 37 ◽  
Author(s):  
Charul Chadha ◽  
Kathryn Crowe ◽  
Christina Carmen ◽  
Albert Patterson

This work explores an additive-manufacturing-enabled combination-of-function approach for design of modular products. AM technologies allow the design and manufacturing of nearly free-form geometry, which can be used to create more complex, multi-function or multi-feature parts. The approach presented here replaces sub-assemblies within a modular product or system with more complex consolidated parts that are designed and manufactured using AM technologies. This approach can increase the reliability of systems and products by reducing the number of interfaces, as well as allowing the optimization of the more complex parts during the design. The smaller part count and the ability of users to replace or upgrade the system or product parts on-demand should reduce user risk, life-cycle costs, and prevent obsolescence for the user of many systems. This study presents a detailed review on the current state-of-the-art in modular product design in order to demonstrate the place, need and usefulness of this AM-enabled method for systems and products that could benefit from it. A detailed case study is developed and presented to illustrate the concepts.


2020 ◽  
Vol 34 (10) ◽  
pp. 13833-13834
Author(s):  
Anish Kachinthaya ◽  
Yi Ding ◽  
Tobias Hollerer

In this paper, we look at how depth data can benefit existing object masking methods applied in occluded scenes. Masking the pixel locations of objects within scenes helps computers get a spatial awareness of where objects are within images. The current state-of-the-art algorithm for masking objects in images is Mask R-CNN, which builds on the Faster R-CNN network to mask object pixels rather than just detecting their bounding boxes. This paper examines the weaknesses Mask R-CNN has in masking people when they are occluded in a frame. It then looks at how depth data gathered from an RGB-D sensor can be used. We provide a case study to show how simply applying thresholding methods on the depth information can aid in distinguishing occluded persons. The intention of our research is to examine how features from depth data can benefit object pixel masking methods in an explainable manner, especially in complex scenes with multiple objects.


Sign in / Sign up

Export Citation Format

Share Document