You do not have permission to edit this page, for the following reason:
The action you have requested is limited to users in the group: Users.
Project description (free text)
Give a concise project description. Include:
Potential security vulnerabilities of IIoTs platform connectivity protocols, such as CoAP and MQTT will be studied. Then, these protocols will be analyzed using a formal security analysis tool, such as Scyther. The formal model will help reveal unreported flaws in the IIoT connectivity protocols, and consequently, improvement in such protocols can be introduced. These improvements should take into consideration the constrained nature of IIoT in terms of memory, processing power, and energy consumption. The Scyther model will present practical illustrations for such protocols that can be formally examined and investigated against predefined security claims.
Summary:
This is a minor edit Watch this page
Cancel
Home
Research
Education
Partners
People
Contact