A method and device for security verification of a smart home Internet of Things system under attack
An Internet of Things system and security verification technology, which is applied in the field of security evaluation and verification of the smart home Internet of Things system, can solve the problems of the complex situation of smart home equipment and the inability to verify the security of the smart home system, and achieve the effect of good adaptability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] The present invention will be described in further detail below in conjunction with the accompanying drawings.
[0030] A method for security verification of a smart home Internet of Things system under attack of the present invention comprises the following steps:
[0031] S1: data acquisition step;
[0032] S2: Construction steps of finite automata model;
[0033] S3: Formal specification construction steps;
[0034] S4: Model description document content construction steps;
[0035] S5: The step of verifying the system security by the model checking tool;
[0036] S6: A step of finding out the smart home devices and related IFTTT rules that cause the system to be unsafe.
[0037] The "data" in the step S1 of data acquisition consists of three parts: the first part is the description information of smart home devices, the second part is the IFTTT rules between smart home devices, and the third part is the prohibited behavior parameters of attack intensity devices....
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


