Smart City Gnosys

Smart city article details

Title Formal Verification Of M2M Nodes For Secure Communications
ID_Doc 26925
Authors Sekhar K.R.; Murthy B.S.; Rao B.N.; Subash M.V.K.
Year 2025
Published Integrated Technologies in Electrical, Electronics and Biotechnology Engineering
DOI http://dx.doi.org/10.1201/9781003606208-42
Abstract The rapid proliferation of machine-to-machine (M2M) communications has transformed numerous sectors, ranging from industrial automation to smart cities. However, the increasing connectivity among autonomous devices raises significant security concerns, particularly regarding the integrity and confidentiality of the exchanged data. This paper explores the application of formal verification techniques to M2M nodes to ensure secure communications. By employing model checking and theorem proving methods, we systematically analyze the behavior of M2M nodes to detect and mitigate vulnerabilities that could be exploited by malicious entities. The formal models developed capture the critical security properties such as authentication, data integrity, and confidentiality. The results demonstrate that formal verification provides a rigorous framework for identifying and resolving security flaws, thereby enhancing the overall resilience of M2M networks against potential cyber threats. This research highlights the importance of integrating formal methods in the design and deployment of secure M2M communication systems, paving the way for more robust and trustworthy autonomous networks. © 2025 selection and editorial matter, Gaurav Aggarwal, Ashutosh Tripathi, Himani Goyal Sharma, Tripti Sharma and Rishabh Dev Shukla; individual chapters, the contributors.
Author Keywords Authentication; M2M networks; security


Similar Articles


Id Similarity Authors Title Published
5037 View0.857Ahmad R.H.; Khan Pathan A.-S.A Study On M2M (Machine To Machine) System And Communication: Its Security, Threats, And Intrusion Detection SystemThe Internet of Things: Breakthroughs in Research and Practice (2017)
5038 View0.851Ahmad R.H.; Pathan A.-S.K.A Study On M2M (Machine To Machine) System And Communication: Its Security, Threats, And Intrusion Detection SystemSecurity Solutions and Applied Cryptography in Smart Grid Communications (2016)