Abstract
The MQTT-SN protocol is a lightweight version of the MQTT protocol and is customized for Wireless Sensor Networks (WSN). It removes the need for the underlying protocol to provide ordered and reliable connections during transmission, making it ideal for sensors in WSN with extremely limited computing power and resources. Due to the widespread use of WSN in various areas, the MQTT-SN protocol has promising application prospects. Furthermore, security is crucial for MQTT-SN, as sensor nodes applying this protocol are often deployed in uncontrolled wireless environments and are vulnerable to a variety of external security threats.
To ensure the security of the MQTT-SN protocol without compromising its simplicity, we introduce the ChaCha20-Poly1305 cryptographic authentication algorithm. In this paper, we formally model the MQTT-SN communication system using Communicating Sequential Process (CSP) and then verify seven properties of this model using Process Analysis Toolkit (PAT), including deadlock freedom, divergence freedom, data reachability, client security, gateway security, broker security, and data leakage. According to the verification results in PAT, our model satisfies all the properties above. Therefore, we can conclude that the MQTT-SN protocol is secure with the introduction of ChaCha20-Poly1305.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kandris, D., Nakas, C., Vomvas, D., Koulouras, G.: Applications of wireless sensor networks: an up-to-date survey. Appl. Syst. Innov. 3(1) (2020)
Sharma, S., Kaur, A.: Survey on wireless sensor network, its applications and issues. J. Phys: Conf. Ser. 1969(1), 12042 (2021)
Stanford-Clark, A., Truong, H.L.: MQTT for sensor networks (MQTT-SN) protocol specification. Int. Bus. Mach. (IBM) Corporation version 1(2), 1–28 (2013)
Avila, K., Sanmartin, P., Jabba, D., Gómez, J.: An analytical survey of attack scenario parameters on the techniques of attack mitigation in WSN. Wirel. Pers. Commun. 122, 3687–3718 (2022)
Park, C.S., Nam, H.M.: Security architecture and protocols for secure MQTT-SN. IEEE Access 8, 226422–226436 (2020)
Roldán-Gómez, J., Carrillo-Mondéjar, J., Castelo Gómez, J.M., Ruiz-Villafranca, S.: Security analysis of the MQTT-SN protocol for the internet of things. Appl. Sci. 12(21), 10991 (2022)
Diwan, M., D’Souza, M.: A framework for modeling and verifying iot communication protocols. In: Larsen, K.G., Sokolsky, O., Wang, J. (eds.) SETTA 2017. LNCS, vol. 10606, pp. 266–280. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-69483-2_16
Sadio, O., Ngom, I., Lishou, C.: Lightweight security scheme for MQTT/MQTT-SN protocol. In: 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS), pp. 119–123. IEEE (2019)
Kao, T., Wang, H., Li, J.: Safe MQTT-SN: a lightweight secure encrypted communication in IoT. J. Phys. Conf. Ser. 012044. IOP Publishing (2021)
De Santis, F., Schauer, A., Sigl, G.: ChaCha20-Poly1305 authenticated encryption for high-speed embedded iot applications. In: Design, Automation and Test in Europe Conference and Exhibition (DATE), pp. 692–697. IEEE (2017)
Hoare, C.A.R.: Communicating Sequential Processes. Prentice Hall International, Upper Saddle River (1985)
National University of Singapore: PAT: Process Analysis Toolkit (2007). https://pat.comp.nus.edu.sg/
Sun, J., Liu, Y., Dong, J.S.: Model checking CSP revisited: introducing a process analysis toolkit. In: Margaria, T., Steffen, B. (eds.) ISoLA 2008. CCIS, vol. 17, pp. 307–322. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-88479-8_22
Xu, J., Yin, J., Zhu, H., Xiao, L.: Modeling and verifying producer-consumer communication in Kafka using CSP. In: 7th Conference on the Engineering of Computer Based Systems, pp. 1–10. ACM (2021)
Lowe, G., Roscoe, B.: Using CSP to detect errors in the TMN protocol. IEEE Trans. Softw. Eng. 23(10), 659–669 (1997)
Chen, S., Li, R., Zhu, H.: Formalization and verification of group communication CoAP using CSP. In: Shen, H., et al. (eds.) PDCAT 2021. LNCS, vol. 13148, pp. 616–628. Springer, Cham (2022). https://doi.org/10.1007/978-3-030-96772-7_58
Abidoye, A.P., Obagbuwa, I.C.: DDoS attacks in WSNs: detection and countermeasures. IET Wirel. Sens. Syst. 8(2), 52–59 (2018)
Acknowledgements
This work was partially supported by the National Key Research and Development Program of China (No. 2022YFB3305102), the National Natural Science Foundation of China (Grant No. 62032024), the “Digital Silk Road” Shanghai International Joint Lab of Trustworthy Intelligent Software (No. 22510750100), and Shanghai Trusted Industry Internet Software Collaborative Innovation Center.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Lin, W., Chen, S., Zhu, H. (2024). Formalization and Verification of MQTT-SN Communication Using CSP. In: Kofroň, J., Margaria, T., Seceleanu, C. (eds) Engineering of Computer-Based Systems. ECBS 2023. Lecture Notes in Computer Science, vol 14390. Springer, Cham. https://doi.org/10.1007/978-3-031-49252-5_10
Download citation
DOI: https://doi.org/10.1007/978-3-031-49252-5_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-49251-8
Online ISBN: 978-3-031-49252-5
eBook Packages: Computer ScienceComputer Science (R0)