TY - GEN
T1 - Formal modeling and verification of ICN-IoT middleware architecture
AU - Zhang, Hongqin
AU - Yin, Jiaqi
AU - Zhu, Huibiao
AU - Chen, Ningning
N1 - Publisher Copyright:
© 2021 Knowledge Systems Institute Graduate School. All rights reserved.
PY - 2021
Y1 - 2021
N2 - As a key technology of the Internet of Things (IoT), middleware plays an important role in managing virtualized resources and services. However, traditional Internet architectures cannot ensure adequate data security and efficient data delivery for IoT middlewares. Therefore, Information-Centric Networking (ICN), a paradigm of the future network, is introduced into IoT middlewares. Since ICN-IoT middleware is attracting more and more attentions, its security is worth discussing. In this paper, we adopt Communicating Sequential Processes (CSP) to model the ICN-IoT middleware architecture. Five properties (deadlock freedom, data availability, action keys leakage, device faking and user faking) of the model are verified by utilizing the model checker Process Analysis Toolkit (PAT). According to the verification results, the model cannot guarantee the security of data. To solve the problems, we encrypt messages with the receiver's public key, and improve the model by introducing a method similar to the digital signature. The new verification results demonstrate that our study can assure the security of the ICN-IoT middleware architecture.
AB - As a key technology of the Internet of Things (IoT), middleware plays an important role in managing virtualized resources and services. However, traditional Internet architectures cannot ensure adequate data security and efficient data delivery for IoT middlewares. Therefore, Information-Centric Networking (ICN), a paradigm of the future network, is introduced into IoT middlewares. Since ICN-IoT middleware is attracting more and more attentions, its security is worth discussing. In this paper, we adopt Communicating Sequential Processes (CSP) to model the ICN-IoT middleware architecture. Five properties (deadlock freedom, data availability, action keys leakage, device faking and user faking) of the model are verified by utilizing the model checker Process Analysis Toolkit (PAT). According to the verification results, the model cannot guarantee the security of data. To solve the problems, we encrypt messages with the receiver's public key, and improve the model by introducing a method similar to the digital signature. The new verification results demonstrate that our study can assure the security of the ICN-IoT middleware architecture.
KW - CSP
KW - ICN
KW - IoT middleware
KW - Modeling
KW - PAT
KW - Verification
UR - http://www.scopus.com/inward/record.url?scp=85114272392&partnerID=8YFLogxK
U2 - 10.18293/SEKE2021-003
DO - 10.18293/SEKE2021-003
M3 - 会议稿件
AN - SCOPUS:85114272392
T3 - Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE
SP - 102
EP - 107
BT - Proceedings - SEKE 2021
PB - Knowledge Systems Institute Graduate School
T2 - 33rd International Conference on Software Engineering and Knowledge Engineering, SEKE 2021
Y2 - 1 July 2021 through 10 July 2021
ER -