Formalization and Verification of Group Communication CoAP Using CSP

被引:4
作者
Chen, Sini [1 ]
Li, Ran [1 ]
Zhu, Huibiao [1 ]
机构
[1] East China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai, Peoples R China
来源
PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PDCAT 2021 | 2022年 / 13148卷
基金
中国国家自然科学基金;
关键词
Group communication; CoAP; CSP; Modeling; Verification; INTERNET;
D O I
10.1007/978-3-030-96772-7_58
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
With the rapid expansion of Internet of Things (IoT), Constrained Application Protocol (CoAP) is developed to enable those devices with small memory, constrained computing power and limited ability to communicate with other nodes in the network. Meanwhile, group communication is very useful for managing and controlling a set of homogeneous devices in many IoT scenarios. Thus, many scholars are devoted to expanding CoAP to enable group communication. Furthermore, because CoAP is widely applicated in transportation, health care, industrial and many other areas, the security and consistency of data is of great importance. In this paper, we adopt Communicating Sequential Processes (CSP) to model group communication CoAP, and we use model checker Process Analysis Toolkit (PAT) to verify six properties of our model, including deadlock freedom, divergence freedom, data reachability, data leakage, client faking and entity manager faking. The verification results show that the original architecture has the security risk of data leakage. So we enhance it by adding message authentication code in the process. In the light of the new verification results, it can be found that we succeed in eliminating the possibility of data leakage.
引用
收藏
页码:616 / 628
页数:13
相关论文
共 14 条
[1]  
[Anonymous], 2014, 7390 RFC
[2]   CoAP: An Application Protocol for Billions of Tiny Internet Nodes [J].
Bormann, Carsten ;
Castellani, Angelo P. ;
Shelby, Zach .
IEEE INTERNET COMPUTING, 2012, 16 (02) :62-67
[3]  
Capossele A, 2015, IEEE ICC, P549, DOI 10.1109/ICC.2015.7248379
[4]  
Desmedt Y., 2005, ENCY CRYPTOGRAPHY SE, P368, DOI DOI 10.1007/0-387-23483-7_241
[5]   Internet of Things (IoT): A vision, architectural elements, and future directions [J].
Gubbi, Jayavardhana ;
Buyya, Rajkumar ;
Marusic, Slaven ;
Palaniswami, Marimuthu .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (07) :1645-1660
[6]   COMMUNICATING SEQUENTIAL PROCESSES [J].
HOARE, CAR .
COMMUNICATIONS OF THE ACM, 1978, 21 (08) :666-677
[7]   Experimental Evaluation of Unicast and Multicast CoAP Group Communication [J].
Ishaq, Isam ;
Hoebeke, Jeroen ;
Moerman, Ingrid ;
Demeester, Piet .
SENSORS, 2016, 16 (07)
[8]   Observing CoAP groups efficiently [J].
Ishaq, Isam ;
Hoebeke, Jeroen ;
Moerman, Ingrid ;
Demeester, Piet .
AD HOC NETWORKS, 2016, 37 :368-388
[9]  
Lambert S.M, 1994, INF SYST SECUR, V3, P53
[10]   PROBABILISTIC AND PRIORITIZED MODELS OF TIMED CSP [J].
LOWE, G .
THEORETICAL COMPUTER SCIENCE, 1995, 138 (02) :315-352