Skip to main content

Intelligent Secure Communications Between Systems

  • Chapter
  • First Online:
  • 953 Accesses

Part of the book series: Studies in Computational Intelligence ((SCI,volume 642))

Abstract

Almost every day a new intelligent system is developed and connected to the Internet using a wireless network. However, there is a great number of hazards that turn them into vulnerable systems. Hackers, social engineering, software and hardware errors are the main reasons for this phenomenon. In the case of intelligent systems, the most important aspect that can be affected, in terms of security, is the communication. In this paper we present a tool, implementing an effective technique, to avoid these security problems. The main goal of the tool is to determine if the communication among different intelligent systems is unprotected and prevent unauthorized access from external actors. In order to do it, the tool allows us to check online that the observed behaviour of the systems, in a specific scenario, fulfils some properties.

Research partially supported by the Spanish MEC projects ESTuDIo and DArDOS (TIN2012-36812-C02-01 and TIN2015-65845-C3-1-R) and the Comunidad de Madrid project SICOMORo-CM (S2013/ICE-3006).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Cavalli, A.R., Higashino, T., Núñez, M.: A survey on formal active and passive testing with applications to the cloud. Ann. Telecommun. 70(3–4), 85–93 (2015)

    Article  Google Scholar 

  2. Hierons, R.M., Bogdanov, K., Bowen, J.P., Cleaveland, R., Derrick, J., Dick, J., Gheorghe, M., Harman, M., Kapoor, K., Krause, P., Luettgen, G., Simons, A.J.H., Vilkomir, S., Woodward, M.R., Zedan, H.: Using formal specifications to support testing. ACM Comput. Surv. 41(2), 9 (2009)

    Google Scholar 

  3. Andrés, C., Merayo, M.G., Núñez, M.: Formal passive testing of timed systems: theory and tools. Softw. Test. Verification Reliab. 22(6), 365–405 (2012)

    Article  Google Scholar 

  4. Bayse, E., Cavalli, A., Núñez, M., Zadi, F.: A passive testing approach based on invariants: application to the WAP. Comput. Netw. 48(2), 247–266 (2005)

    Article  MATH  Google Scholar 

  5. Cavalli, A., Gervy, C., Prokopenko, S.: New approaches for passive testing using an extended finite state machine specification. Inf. Softw. Technol. 45(12), 837–852 (2003)

    Article  Google Scholar 

  6. Lee, D., Netravali, A.N., Sabnani, K.K., Sugla, B., John, A.: Passive testing and applications to network management. In: 5th IEEE International Conference on Network Protocols, ICNP’97, pp. 113–122. IEEE Computer Society (1997)

    Google Scholar 

  7. Hierons, R.M., Merayo, M.G., Núñez, M.: Passive testing with asynchronous communications. In: IFIP 33rd International Conference on Formal Techniques for Distributed Systems, FMOODS/FORTE’13, LNCS 7892, pp. 99–113. Springer, Berlin (2013)

    Google Scholar 

  8. Lamport, L.: Who builds a house without drawing blueprints? Commun. ACM 58(4), 38–41 (2015)

    Article  Google Scholar 

  9. Statista.: Number of mobile phone users worldwide from 2012 to 2018 (2015). http://www.statista.com/statistics/274774/forecast-of-mobile-phone-users-worldwide/

  10. Statista.: Market share worldwide smartphone shipments by operating system from 2014 to 2019 (2015). http://www.statista.com/statistics/272307/market-share-forecast-for-smartphone-operating-systems/

  11. Thompson, S.T.C.: Helping the hacker? Library information, security, and social engineering. Inf. Technol. Libr. 25(4), 222–225 (2013)

    Google Scholar 

  12. Stajano, F., Wilson, P.: Understanding scam victims: seven principles for systems security. Commun. ACM 54(3), 70–75 (2011)

    Article  Google Scholar 

  13. Padmavathi, G., Shanmugapriya, D.: A survey of attacks, security mechanisms and challenges in wireless sensor networks. Int. J. Comput. Sci. Inf. Secur. (2009)

    Google Scholar 

  14. Harris, B., Hunt, R.: TCP/IP security threats and attack methods. Comput. Commun. 22(10), 885–897 (1999)

    Article  Google Scholar 

  15. Gregorio, C., Núñez, M.: Denotational semantics for probabilistic refusal testing. In: Workshop on Probabilistic Methods in Verification, PROBMIV’98, ENTCS 22. Elsevier (1999)

    Google Scholar 

  16. Hierons, R.M., Merayo, M.G.: Mutation testing from probabilistic and stochastic finite state machines. J. Syst. Softw. 82(11), 1804–1818 (2009)

    Article  Google Scholar 

  17. Hierons, R.M., Merayo, M.G., Núñez, M.: Testing from a stochastic timed system with a fault model. J. Logic Algebraic Program. 78(2), 98–115 (2009)

    Article  MATH  Google Scholar 

  18. Hierons, R.M., Merayo, M.G., Núñez, M.: Implementation relations and test generation for systems with distributed interfaces. Distrib. Comput. 25(1), 35–62 (2012)

    Article  MATH  Google Scholar 

  19. Hierons, R.M., Merayo, M.G., Núñez, M.: Timed implementation relations for the distributed test architecture. Distrib. Comput. 27(3), 181–201 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  20. López, N., Núñez, M., Rodrguez, I.: Specification, testing and implementation relations for symbolic-probabilistic systems. Theor. Comput. Sci. 353(1–3), 228–248 (2006)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Azahara Camacho .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Camacho, A., Cañizares, P.C., Merayo, M.G. (2016). Intelligent Secure Communications Between Systems. In: Król, D., Madeyski, L., Nguyen, N. (eds) Recent Developments in Intelligent Information and Database Systems. Studies in Computational Intelligence, vol 642. Springer, Cham. https://doi.org/10.1007/978-3-319-31277-4_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31277-4_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31276-7

  • Online ISBN: 978-3-319-31277-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics