6533b862fe1ef96bd12c74a3

RESEARCH PRODUCT

Applying Finite State Process Algebra to Formally Specify a Computational Model of Security Requirements in the Key2phone-Mobile Access Solution

Juha KelaSunil ChaudharyLinfeng LiMarko HeleniusEleni BerkiEleni BerkiTurunen Markku

subject

Structure (mathematical logic)Theoretical computer scienceFinite-state machineComputer sciencebusiness.industryMobile phoneRealisationProcess calculusTransition systemKey (cryptography)Software engineeringbusinessNotation

description

Key2phone is a mobile access solution which turns mobile phone into a key for electronic locks, doors and gates. In this paper, we elicit and analyse the essential and necessary safety and security requirements that need to be considered for the Key2phone interaction system. The paper elaborates on suggestions/solutions for the realisation of safety and security concerns considering the Internet of Things (IoT) infrastructure. The authors structure these requirements and illustrate particular computational solutions by deploying the Labelled Transition System Analyser (LTSA), a modelling tool that supports a process algebra notation called Finite State Process (FSP). While determining an integrated solution for this research study, the authors point to key quality factors for successful system functionality.

https://doi.org/10.1007/978-3-319-19458-5_9