The Model Checking D2D and Centralised IOT authentication Protocols.

Main Article Content

Article Sidebar

Published Sep 30, 2021
Pradeep R Pradeep

Abstract

It is very difficult to develop a perfect security protocol for communication over the IoT network and developing a reliable authentication protocol requires a detailed understanding of cryptography. To ensure the reliability of security protocols of IoT, the validation method is not a good choice because of its several disadvantages and limitations. To prove the high reliability of Cryptographic Security Protocols(CSP) for IoT networks, the functional correctness of security protocols must be proved secure mathematically. Using the Formal Verification technique[4] we can prove the functional correctness of IoT security protocols by providing the proofs mathematically. In this work, The CoAP[1](constrained application protocol) and CHAP[2] Device-to-Device (D2D) authentication protocols and centralised IoT network Authentication Protocol SSH[3] (Secure Shell) used in smart city applications are formally verified using the well-known verification technique known as model checking technique and we have used the Scyther[5] model checker for the verification of security properties of the respective protocols. The abstract protocol models of the IoT authentication protocols were specified in the security protocol description language and the security requirements of the authentication protocols were specified as claim events.

How to Cite

Pradeep, P. R. (2021). The Model Checking D2D and Centralised IOT authentication Protocols. SPAST Abstracts, 1(01). Retrieved from https://spast.org/techrep/article/view/1317
Abstract 44 |

Article Details

Keywords

Model Checking, Formal verification, IOT, CHAP, CoAP, SSH, Authentication, smart city

References
[1] Shelby, Zach, Klaus Hartke, and Carsten Bormann. The constrained application protocol (CoAP) (2014).
[2] Zorn, Glen, and Steve Cobb. Microsoft ppp chap extensions (1998).
[3] Ylonen, Tatu, and Chris Lonvick. The secure shell (SSH) transport layer protocol. RFC 4253, January, 2006.
[4] Dalal, Nitish, et al. A comparative analysis of tools for verification of security protocols. Int'l J. of Communications, Network and System Sciences 3.10 (2010): 779.
https://doi.org/10.4236/ijcns.2010.310104
[5] Cremers, Cas JF. The Scyther Tool: Verification, falsification, and analysis of security protocols. International conference on computer aided verification. Springer, Berlin, Heidelberg, 2008.
https://doi.org/10.1007/978-3-540-70545-1_38
[6] Lee, In, and Kyoochun Lee. "The Internet of Things (IoT): Applications, investments, and challenges for enterprises." Business Horizons 58.4 (2015): 431-440.
https://doi.org/10.1016/j.bushor.2015.03.008
Section
GE3- Computers & Information Technology