Difference between revisions of "IoTSec:T2.3"
From its-wiki.no
Line 13: | Line 13: | ||
we will build tool support for automated proofs. | we will build tool support for automated proofs. | ||
This will increase the robustness of the smart grid system. | This will increase the robustness of the smart grid system. | ||
− | + | This includes: | |
* formulating dependability and security requirements | * formulating dependability and security requirements | ||
* usage of suitable metrics of system quality and behaviour | * usage of suitable metrics of system quality and behaviour |
Revision as of 13:57, 27 August 2015
Security in IoT for Smart Grids | |||||||
---|---|---|---|---|---|---|---|
|
T2.3 Semantic Provability
Task Title | Formal technologies for semantic provability |
---|---|
WP | IoTSec:WP2 |
Lead partner | Ifi |
Leader | |
Contributors | UNIK, NR |
edit this task |
Objective
This task will establish formal technologies for semantic provability
Category:Task |
Deliverables in T2.3 Semantic Provability
Title | Due month | Lead partner | Editor | Dissemination level | |
---|---|---|---|---|---|
D2.3.1 | Semantic Provability Framework (draft) | M24 | Ifi | Olaf Owe | Public |
D2.3.2 | Semantic Provability Framework (final) | M36 | Ifi | Olaf Owe | Public |
D2.3.3 | Semantic Provability applied to Smart Grids | M48 | Ifi | Olaf Owe | Public |
Detailed objectives
The main objective is to give guarantees for relevant security properties. By utilizing automatic decision algorithms from logic and formal methods we will build tool support for automated proofs. This will increase the robustness of the smart grid system. This includes:
- formulating dependability and security requirements
- usage of suitable metrics of system quality and behaviour
- investigation of static and dynamic techniques.
Detailed work
Initial work consists of investigation of the integration of the semantic model and provability mechanisms. The next phase of the work is development of automated tools, while ensuring their usability in smart grid systems. This includes:
- investigation of permitted and malicious actions
- techniques for ensuring robustness and security properties
- investigation of time-related and probabilistic methods.
References