Difference between revisions of "Security analysis of IIoT connectivity protocols"

From ISLAB/CAISR
(Created page with "{{StudentProjectTemplate |Summary=Potential security vulnerabilities of IIoTs platform connectivity protocols, such as CoAP and MQTT will be studied. |Keywords=IIoT, coAP, MQT...")
 
 
(One intermediate revision by one user not shown)
Line 2: Line 2:
 
|Summary=Potential security vulnerabilities of IIoTs platform connectivity protocols, such as CoAP and MQTT will be studied.
 
|Summary=Potential security vulnerabilities of IIoTs platform connectivity protocols, such as CoAP and MQTT will be studied.
 
|Keywords=IIoT, coAP, MQTT
 
|Keywords=IIoT, coAP, MQTT
|TimeFrame=Dec 2020 - May 2021
+
|TimeFrame=Dec 2021 - May 2022
|References=
+
|References=Eldefrawy, Mohamed, Ismail Butun, Nuno Pereira, and Mikael Gidlund. "Formal security analysis of LoRaWAN." Computer Networks 148 (2019): 328-339.
Eldefrawy, Mohamed, Ismail Butun, Nuno Pereira, and Mikael Gidlund. "Formal security analysis of LoRaWAN." Computer Networks 148 (2019): 328-339.
+
  
 
Gebremichael, Teklay, Lehlogonolo PI Ledwaba, Mohamed H. Eldefrawy, Gerhard P. Hancke, Nuno Pereira, Mikael Gidlund, and Johan Akerberg. "Security and Privacy in the Industrial Internet of Things: Current Standards and Future Challenges." IEEE Access 8 (2020): 152351-152366.
 
Gebremichael, Teklay, Lehlogonolo PI Ledwaba, Mohamed H. Eldefrawy, Gerhard P. Hancke, Nuno Pereira, Mikael Gidlund, and Johan Akerberg. "Security and Privacy in the Industrial Internet of Things: Current Standards and Future Challenges." IEEE Access 8 (2020): 152351-152366.

Latest revision as of 21:26, 29 September 2021

Title Security analysis of IIoT connectivity protocols
Summary Potential security vulnerabilities of IIoTs platform connectivity protocols, such as CoAP and MQTT will be studied.
Keywords IIoT, coAP, MQTT
TimeFrame Dec 2021 - May 2022
References Eldefrawy, Mohamed, Ismail Butun, Nuno Pereira, and Mikael Gidlund. "Formal security analysis of LoRaWAN." Computer Networks 148 (2019): 328-339.

Gebremichael, Teklay, Lehlogonolo PI Ledwaba, Mohamed H. Eldefrawy, Gerhard P. Hancke, Nuno Pereira, Mikael Gidlund, and Johan Akerberg. "Security and Privacy in the Industrial Internet of Things: Current Standards and Future Challenges." IEEE Access 8 (2020): 152351-152366.

Patel, C. and Doshi, N., 2020. A Novel MQTT Security framework In Generic IoT Model. Procedia Computer Science, 171, pp.1399-1408.

Singh, V.K. and Sharan, H.O., 2019. Security Analysis and Improvements to IoT Communication Protocols-CoAP.

Prerequisites
Author
Supervisor Mohamed Eldefrawy, Yousra Alkabani
Level Flexible
Status Open


Potential security vulnerabilities of IIoTs platform connectivity protocols, such as CoAP and MQTT will be studied. Then, these protocols will be analyzed using a formal security analysis tool, such as Scyther. The formal model will help reveal unreported flaws in the IIoT connectivity protocols, and consequently, improvement in such protocols can be introduced. These improvements should take into consideration the constrained nature of IIoT in terms of memory, processing power, and energy consumption. The Scyther model will present practical illustrations for such protocols that can be formally examined and investigated against predefined security claims.