Difference between revisions of "Security analysis of IIoT connectivity protocols"
(Created page with "{{StudentProjectTemplate |Summary=Potential security vulnerabilities of IIoTs platform connectivity protocols, such as CoAP and MQTT will be studied. |Keywords=IIoT, coAP, MQT...") |
|||
Line 3: | Line 3: | ||
|Keywords=IIoT, coAP, MQTT | |Keywords=IIoT, coAP, MQTT | ||
|TimeFrame=Dec 2020 - May 2021 | |TimeFrame=Dec 2020 - May 2021 | ||
− | |References= | + | |References=Eldefrawy, Mohamed, Ismail Butun, Nuno Pereira, and Mikael Gidlund. "Formal security analysis of LoRaWAN." Computer Networks 148 (2019): 328-339. |
− | Eldefrawy, Mohamed, Ismail Butun, Nuno Pereira, and Mikael Gidlund. "Formal security analysis of LoRaWAN." Computer Networks 148 (2019): 328-339. | + | |
Gebremichael, Teklay, Lehlogonolo PI Ledwaba, Mohamed H. Eldefrawy, Gerhard P. Hancke, Nuno Pereira, Mikael Gidlund, and Johan Akerberg. "Security and Privacy in the Industrial Internet of Things: Current Standards and Future Challenges." IEEE Access 8 (2020): 152351-152366. | Gebremichael, Teklay, Lehlogonolo PI Ledwaba, Mohamed H. Eldefrawy, Gerhard P. Hancke, Nuno Pereira, Mikael Gidlund, and Johan Akerberg. "Security and Privacy in the Industrial Internet of Things: Current Standards and Future Challenges." IEEE Access 8 (2020): 152351-152366. |
Revision as of 21:24, 29 September 2021
Title | Security analysis of IIoT connectivity protocols |
---|---|
Summary | Potential security vulnerabilities of IIoTs platform connectivity protocols, such as CoAP and MQTT will be studied. |
Keywords | IIoT, coAP, MQTT |
TimeFrame | Dec 2020 - May 2021 |
References | Eldefrawy, Mohamed, Ismail Butun, Nuno Pereira, and Mikael Gidlund. "Formal security analysis of LoRaWAN." Computer Networks 148 (2019): 328-339.
Gebremichael, Teklay, Lehlogonolo PI Ledwaba, Mohamed H. Eldefrawy, Gerhard P. Hancke, Nuno Pereira, Mikael Gidlund, and Johan Akerberg. "Security and Privacy in the Industrial Internet of Things: Current Standards and Future Challenges." IEEE Access 8 (2020): 152351-152366. Patel, C. and Doshi, N., 2020. A Novel MQTT Security framework In Generic IoT Model. Procedia Computer Science, 171, pp.1399-1408. Singh, V.K. and Sharan, H.O., 2019. Security Analysis and Improvements to IoT Communication Protocols-CoAP. |
Prerequisites | |
Author | |
Supervisor | Mohamed Eldefrawy, Yousra Alkabani |
Level | Flexible |
Status | Open |
Potential security vulnerabilities of IIoTs platform connectivity protocols, such as CoAP and MQTT will be studied. Then, these protocols will be analyzed using a formal security analysis tool, such as Scyther. The formal model will help reveal unreported flaws in the IIoT connectivity protocols, and consequently, improvement in such protocols can be introduced. These improvements should take into consideration the constrained nature of IIoT in terms of memory, processing power, and energy consumption. The Scyther model will present practical illustrations for such protocols that can be formally examined and investigated against predefined security claims.