Hybrid Access Control Model for IoT Environments: Formalization and Verification Using Timed Automata

被引:0
作者
Mohammed Walid Krakallah [1 ]
Safia Nait-Bahloul [2 ]
机构
[1] Department of Mathematics and Computer Science, Faculty of Exact Sciences And Computer Science, University Abdelhamid Ibn Badis, Mostaganem
[2] Litio Laboratory, University Oran1 Ahmed Ben Bella, BP 1524, El-M’Naour, Oran
关键词
Access control; CTL; E-UACML; Formal verification; IoT; Timed automata;
D O I
10.1007/s42979-025-03674-2
中图分类号
学科分类号
摘要
The Internet of Things (IoT) represents a technological revolution by enabling the interconnection of multiple devices and systems. With this expansion of connected objects, security issues, particularly in access control, become paramount. Due to their complexity and diversity, IoT environments require sophisticated, dynamic, and flexible access control models capable of addressing their specific constraints. This article formalizes and extends the E-UACML model (Emergency Unified Access Control Modelling Language) for IoT environments. Using formal verification techniques, we translate E-UACML into timed automata to validate its properties with the UPPAAL tool. Timed automata enable the integration of timing and synchronization, which are essential for verifying spatio-temporal constraints in IoT systems. Verification, carried out through Computation Tree Logic (CTL), ensures that access control policies meet rigorous security requirements, including spatio-temporal constraints. The results demonstrate the effectiveness of this approach in ensuring flexible and secure access control in IoT environments. © The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd. 2025.
引用
收藏
相关论文
共 50 条
  • [1] VERIFICATION OF A FIELDBUS SCHEDULING PROTOCOL USING TIMED AUTOMATA
    Petalidis, Nicholaos
    COMPUTING AND INFORMATICS, 2009, 28 (05) : 655 - 672
  • [2] An adaptive distributed access control model for IoT and fog computing environments
    Charaf, Lalla Amina
    Alihamidi, Imam
    Deroussi, Anass
    Madi, Abdessalam Ait
    Addaim, Adnane
    Charaf, Moulay El Hassan
    INTERNATIONAL JOURNAL OF MODELLING IDENTIFICATION AND CONTROL, 2024, 44 (03) : 230 - 245
  • [3] Formal Verification of Sequence Diagram with State Invariants Using Timed Automata
    Thitareedechakul, Supapitch S.
    Vatanawood, Wiwat
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON COMPUTING AND INFORMATION TECHNOLOGY, IC2IT 2024, 2024, 973 : 43 - 54
  • [4] Access control in IoT environments: Feasible scenarios
    Andaloussi, Y.
    El Ouadghiri, M. D.
    Maurel, Y.
    Bonnin, J. M.
    Chaoui, H.
    9TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2018) / THE 8TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2018) / AFFILIATED WORKSHOPS, 2018, 130 : 1031 - 1036
  • [5] Deadline Verification for Web Services Using Timed Automata
    El Touati, Yamen
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2022, 12 (01) : 8013 - 8016
  • [6] Timed verification of the generic architecture of a memory circuit using parametric timed automata
    Chevallier, Remy
    Encrenaz-Tiphene, Emmanuelle
    Fribourg, Laurent
    Xu, Weiwen
    FORMAL METHODS IN SYSTEM DESIGN, 2009, 34 (01) : 59 - 81
  • [7] Pervasive-Based Access Control Model for IoT Environments
    El Bouanani, Salim
    El Kiram, My Ahmed
    Achbarou, Omar
    Outchakoucht, Aissam
    IEEE ACCESS, 2019, 7 : 54575 - 54585
  • [8] Formal verification of multitasking applications based on timed automata model
    Libor Waszniowski
    Zdeněk Hanzálek
    Real-Time Systems, 2008, 38 : 39 - 65
  • [9] Formal verification of multitasking applications based on timed automata model
    Waszniowski, Libor
    Hanzalek, Zdenek
    REAL-TIME SYSTEMS, 2008, 38 (01) : 39 - 65
  • [10] An Access Control Scheme Using Heterogeneous Signcryption for IoT Environments
    Ullah, Insaf
    Zahid, Hira
    Algarni, Fahad
    Khan, Muhammad Asghar
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (03): : 4307 - 4321