A State-of-the-Art Survey on Formal Verification of the Internet of Things Applications

In recent years, Internet of Things (IoT) has been one of the most popular technologies that facilitate new interactions among things and humans to enhance the quality of life. With the rapid development of the IoT, Industrial and enterprise IoT are emerging as an attractive solution for processing the IoT applications. On the other hand, due to the guarantee of safety-critical conditions without system failures in smart devices, formal verification approaches are essential to manage and evaluate critical failures and reachable status in these problems. In this paper, a review of the formal verification approaches in the IoT applications is presented to recognize the state-of-the-art mechanisms on this important topic. The formal verification approaches of the IoT environments are compared with each other according to the advantages and limitations.

[1]  Nadeem Javaid,et al.  Fog Computing Over IoT: A Secure Deployment and Formal Verification , 2017, IEEE Access.

[2]  Mansoor Ahmed,et al.  Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks , 2017, Future Gener. Comput. Syst..

[3]  Nima Jafari Navimipour,et al.  Formal verification approaches in the web service composition: A comprehensive analysis of the current challenges for future research , 2018, Int. J. Commun. Syst..

[4]  Amir Masoud Rahmani,et al.  Service composition approaches in IoT: A systematic review , 2018, J. Netw. Comput. Appl..

[5]  Alireza Souri,et al.  Software as a service based CRM providers in the cloud computing: Challenges and technical issues , 2017, J. Serv. Sci. Res..

[6]  Valeriy Vyatkin,et al.  Towards formal verification for cyber-physically agnostic software: A case study , 2017, IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society.

[7]  Woo-Sik Bae Verifying a secure authentication protocol for IoT medical devices , 2017, Cluster Computing.

[8]  David Broman,et al.  A Toolkit for Construction of Authorization Service Infrastructure for the Internet of Things , 2017, 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI).

[9]  Meenakshi D'Souza,et al.  A Framework for Modeling and Verifying IoT Communication Protocols , 2017, SETTA.

[10]  Benjamin Aziz,et al.  A formal model and analysis of an IoT protocol , 2016, Ad Hoc Networks.

[11]  Amir Masoud Rahmani,et al.  Internet of Things applications: A systematic review , 2019, Comput. Networks.

[12]  Junliang Chen,et al.  Constructing scalable Internet of Things services based on their event‐driven models , 2015, Concurr. Comput. Pract. Exp..

[13]  Shabir Ahmad,et al.  Towards the Design of a Formal Verification and Evaluation Tool of Real-Time Tasks Scheduling of IoT Applications , 2019, Sustainability.

[14]  Amir Masoud Rahmani,et al.  A moth‐flame optimization algorithm for web service composition in cloud computing: Simulation and verification , 2018, Softw. Pract. Exp..

[15]  Sofiène Tahar,et al.  Formal Probabilistic Analysis of a WSN-Based Monitoring Framework for IoT Applications , 2016, FTSCS.

[16]  Divya Saxena,et al.  Design and Verification of an NDN-Based Safety-Critical Application: A Case Study With Smart Healthcare , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[17]  Nima Jafari Navimipour,et al.  Formal modeling and verification of a service composition approach in the social customer relationship management system , 2019, Inf. Technol. People.

[18]  Yuichi Nishiwaki,et al.  F-Calculus: A Universal Programming Language of Self-Stabilizing Computational Fields , 2016, 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W).

[19]  Ruggero Lanotte,et al.  A Semantic Theory for the Internet of Things , 2015, Inf. Comput..

[20]  Samir Tata,et al.  Formal Model and Method to Decompose Process-Aware IoT Applications , 2017, OTM Conferences.

[21]  Kun-Hee Han,et al.  Proposing and verifying a security-enhanced protocol for IoT-based communication for medical devices , 2016, Cluster Computing.

[22]  Robertas Damasevicius,et al.  Modelling of Internet of Things units for estimating security-energy-performance relationships for quality of service and environment awareness , 2016, Secur. Commun. Networks.

[23]  Hyun Jung La,et al.  A conceptual framework for trajectory-based medical analytics with IoT contexts , 2016, J. Comput. Syst. Sci..

[24]  Yu Li,et al.  Frequency-domain channel equalisation for LTE-based uplink narrowband Internet of Things systems , 2019, IET Commun..

[25]  Anas Abou El Kalam,et al.  FairAccess: a new Blockchain-based access control framework for the Internet of Things , 2016, Secur. Commun. Networks.

[26]  Sheetal Kalra,et al.  A lightweight biometrics based remote user authentication scheme for IoT services , 2017, J. Inf. Secur. Appl..

[27]  Mario Cagalj,et al.  LISA: Visible light based initialization and SMS based authentication of constrained IoT devices , 2019, Future Gener. Comput. Syst..

[28]  Nima Jafari Navimipour,et al.  A symbolic model checking approach in formal verification of distributed systems , 2019, Human-centric Computing and Information Sciences.

[29]  Nima Jafari Navimipour,et al.  A model checking approach for user relationship management in the social network , 2019, Kybernetes.

[30]  Sheetal Kalra,et al.  Secure multi‐factor remote user authentication scheme for Internet of Things environments , 2017, Int. J. Commun. Syst..

[31]  Zahid Anwar,et al.  IoTRiskAnalyzer: A Probabilistic Model Checking Based Framework for Formal Risk Analytics of the Internet of Things , 2017, IEEE Access.

[32]  Igor V. Kotenko,et al.  Automated design, verification and testing of secure systems with embedded devices based on elicitation of expert knowledge , 2016, Journal of Ambient Intelligence and Humanized Computing.

[33]  Tongquan Wei,et al.  Quantitative Analysis of Variation-Aware Internet of Things Designs Using Statistical Model Checking , 2016, 2016 IEEE International Conference on Software Quality, Reliability and Security (QRS).

[34]  Merve Astekin,et al.  Provenance aware run‐time verification of things for self‐healing Internet of Things applications , 2019, Concurr. Comput. Pract. Exp..

[35]  Florian Kammüller,et al.  Formal Modeling and Analysis with Humans in Infrastructures for IoT Health Care Systems , 2017, HCI.

[36]  Zhigang Chen,et al.  Workload scheduling toward worst-case delay and optimal utility for single-hop Fog-IoT architecture , 2018, IET Commun..

[37]  Nikolai Kosmatov,et al.  Formal Verification of a Memory Allocation Module of Contiki with Frama-C: A Case Study , 2016, CRiSIS.

[38]  Florian Kammüller,et al.  Human Centric Security and Privacy for the IoT Using Formal Techniques , 2017, AHFE.