Formal-Based Modeling and Analysis of a Network Communication Protocol for IoT: MQTT Protocol

被引:1
作者
Hcine, Jamila [1 ]
Ben Hafaiedh, Imene [1 ]
机构
[1] Univ Tunis El Manar UTM, Higher Inst Comp Sci ISI, Tunis, Tunisia
来源
PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON SCIENCES OF ELECTRONICS, TECHNOLOGIES OF INFORMATION AND TELECOMMUNICATIONS (SETIT'18), VOL.2 | 2020年 / 147卷
关键词
IoT; MQTT protocol; Formal verification; QoS levels;
D O I
10.1007/978-3-030-21009-0_34
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The MQTT protocol is a widespread standard in the IoT world as it is widely deployed in different IoT applications. In the context of the IoT, a certain level of assurance that a given device does not incorporate vulnerabilities based on its protocol compliance is very fundamental to ensure. Such requirements could be reached through formal verification. In this work, we propose a formal model for the description of the MQTT protocol. In particular, we define a generic model expressive enough to model the different Quality of Service levels of the MQTT protocol. Our model is based on the formalism of timed automata. The formal verification of different properties as well as analysis experiments of the proposed model have been performed automatically using Model-checking.
引用
收藏
页码:350 / 360
页数:11
相关论文
共 50 条
[21]   Design and Implementation of a Reliable Message Transmission System Based on MQTT Protocol in IoT [J].
Hwang, Hyun Cheon ;
Park, JiSu ;
Shon, Jin Gon .
WIRELESS PERSONAL COMMUNICATIONS, 2016, 91 (04) :1765-1777
[22]   Chaos-based authentication of encrypted images under MQTT for IoT protocol [J].
Rodriguez-Munoz, Jose David ;
Tlelo-Cuautle, Esteban ;
de la Fraga, Luis Gerardo .
INTEGRATION-THE VLSI JOURNAL, 2025, 102
[23]   Monitor Human Vital Signs based on IoT Technolgy using MQTT Protocol [J].
Kadhim, Kadhim Takleef ;
Alsahlany, Ali M. ;
Wadi, Salim Muhsin ;
Kadhum, Hussein T. .
8TH INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND TECHNOLOGY (ICAST 2020), 2020, 2290
[24]   Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol [J].
Firdous, Syed Naeem ;
Baig, Zubair ;
Valli, Craig ;
Ibrahim, Ahmed .
2017 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2017, :748-755
[25]   Implementation of SSL/TLS Security with MQTT Protocol in IoT Environment [J].
Iqbal Luqman Bin Mohd Paris ;
Mohamed Hadi Habaebi ;
Alhareth Mohammed Zyoud .
Wireless Personal Communications, 2023, 132 :163-182
[26]   Implementation of SSL/TLS Security with MQTT Protocol in IoT Environment [J].
Paris, Iqbal Luqman Bin Mohd ;
Habaebi, Mohamed Hadi ;
Zyoud, Alhareth Mohammed .
WIRELESS PERSONAL COMMUNICATIONS, 2023, 132 (01) :163-182
[27]   Robust Data Exchange and Redirecting Data Flow Mechanism in IoT Network Using MQTT Protocol [J].
Thirupathi, V. ;
Sagar, K. .
AD HOC & SENSOR WIRELESS NETWORKS, 2023, 57 (1-2) :59-89
[28]   A Blockchain-based MQTT Protocol Optimization Algorithm [J].
Gao W. ;
Zhang L. ;
Ju Y. .
Journal of ICT Standardization, 2023, 11 (02) :135-156
[29]   A Bayesian Rule Learning Based Intrusion Detection System for the MQTT Communication Protocol [J].
Liu, Qi ;
Keller, Hubert B. ;
Hagenmeyer, Veit .
ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
[30]   Characterization of threats in IoT from an MQTT protocol-oriented dataset [J].
Castaneda, Angel Luis Munoz ;
Mata, Jose Antonio Aveleira ;
Alaiz-Moreton, Hector .
COMPLEX & INTELLIGENT SYSTEMS, 2023, 9 (05) :5281-5296