Towards formal verification of IoT protocols: A Review

被引:58
作者
Hofer-Schmitz, Katharina [1 ]
Stojanovic, Branka [1 ]
机构
[1] JOANNEUM RES Forsch Gesell MbH, DIGITAL Inst Informat & Commun Technol, 17 Steyrergasse, Graz, Austria
基金
欧盟地平线“2020”;
关键词
Formal verification; Security; Protocols; Model checkers; IoT; SECURITY PROTOCOLS; AUTHENTICATION; IMPLEMENTATION; FRAMEWORK; INTERNET; DESIGN; LTE;
D O I
10.1016/j.comnet.2020.107233
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Formal Verification is one of the crucial methods to detect possible weaknesses and vulnerabilities at an early stage. This paper reviews formal methods for an extensive variety of protocols used in the IoT environment. It gives detailed descriptions of the considered properties and the applied methods. An in-depth literature review shows that four application fields can be distinguished, namely: (1) functional checks, (2) checks on security properties, (3) suggestions for enhanced schemes including a priori security property checks and (4) implementation checks of protocols. This paper further offers a comprehensive overview of the covered security properties and of commonly used tools for protocols in the field. Additionally, an extensive description and overview of commonly used model checkers is given and open issues and challenges in the IoT field are addressed.
引用
收藏
页数:21
相关论文
共 100 条
[41]   A simple and robust handover authentication between HeNB and eNB in LTE networks [J].
Cao, Jin ;
Li, Hui ;
Ma, Maode ;
Zhang, Yueyu ;
Lai, Chengzhe .
COMPUTER NETWORKS, 2012, 56 (08) :2119-2131
[42]  
Chacko Smilty, 2018, IOP Conference Series: Materials Science and Engineering, V396, DOI 10.1088/1757-899X/396/1/012027
[43]  
Chang V, 2007, I C DIGIT ECOSYST TE, P7
[44]  
Cimatti A., 2000, International Journal on Software Tools for Technology Transfer, V2, P410, DOI [10.1007/s100090050046, DOI 10.1007/S100090050046]
[45]  
Coman F.L., 2019, 2019 Global IoT Summit, P1
[46]   Security Establishment for IoT Environments in 5G: Direct MTC-UE Communications [J].
Conceicao, Filipe ;
Oualha, Nouha ;
Zeghlache, Djamal .
2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,
[47]  
Cremers CJF, 2008, LECT NOTES COMPUT SC, V5123, P414
[48]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[49]   A formal analysis of bluetooth device discovery [J].
Marie Duflot ;
Marta Kwiatkowska ;
Gethin Norman ;
David Parker .
International Journal on Software Tools for Technology Transfer, 2006, 8 (6) :621-632
[50]   An Efficient Authentication Protocol for 5G Heterogeneous Networks [J].
El Hajjaji El Idrissi, Younes ;
Zahid, Noureddine ;
Jedra, Mohamed .
UBIQUITOUS NETWORKING, UNET 2017, 2017, 10542 :496-508