skip to main content
10.1145/3641399.3641446acmotherconferencesArticle/Chapter ViewAbstractPublication PagesisecConference Proceedingsconference-collections
short-paper
Open Access

Symbolic Verification of Mesh Commissioning Protocol of Thread

Authors Info & Claims
Published:22 February 2024Publication History

ABSTRACT

The popularity of the Internet of Things (IoT) has raised the critical need for secure, bug-free protocols, where minor design flaws can lead to significant losses. This work focuses on the Thread protocol, an extensively used solution for IoT security and device diversity. We present a formal π -calculus model of Mesh Commissioning Protocol (MeshCoP), a Thread sub-protocol to securely authenticate and commission new distrusted devices to a Thread Network. Our goal is specifically to verify MeshCoP specification. This study highlights the challenges associated with manually modeling a widely used protocol in the industry. Our analysis confirms the secrecy, key consistency, registration, petitioning, and secure network credentials transfer properties held in MeshCoP.

References

  1. Dimitrios-Georgios Akestoridis, Vyas Sekar, and Patrick Tague. 2022. On the Security of Thread Networks: Experimentation with OpenThread-Enabled Devices. In Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (San Antonio, TX, USA) (WiSec ’22). Association for Computing Machinery, New York, NY, USA, 233–244. https://doi.org/10.1145/3507657.3528544Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Myrto Arapinis, Vincent Cheval, and Stéphanie Delaune. 2012. Verifying Privacy-Type Properties in a Modular Way. In 2012 IEEE 25th Computer Security Foundations Symposium. IEEE, Cambridge, MA, USA, 95–109. https://doi.org/10.1109/CSF.2012.16Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Sepideh Asadi and Hadi Shahriar Shahhoseini. 2012. Formal security analysis of authentication in SNMPv3 protocol by an automated tool. In 6th International Symposium on Telecommunications (IST). IEEE, Tehran, Iran, 1060–1064. https://doi.org/10.1109/ISTEL.2012.6483143Google ScholarGoogle ScholarCross RefCross Ref
  4. Chetan Bansal, Karthikeyan Bhargavan, and Sergio Maffeis. 2012. Discovering Concrete Attacks on Website Authorization by Formal Analysis. In 2012 IEEE 25th Computer Security Foundations Symposium. IEEE, Cambridge, MA, USA, 247–262. https://doi.org/10.1109/CSF.2012.27Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Karthikeyan Bhargavan, Bruno Blanchet, and Nadim Kobeissi. 2017. Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate. In 2017 IEEE Symposium on Security and Privacy (SP). IEEE, San Jose, CA, USA, 483–502. https://doi.org/10.1109/SP.2017.26Google ScholarGoogle ScholarCross RefCross Ref
  6. D. Dolev and A. Yao. 1983. On the security of public key protocols. IEEE Transactions on Information Theory 29, 2 (1983), 198–208. https://doi.org/10.1109/TIT.1983.1056650Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Lucca Hirschi, David Baelde, and Stéphanie Delaune. 2016. A Method for Verifying Privacy-Type Properties: The Unbounded Case. In 2016 IEEE Symposium on Security and Privacy (SP). IEEE, San Jose, CA, USA, 564–581. https://doi.org/10.1109/SP.2016.40Google ScholarGoogle ScholarCross RefCross Ref
  8. David B. Johnson, Dave Maltz, and Josh Broch. 2001. DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks. In Ad Hoc Networking (ad hoc networking ed.). ACM, 139–172. https://www.microsoft.com/en-us/research/publication/dsr-dynamic-source-routing-protocol-multi-hop-wireless-ad-hoc-networks/Google ScholarGoogle Scholar
  9. Yu Liu, Zhibo Pang, György Dán, Dapeng Lan, and Shaofang Gong. 2018. A Taxonomy for the Security Assessment of IP-Based Building Automation Systems: The Case of Thread. IEEE Transactions on Industrial Informatics 14, 9 (2018), 4113–4123. https://doi.org/10.1109/TII.2018.2844955Google ScholarGoogle ScholarCross RefCross Ref
  10. Peter M., Tracy T., Masatsune Y., Anurag G., and Denise R.2017. Forecast: Internet of Things – Endpoints and Associated Services, Worldwide, 2017. https://www.gartner.com/en/documents/3840665. Accessed 2023-01-13.Google ScholarGoogle Scholar
  11. Maria Leonor Pacheco, Max von Hippel, Ben Weintraub, Dan Goldwasser, and Cristina Nita-Rotaru. 2022. Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, San Francisco, CA, USA, 51–68. https://doi.org/10.1109/SP46214.2022.9833673Google ScholarGoogle ScholarCross RefCross Ref
  12. Florian Pudlitz, Florian Brokhausen, and Andreas Vogelsang. 2019. Extraction of System States from Natural Language Requirements. In 2019 IEEE 27th International Requirements Engineering Conference (RE). IEEE, Jeju, Korea (South), 211–222. https://doi.org/10.1109/RE.2019.00031Google ScholarGoogle ScholarCross RefCross Ref
  13. Eric Rescorla and Nagena Modadugu. 2012. Datagram Transport Layer Security Version 1.2. Request for Comments RFC 6347. Internet Engineering Task Force. https://doi.org/10.17487/RFC6347 Num Pages: 32.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Pietro Tedeschi, Savio Sciancalepore, and Roberto Di Pietro. 2023. PPCA - Privacy-Preserving Collision Avoidance for Autonomous Unmanned Aerial Vehicles. IEEE Transactions on Dependable and Secure Computing 20, 2 (2023), 1541–1558. https://doi.org/10.1109/TDSC.2022.3159837Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Thread Group. 2023. Thread Specification. https://www.threadgroup.org/ThreadSpec. Accessed 2022-07-07.Google ScholarGoogle Scholar
  16. Pankaj Upadhyay, Subodh Sharma, and Guangdong Bai. 2023. Symbolic Security Verification of Mesh Commissioning Protocol in Thread (extended version). https://arxiv.org/abs/2312.12958Google ScholarGoogle Scholar
  17. Caimei Wang, Yan Xiong, Wenchao Huang, Huihua Xia, and Jianmeng Huang. 2016. Formal Analysis of Selective Disclosure Attribute-Based Credential System in Applied Pi Calculus. In 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, 42–49. https://doi.org/10.1109/TrustCom.2016.0044Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Symbolic Verification of Mesh Commissioning Protocol of Thread

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ISEC '24: Proceedings of the 17th Innovations in Software Engineering Conference
      February 2024
      144 pages
      ISBN:9798400717673
      DOI:10.1145/3641399

      Copyright © 2024 ACM

      Publication rights licensed to ACM. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 22 February 2024

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • short-paper
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate76of315submissions,24%
    • Article Metrics

      • Downloads (Last 12 months)22
      • Downloads (Last 6 weeks)15

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format