Security Implementation and Verification in Smart Buildings

The homes are dangerous environments like outside since it contains risks affect on the life of the inhabitant (humidity, temperature, noise, light, etc.), especially with the increase of the attention on smart homes and buildings in the previous few years where studies focused on the IoT domain exclude partially these risks. Smart homes/buildings are equipped with IoT objects that capture the conflicting changes in a controlled manner and introduce actions that stop or declare the existing threats. A mechanism that guarantees to the inhabitant a stable and comfortable life is more than mandatory. In this context, we propose a global approach that defines the architecture of a smart home/building by formalizing the main nodes (sensors, actuator, server, etc.) and the technologies that bind them. Further, we define the characteristics and the functioning of nodes by a formal representation in the form of state machines, the applicable norms to build a secure environment, and further the security measures that must respect them in order to guarantee a protected environment. We finished our study by experimentation with Uppaal, a verification and validation tool, to ensure the accuracy of the system operations that showed a satisfactory results.

[1]  Arnold Janssens,et al.  Effect of moisture inertia models on the predicted indoor humidity in a room , 2005 .

[2]  C. Lakshmi Devasena IPv6 Low Power Wireless Personal Area Network (6LoWPAN) for Networking Internet of Things (IoT) – Analyzing its Suitability for IoT , 2016 .

[3]  Vidyasagar Potdar,et al.  Energy conservation in a smart home , 2011, 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011).

[4]  G. Geetha,et al.  Cryptographic Hash Functions: A Review , 2012 .

[5]  Pramod Anantharam,et al.  Semantic Gateway as a Service Architecture for IoT Interoperability , 2014, 2015 IEEE International Conference on Mobile Services.

[6]  António Manuel Santos Pascoal,et al.  Optimal Sensor Placement for Multiple Target Positioning with Range-Only Measurements in Two-Dimensional Scenarios , 2013, Sensors.

[7]  Andrea Zanella,et al.  Long-range communications in unlicensed bands: the rising stars in the IoT and smart city scenarios , 2015, IEEE Wireless Communications.

[8]  Evangelos Theodoridis,et al.  SmartSantander: IoT experimentation over a smart city testbed , 2014, Comput. Networks.

[9]  Xi Wang,et al.  Design and Implementation of Push Notification System Based on the MQTT Protocol , 2013, ISCA 2013.

[10]  Ramjee Prasad,et al.  Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT) , 2010, CNSA.

[11]  Qian Zhu,et al.  IOT Gateway: BridgingWireless Sensor Networks into Internet of Things , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[12]  D. Richard Kuhn,et al.  Role-Based Access Controls , 2009, ArXiv.

[13]  Robert J. Piechocki,et al.  On Predicting the Battery Lifetime of IoT Devices: Experiences from the SPHERE Deployments , 2018, RealWSN@SenSys.

[14]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[15]  Thomas Kunz,et al.  Performance evaluation of IoT protocols under a constrained wireless access network , 2016, 2016 International Conference on Selected Topics in Mobile & Wireless Networking (MoWNeT).

[16]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[17]  Jean-François Blanchette The digital signature dilemma Le dilemme de la signature numérique , 2006 .

[18]  Jürgen Schönwälder,et al.  Management of resource constrained devices in the internet of things , 2012, IEEE Communications Magazine.

[19]  Eui-nam Huh,et al.  Fog Computing Micro Datacenter Based Dynamic Resource Estimation and Pricing Model for IoT , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications.

[20]  E. Spyrou,et al.  Creating a Smart Room using an IoT approach , 2016 .

[21]  Sneha A. Dalvi,et al.  Internet of Things for Smart Cities , 2017 .

[22]  Olga Galinina,et al.  Understanding the IoT connectivity landscape: a contemporary M2M radio technology roadmap , 2015, IEEE Communications Magazine.

[23]  Guangyi Xiao,et al.  User Interoperability With Heterogeneous IoT Devices Through Transformation , 2014, IEEE Transactions on Industrial Informatics.

[24]  Samir Ouchani,et al.  Ensuring the Functional Correctness of IoT through Formal Modeling and Verification , 2018, MEDI.

[25]  Sergey Balandin,et al.  Deployment of Smart Spaces in Internet of Things: Overview of the Design Challenges , 2013, NEW2AN.

[26]  Avishai Wool,et al.  A quantitative study of firewall configuration errors , 2004, Computer.