Abstract
Almost every day a new intelligent system is developed and connected to the Internet using a wireless network. However, there is a great number of hazards that turn them into vulnerable systems. Hackers, social engineering, software and hardware errors are the main reasons for this phenomenon. In the case of intelligent systems, the most important aspect that can be affected, in terms of security, is the communication. In this paper we present a tool, implementing an effective technique, to avoid these security problems. The main goal of the tool is to determine if the communication among different intelligent systems is unprotected and prevent unauthorized access from external actors. In order to do it, the tool allows us to check online that the observed behaviour of the systems, in a specific scenario, fulfils some properties.
Research partially supported by the Spanish MEC projects ESTuDIo and DArDOS (TIN2012-36812-C02-01 and TIN2015-65845-C3-1-R) and the Comunidad de Madrid project SICOMORo-CM (S2013/ICE-3006).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cavalli, A.R., Higashino, T., Núñez, M.: A survey on formal active and passive testing with applications to the cloud. Ann. Telecommun. 70(3–4), 85–93 (2015)
Hierons, R.M., Bogdanov, K., Bowen, J.P., Cleaveland, R., Derrick, J., Dick, J., Gheorghe, M., Harman, M., Kapoor, K., Krause, P., Luettgen, G., Simons, A.J.H., Vilkomir, S., Woodward, M.R., Zedan, H.: Using formal specifications to support testing. ACM Comput. Surv. 41(2), 9 (2009)
Andrés, C., Merayo, M.G., Núñez, M.: Formal passive testing of timed systems: theory and tools. Softw. Test. Verification Reliab. 22(6), 365–405 (2012)
Bayse, E., Cavalli, A., Núñez, M., Zadi, F.: A passive testing approach based on invariants: application to the WAP. Comput. Netw. 48(2), 247–266 (2005)
Cavalli, A., Gervy, C., Prokopenko, S.: New approaches for passive testing using an extended finite state machine specification. Inf. Softw. Technol. 45(12), 837–852 (2003)
Lee, D., Netravali, A.N., Sabnani, K.K., Sugla, B., John, A.: Passive testing and applications to network management. In: 5th IEEE International Conference on Network Protocols, ICNP’97, pp. 113–122. IEEE Computer Society (1997)
Hierons, R.M., Merayo, M.G., Núñez, M.: Passive testing with asynchronous communications. In: IFIP 33rd International Conference on Formal Techniques for Distributed Systems, FMOODS/FORTE’13, LNCS 7892, pp. 99–113. Springer, Berlin (2013)
Lamport, L.: Who builds a house without drawing blueprints? Commun. ACM 58(4), 38–41 (2015)
Statista.: Number of mobile phone users worldwide from 2012 to 2018 (2015). http://www.statista.com/statistics/274774/forecast-of-mobile-phone-users-worldwide/
Statista.: Market share worldwide smartphone shipments by operating system from 2014 to 2019 (2015). http://www.statista.com/statistics/272307/market-share-forecast-for-smartphone-operating-systems/
Thompson, S.T.C.: Helping the hacker? Library information, security, and social engineering. Inf. Technol. Libr. 25(4), 222–225 (2013)
Stajano, F., Wilson, P.: Understanding scam victims: seven principles for systems security. Commun. ACM 54(3), 70–75 (2011)
Padmavathi, G., Shanmugapriya, D.: A survey of attacks, security mechanisms and challenges in wireless sensor networks. Int. J. Comput. Sci. Inf. Secur. (2009)
Harris, B., Hunt, R.: TCP/IP security threats and attack methods. Comput. Commun. 22(10), 885–897 (1999)
Gregorio, C., Núñez, M.: Denotational semantics for probabilistic refusal testing. In: Workshop on Probabilistic Methods in Verification, PROBMIV’98, ENTCS 22. Elsevier (1999)
Hierons, R.M., Merayo, M.G.: Mutation testing from probabilistic and stochastic finite state machines. J. Syst. Softw. 82(11), 1804–1818 (2009)
Hierons, R.M., Merayo, M.G., Núñez, M.: Testing from a stochastic timed system with a fault model. J. Logic Algebraic Program. 78(2), 98–115 (2009)
Hierons, R.M., Merayo, M.G., Núñez, M.: Implementation relations and test generation for systems with distributed interfaces. Distrib. Comput. 25(1), 35–62 (2012)
Hierons, R.M., Merayo, M.G., Núñez, M.: Timed implementation relations for the distributed test architecture. Distrib. Comput. 27(3), 181–201 (2014)
López, N., Núñez, M., Rodrguez, I.: Specification, testing and implementation relations for symbolic-probabilistic systems. Theor. Comput. Sci. 353(1–3), 228–248 (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Camacho, A., Cañizares, P.C., Merayo, M.G. (2016). Intelligent Secure Communications Between Systems. In: Król, D., Madeyski, L., Nguyen, N. (eds) Recent Developments in Intelligent Information and Database Systems. Studies in Computational Intelligence, vol 642. Springer, Cham. https://doi.org/10.1007/978-3-319-31277-4_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-31277-4_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-31276-7
Online ISBN: 978-3-319-31277-4
eBook Packages: EngineeringEngineering (R0)