6533b862fe1ef96bd12c74a3
RESEARCH PRODUCT
Applying Finite State Process Algebra to Formally Specify a Computational Model of Security Requirements in the Key2phone-Mobile Access Solution
Juha KelaSunil ChaudharyLinfeng LiMarko HeleniusEleni BerkiEleni BerkiTurunen Markkusubject
Structure (mathematical logic)Theoretical computer scienceFinite-state machineComputer sciencebusiness.industryMobile phoneRealisationProcess calculusTransition systemKey (cryptography)Software engineeringbusinessNotationdescription
Key2phone is a mobile access solution which turns mobile phone into a key for electronic locks, doors and gates. In this paper, we elicit and analyse the essential and necessary safety and security requirements that need to be considered for the Key2phone interaction system. The paper elaborates on suggestions/solutions for the realisation of safety and security concerns considering the Internet of Things (IoT) infrastructure. The authors structure these requirements and illustrate particular computational solutions by deploying the Labelled Transition System Analyser (LTSA), a modelling tool that supports a process algebra notation called Finite State Process (FSP). While determining an integrated solution for this research study, the authors point to key quality factors for successful system functionality.
year | journal | country | edition | language |
---|---|---|---|---|
2015-01-01 |