Towards formal verification of IoT protocols: A Review

被引:58
作者
Hofer-Schmitz, Katharina [1 ]
Stojanovic, Branka [1 ]
机构
[1] JOANNEUM RES Forsch Gesell MbH, DIGITAL Inst Informat & Commun Technol, 17 Steyrergasse, Graz, Austria
基金
欧盟地平线“2020”;
关键词
Formal verification; Security; Protocols; Model checkers; IoT; SECURITY PROTOCOLS; AUTHENTICATION; IMPLEMENTATION; FRAMEWORK; INTERNET; DESIGN; LTE;
D O I
10.1016/j.comnet.2020.107233
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Formal Verification is one of the crucial methods to detect possible weaknesses and vulnerabilities at an early stage. This paper reviews formal methods for an extensive variety of protocols used in the IoT environment. It gives detailed descriptions of the considered properties and the applied methods. An in-depth literature review shows that four application fields can be distinguished, namely: (1) functional checks, (2) checks on security properties, (3) suggestions for enhanced schemes including a priori security property checks and (4) implementation checks of protocols. This paper further offers a comprehensive overview of the covered security properties and of commonly used tools for protocols in the field. Additionally, an extensive description and overview of commonly used model checkers is given and open issues and challenges in the IoT field are addressed.
引用
收藏
页数:21
相关论文
共 100 条
[31]  
Basin D., 2018, Handbook of Model Checking, P727, DOI DOI 10.1007/978-3-319-10575-8_22
[32]   A Formal Analysis of 5G Authentication [J].
Basin, David ;
Dreier, Jannik ;
Hirschi, Lucca ;
Radomirovic, Sasa ;
Sasse, Ralf ;
Stettler, Vincent .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :1383-1396
[33]   Secure Smart Homes: Opportunities and Challenges [J].
Batalla, Jordi Mongay ;
Vasilakos, Athanasios ;
Gajewski, Mariusz .
ACM COMPUTING SURVEYS, 2017, 50 (05)
[34]  
Behrmann G., 2006, A tutorial on Uppaal 4.0
[35]   Formal Verification of the Security for Dual Connectivity in LTE [J].
Ben Henda, Noomene ;
Norrman, Karl ;
Pfeffer, Katharina .
2015 IEEE/ACM 3RD FME WORKSHOP ON FORMAL METHODS IN SOFTWARE ENGINEERING, 2015, :13-19
[36]  
Bengtsson J., 1996, Hybrid Systems III. Verification and Control, P232, DOI 10.1007/BFb0020949
[37]  
Blanchet B., 2018, Tech. Rep, P05
[38]  
Blanchet Bruno, 2016, Foundations and Trends in Privacy and Security, V1, P1, DOI DOI 10.1561/3300000004
[39]   Fast Authentication and Data Transfer Scheme for Massive NB-IoT Devices in 3GPP 5G Network [J].
Cao, Jin ;
Yu, Pu ;
Ma, Maode ;
Gao, Weifeng .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) :1561-1575
[40]   A Survey on Security Aspects for LTE and LTE-A Networks [J].
Cao, Jin ;
Ma, Maode ;
Li, Hui ;
Zhang, Yueyu ;
Luo, Zhenxing .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :283-302