Automated Analysis of Secure Internet of Things Protocols

被引:19
|
作者
Kim, Jun Young [1 ,2 ]
Holz, Ralph [3 ]
Hu, Wen [1 ]
Jha, Sanjay [1 ]
机构
[1] UNSW Australia, Data61, CSIRO, Sydney, NSW, Australia
[2] WBS Technol, Sydney, NSW, Australia
[3] Univ Sydney, Sydney, NSW, Australia
基金
澳大利亚研究理事会;
关键词
D O I
10.1145/3134600.3134624
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Formal security analysis has proven to be a useful tool for tracking modifications in communication protocols in an automated manner, where full security analysis of revisions requires minimum efforts. In this paper, we formally analysed prominent IoT protocols and uncovered many critical challenges in practical IoT settings. We address these challenges by using formal symbolic modelling of such protocols under various adversaries and security goals. Furthermore, this paper extends formal analysis to cryptographic Denial-of-Service (DoS) attacks and demonstrates that a vast majority of IoT protocols are vulnerable to such resource exhaustion attacks. We present a cryptographic DoS attack countermeasure that can be generally used in many IoT protocols. Our study of prominent IoT protocols such as CoAP and MQTT shows the benefits of our approach.
引用
收藏
页码:238 / 249
页数:12
相关论文
共 50 条
  • [1] Survey on secure communication protocols for the Internet of Things
    Kim Thuat Nguyen
    Laurent, Maryline
    Oualha, Nouha
    AD HOC NETWORKS, 2015, 32 : 17 - 31
  • [2] Design and implementation of secure communication protocols for Internet of Things systems
    Bassole, Didier
    Kabore, Kisito K.
    Traore, Yaya
    Sie, Oumarou
    Ben Sta, Hatem
    2019 5TH IEEE INTERNATIONAL SMART CITIES CONFERENCE (IEEE ISC2 2019), 2019, : 112 - 117
  • [3] Routing Protocols Analysis for Internet of Things
    Xin, Hua-Mei
    Yang, Kun
    2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING ICISCE 2015, 2015, : 447 - 450
  • [4] Analysis of Application Layer Protocols in Internet of Things
    Sasirekha, S.
    Swamynathan, S.
    Chandini, S.
    Keerthana, K.
    ADVANCES IN COMPUTING AND DATA SCIENCES, ICACDS 2016, 2017, 721 : 550 - 561
  • [5] Taxonomy and analysis of security protocols for Internet of Things
    Das, Ashok Kumar
    Zeadally, Sherali
    He, Debiao
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 89 : 110 - 125
  • [6] AN ANALYSIS OF ROUTING PROTOCOLS IN MANETS AND INTERNET OF THINGS
    Thebiga, M.
    Pramila, R. Suji
    2017 IEEE INTERNATIONAL CONFERENCE ON IOT AND ITS APPLICATIONS (IEEE ICIOT), 2017,
  • [7] Review of Internet of Things security protocols - A Bibliometric Analysis
    Mwansa, Gardner
    Mabanza, Ntima
    2023 25TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, ICACT, 2023, : 394 - 400
  • [8] Performance analysis of communication protocols for Internet of Things platforms
    Ramirez, Jhon
    Pedraza, Cesar
    2017 IEEE COLOMBIAN CONFERENCE ON COMMUNICATIONS AND COMPUTING (COLCOM), 2017,
  • [9] A Comparative Analysis on Resource Discovery Protocols for The Internet of Things
    Khalil, Kasem
    Elgazzar, Khalid
    Bayoumi, Magdy
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [10] Security Attacks and Secure Routing Protocols in RPL-based Internet of Things: Survey
    Kamble, Arvind
    Malemath, Virendra S.
    Patil, Deepika
    2017 INTERNATIONAL CONFERENCE ON EMERGING TRENDS & INNOVATION IN ICT (ICEI), 2017, : 33 - 39