Security analysis of IIoT connectivity protocols

From ISLAB/CAISR
Revision as of 21:26, 29 September 2021 by Cclab (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Title Security analysis of IIoT connectivity protocols
Summary Potential security vulnerabilities of IIoTs platform connectivity protocols, such as CoAP and MQTT will be studied.
Keywords IIoT, coAP, MQTT
TimeFrame Dec 2021 - May 2022
References Eldefrawy, Mohamed, Ismail Butun, Nuno Pereira, and Mikael Gidlund. "Formal security analysis of LoRaWAN." Computer Networks 148 (2019): 328-339.

Gebremichael, Teklay, Lehlogonolo PI Ledwaba, Mohamed H. Eldefrawy, Gerhard P. Hancke, Nuno Pereira, Mikael Gidlund, and Johan Akerberg. "Security and Privacy in the Industrial Internet of Things: Current Standards and Future Challenges." IEEE Access 8 (2020): 152351-152366.

Patel, C. and Doshi, N., 2020. A Novel MQTT Security framework In Generic IoT Model. Procedia Computer Science, 171, pp.1399-1408.

Singh, V.K. and Sharan, H.O., 2019. Security Analysis and Improvements to IoT Communication Protocols-CoAP.

Prerequisites
Author
Supervisor Mohamed Eldefrawy, Yousra Alkabani
Level Flexible
Status Open


Potential security vulnerabilities of IIoTs platform connectivity protocols, such as CoAP and MQTT will be studied. Then, these protocols will be analyzed using a formal security analysis tool, such as Scyther. The formal model will help reveal unreported flaws in the IIoT connectivity protocols, and consequently, improvement in such protocols can be introduced. These improvements should take into consideration the constrained nature of IIoT in terms of memory, processing power, and energy consumption. The Scyther model will present practical illustrations for such protocols that can be formally examined and investigated against predefined security claims.