Security analysis of IIoT connectivity protocols
|Title||Security analysis of IIoT connectivity protocols|
|Summary||Potential security vulnerabilities of IIoTs platform connectivity protocols, such as CoAP and MQTT will be studied.|
|Keywords||IIoT, coAP, MQTT|
|TimeFrame||Dec 2020 - May 2021|
|References|| Eldefrawy, Mohamed, Ismail Butun, Nuno Pereira, and Mikael Gidlund. "Formal security analysis of LoRaWAN." Computer Networks 148 (2019): 328-339.
Gebremichael, Teklay, Lehlogonolo PI Ledwaba, Mohamed H. Eldefrawy, Gerhard P. Hancke, Nuno Pereira, Mikael Gidlund, and Johan Akerberg. "Security and Privacy in the Industrial Internet of Things: Current Standards and Future Challenges." IEEE Access 8 (2020): 152351-152366.
Patel, C. and Doshi, N., 2020. A Novel MQTT Security framework In Generic IoT Model. Procedia Computer Science, 171, pp.1399-1408.
Singh, V.K. and Sharan, H.O., 2019. Security Analysis and Improvements to IoT Communication Protocols-CoAP.
|Supervisor||Mohamed Eldefrawy, Yousra Alkabani|
Potential security vulnerabilities of IIoTs platform connectivity protocols, such as CoAP and MQTT will be studied. Then, these protocols will be analyzed using a formal security analysis tool, such as Scyther. The formal model will help reveal unreported flaws in the IIoT connectivity protocols, and consequently, improvement in such protocols can be introduced. These improvements should take into consideration the constrained nature of IIoT in terms of memory, processing power, and energy consumption. The Scyther model will present practical illustrations for such protocols that can be formally examined and investigated against predefined security claims.