Verifying Interoperability Requirements in Pervasive Systems

Lead Research Organisation: University of Birmingham
Department Name: School of Computer Science

Abstract

The success of pervasive computing depends crucially on the ability to build, maintain and augment interoperable systems: components from different manufacturers built at different times are required to interact to achieve the user's overall goals.Pervasive systems often contain devices which must operate in very different environments and connect together in different ways, e.g., over ad-hoc wireless connections to a variety of systems, and still satisfy all the desired security and performance properties. Our approach to verifying these properties is to identify interoperability requirements for the interaction between the devices and their environment. These requirements introduce also an important layer of abstraction because they allow modularity in the verification process: it suffices to show that each mobile device or fixed component meets the interoperability requirements, and that the interoperability requirements entail the desired high-level properties.We argue that this verification framework makes it possible to adapt and extend techniques (such as model checking and process algebras) which have traditionally been used for verifying properties of small homogeneous systems, to large heterogenous systems. To support this thesis, we will develop techniques to verify properties concerning important aspects of heterogenous systems' security, individual and collective behaviour, performance and privacy. We will use the formal techniques to verify the consequent interoperability requirements, and evaluate their effectiveness through case studies.Note that our focus is on the verification of designs; in particular we focus on the design of basic component behaviours and the protocols which dictate access to them and interaction between them. It is important to note our intention is not to develop pervasive computing systems as such, but rather to draw motivation from, and test our ideas in, a number of planned and existing systems.Three case studies are planned; two are with industrial collaborators. The case studies will be drawn from three layers typical within pervasive systems: application, infrastructure and network. One industrial case study will be a healthcare application. One of its crucial features is the need for the monitoring device to operate in different environments. Hence a careful analysis of the necessary interoperability requirements is mandatory for this application. We will develop and apply our techniques as the system is designed, thus influencing directly the design of the application, motivating our techniques as we develop them, and gaining real life experience of applying our techniques in the field. In addition, our past experience indicates that we will also bring in further case studies, as the project develops. Drawing on the variety of expertise of the members of the consortium, we hope to make a step change in verification technology by developing novel techniques and learning which techniques are most effective in different contexts. The outcomes will directly benefit system designers, and indirectly, end users. They will include techniques applicable to a wide range of application domains, and results and lessons learned from three specific applications including a healthcare data capture system and RFID system infrastructure.
 
Title The Trusted Platform Module 
Description Video describing the trusted platform module and its functionality. 
Type Of Art Film/Video/Animation 
Year Produced 2009 
Impact Many enquiries about the TPM. 
URL http://www.youtube.com/watch?v=ukaHxHYAlDc
 
Description Framework for analysing various aspects of pervasive systems.

Formal characterisation of unlinkability and comparison with anonymity and other forms of privacy for pervasive systems.

Analysis of protocols from mobile telephony, RFID and trusted computing in terms of such characterisation.

Development of theory and automated tool "StatVerif" for analysing protocols involving persistent state, such as those found in mobile telephony, RFID, trusted computing, web services and databases.

Applica
Exploitation Route Research has been used to inform designers of the trusted platform module about vulnerabilities in their design and recommendations of how to fix it.

Research has been used to inform designers of mobile 'phone protocols about weaknesses concerning user privacy, and recommendations of how to fix it.

Research can be used to inform designers of other kinds of protocols in pervasive systems.

StatVerif will be used by academics and industry interested in performing automatic analysis of protocol involving persistent state.
Sectors Creative Economy,Digital/Communication/Information Technologies (including Software),Financial Services, and Management Consultancy,Government, Democracy and Justice,Security and Diplomacy,Other

 
Description Adoption by Trusted Computing Group (industry consortium) of our SKAP protocol for secure authentication to TPM. This is expected to be deployed in hundreds of millions of devices. Beneficiaries: Computer scientists, computer manufacturers, computer users, software engineers Contribution Method: Adoption by Trusted Computing Group (industry consortium) of our SKAP protocol for secure authentication to TPM. This is expected to be deployed in hundreds of millions of devices. Was used as a REF 2014 impact case study.
Sector Digital/Communication/Information Technologies (including Software),Government, Democracy and Justice,Security and Diplomacy,Other
Impact Types Societal,Economic

 
Description Microsoft gift
Amount $45,000 (USD)
Organisation Microsoft Corporation 
Sector Public
Country United States
Start 04/2010 
 
Description SCEPTICS: A SystematiC Evaluation Process for Threats to Industrial Control Systems
Amount £395,222 (GBP)
Funding ID EP/M002845/1 
Organisation Engineering and Physical Sciences Research Council (EPSRC) 
Sector Public
Country United Kingdom
Start 10/2014 
End 09/2017
 
Title StatVerif 
Description StatVerif is a software tool for analysing the security protocols of stateful protocols. It builds upon another well known tool called ProVerif 
Type Of Technology Software 
Year Produced 2011 
Impact Papers in journals and conferences 
 
Description Formal Protocol Verification Applied 
Form Of Engagement Activity Participation in an activity, workshop or similar
Part Of Official Scheme? Yes
Type Of Presentation workshop facilitator
Geographic Reach International
Primary Audience Professional Practitioners
Results and Impact Co-Chair of Formal Protocol Verification Applied, Dagstul, 14 - 19 October 2007

Seminar proceedings
Year(s) Of Engagement Activity 2007