Skip to main content

Formalization and Verification of MQTT-SN Communication Using CSP

  • Conference paper
  • First Online:
Engineering of Computer-Based Systems (ECBS 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14390))

Included in the following conference series:

  • 189 Accesses

Abstract

The MQTT-SN protocol is a lightweight version of the MQTT protocol and is customized for Wireless Sensor Networks (WSN). It removes the need for the underlying protocol to provide ordered and reliable connections during transmission, making it ideal for sensors in WSN with extremely limited computing power and resources. Due to the widespread use of WSN in various areas, the MQTT-SN protocol has promising application prospects. Furthermore, security is crucial for MQTT-SN, as sensor nodes applying this protocol are often deployed in uncontrolled wireless environments and are vulnerable to a variety of external security threats.

To ensure the security of the MQTT-SN protocol without compromising its simplicity, we introduce the ChaCha20-Poly1305 cryptographic authentication algorithm. In this paper, we formally model the MQTT-SN communication system using Communicating Sequential Process (CSP) and then verify seven properties of this model using Process Analysis Toolkit (PAT), including deadlock freedom, divergence freedom, data reachability, client security, gateway security, broker security, and data leakage. According to the verification results in PAT, our model satisfies all the properties above. Therefore, we can conclude that the MQTT-SN protocol is secure with the introduction of ChaCha20-Poly1305.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kandris, D., Nakas, C., Vomvas, D., Koulouras, G.: Applications of wireless sensor networks: an up-to-date survey. Appl. Syst. Innov. 3(1) (2020)

    Google Scholar 

  2. Sharma, S., Kaur, A.: Survey on wireless sensor network, its applications and issues. J. Phys: Conf. Ser. 1969(1), 12042 (2021)

    Google Scholar 

  3. Stanford-Clark, A., Truong, H.L.: MQTT for sensor networks (MQTT-SN) protocol specification. Int. Bus. Mach. (IBM) Corporation version 1(2), 1–28 (2013)

    Google Scholar 

  4. Avila, K., Sanmartin, P., Jabba, D., Gómez, J.: An analytical survey of attack scenario parameters on the techniques of attack mitigation in WSN. Wirel. Pers. Commun. 122, 3687–3718 (2022)

    Article  Google Scholar 

  5. Park, C.S., Nam, H.M.: Security architecture and protocols for secure MQTT-SN. IEEE Access 8, 226422–226436 (2020)

    Article  Google Scholar 

  6. Roldán-Gómez, J., Carrillo-Mondéjar, J., Castelo Gómez, J.M., Ruiz-Villafranca, S.: Security analysis of the MQTT-SN protocol for the internet of things. Appl. Sci. 12(21), 10991 (2022)

    Article  Google Scholar 

  7. Diwan, M., D’Souza, M.: A framework for modeling and verifying iot communication protocols. In: Larsen, K.G., Sokolsky, O., Wang, J. (eds.) SETTA 2017. LNCS, vol. 10606, pp. 266–280. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-69483-2_16

    Chapter  Google Scholar 

  8. Sadio, O., Ngom, I., Lishou, C.: Lightweight security scheme for MQTT/MQTT-SN protocol. In: 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS), pp. 119–123. IEEE (2019)

    Google Scholar 

  9. Kao, T., Wang, H., Li, J.: Safe MQTT-SN: a lightweight secure encrypted communication in IoT. J. Phys. Conf. Ser. 012044. IOP Publishing (2021)

    Google Scholar 

  10. De Santis, F., Schauer, A., Sigl, G.: ChaCha20-Poly1305 authenticated encryption for high-speed embedded iot applications. In: Design, Automation and Test in Europe Conference and Exhibition (DATE), pp. 692–697. IEEE (2017)

    Google Scholar 

  11. Hoare, C.A.R.: Communicating Sequential Processes. Prentice Hall International, Upper Saddle River (1985)

    Google Scholar 

  12. National University of Singapore: PAT: Process Analysis Toolkit (2007). https://pat.comp.nus.edu.sg/

  13. Sun, J., Liu, Y., Dong, J.S.: Model checking CSP revisited: introducing a process analysis toolkit. In: Margaria, T., Steffen, B. (eds.) ISoLA 2008. CCIS, vol. 17, pp. 307–322. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-88479-8_22

    Chapter  Google Scholar 

  14. Xu, J., Yin, J., Zhu, H., Xiao, L.: Modeling and verifying producer-consumer communication in Kafka using CSP. In: 7th Conference on the Engineering of Computer Based Systems, pp. 1–10. ACM (2021)

    Google Scholar 

  15. Lowe, G., Roscoe, B.: Using CSP to detect errors in the TMN protocol. IEEE Trans. Softw. Eng. 23(10), 659–669 (1997)

    Article  Google Scholar 

  16. Chen, S., Li, R., Zhu, H.: Formalization and verification of group communication CoAP using CSP. In: Shen, H., et al. (eds.) PDCAT 2021. LNCS, vol. 13148, pp. 616–628. Springer, Cham (2022). https://doi.org/10.1007/978-3-030-96772-7_58

    Chapter  Google Scholar 

  17. Abidoye, A.P., Obagbuwa, I.C.: DDoS attacks in WSNs: detection and countermeasures. IET Wirel. Sens. Syst. 8(2), 52–59 (2018)

    Article  Google Scholar 

Download references

Acknowledgements

This work was partially supported by the National Key Research and Development Program of China (No. 2022YFB3305102), the National Natural Science Foundation of China (Grant No. 62032024), the “Digital Silk Road” Shanghai International Joint Lab of Trustworthy Intelligent Software (No. 22510750100), and Shanghai Trusted Industry Internet Software Collaborative Innovation Center.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Lin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lin, W., Chen, S., Zhu, H. (2024). Formalization and Verification of MQTT-SN Communication Using CSP. In: Kofroň, J., Margaria, T., Seceleanu, C. (eds) Engineering of Computer-Based Systems. ECBS 2023. Lecture Notes in Computer Science, vol 14390. Springer, Cham. https://doi.org/10.1007/978-3-031-49252-5_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-49252-5_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-49251-8

  • Online ISBN: 978-3-031-49252-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics