Formalization and Verification of Group Communication CoAP Using CSP
With the rapid expansion of Internet of Things (IoT), Constrained Application Protocol (CoAP) is developed to enable those devices with small memory, constrained computing power and limited ability to communicate with other nodes in the network. Meanwhile, group communication is very useful for mana...
Saved in:
Published in | Parallel and Distributed Computing, Applications and Technologies Vol. 13148; pp. 616 - 628 |
---|---|
Main Authors | , , |
Format | Book Chapter |
Language | English |
Published |
Switzerland
Springer International Publishing AG
2022
Springer International Publishing |
Series | Lecture Notes in Computer Science |
Subjects | |
Online Access | Get full text |
ISBN | 9783030967710 3030967719 |
ISSN | 0302-9743 1611-3349 |
DOI | 10.1007/978-3-030-96772-7_58 |
Cover
Abstract | With the rapid expansion of Internet of Things (IoT), Constrained Application Protocol (CoAP) is developed to enable those devices with small memory, constrained computing power and limited ability to communicate with other nodes in the network. Meanwhile, group communication is very useful for managing and controlling a set of homogeneous devices in many IoT scenarios. Thus, many scholars are devoted to expanding CoAP to enable group communication. Furthermore, because CoAP is widely applicated in transportation, health care, industrial and many other areas, the security and consistency of data is of great importance. In this paper, we adopt Communicating Sequential Processes (CSP) to model group communication CoAP, and we use model checker Process Analysis Toolkit (PAT) to verify six properties of our model, including deadlock freedom, divergence freedom, data reachability, data leakage, client faking and entity manager faking. The verification results show that the original architecture has the security risk of data leakage. So we enhance it by adding message authentication code in the process. In the light of the new verification results, it can be found that we succeed in eliminating the possibility of data leakage. |
---|---|
AbstractList | With the rapid expansion of Internet of Things (IoT), Constrained Application Protocol (CoAP) is developed to enable those devices with small memory, constrained computing power and limited ability to communicate with other nodes in the network. Meanwhile, group communication is very useful for managing and controlling a set of homogeneous devices in many IoT scenarios. Thus, many scholars are devoted to expanding CoAP to enable group communication. Furthermore, because CoAP is widely applicated in transportation, health care, industrial and many other areas, the security and consistency of data is of great importance. In this paper, we adopt Communicating Sequential Processes (CSP) to model group communication CoAP, and we use model checker Process Analysis Toolkit (PAT) to verify six properties of our model, including deadlock freedom, divergence freedom, data reachability, data leakage, client faking and entity manager faking. The verification results show that the original architecture has the security risk of data leakage. So we enhance it by adding message authentication code in the process. In the light of the new verification results, it can be found that we succeed in eliminating the possibility of data leakage. |
Author | Li, Ran Zhu, Huibiao Chen, Sini |
Author_xml | – sequence: 1 givenname: Sini surname: Chen fullname: Chen, Sini – sequence: 2 givenname: Ran surname: Li fullname: Li, Ran – sequence: 3 givenname: Huibiao surname: Zhu fullname: Zhu, Huibiao email: hbzhu@sei.ecnu.edu.cn |
BookMark | eNpVkMFOwzAMhgMMxDb2Bhz6AgEnzpL0OBU2kCYxCcY1StMUCltTmu7C09NtcOBk67N-W_5GZFCH2hNyzeCGAajbVGmKFBBoKpXiVJmpPiGTHmMPD0ydkiGTjFFEkZ79mzEYkGHfc5oqgRdkxBCmwIQW4pJMYvwAAK645IBDcjcP7dZuqm_bVaFObF0kr76tysodQSiTRRt2TZKF7XZX_-EszFbJOlb1W5I9r67IeWk30U9-65is5_cv2QNdPi0es9mSNlxgR9EJj4ynBVgUhcV86kQp8yKX4FBK7aRWJabKc2m5mFq0DItCO51bxzzmOCb8uDc2bX_atyYP4TMaBmbvzfQSDJr-dXNwZPbe-pA4hpo2fO187Izfp5yvu9Zu3LttOt9GI1MuNaBRIIzkGn8AuzVsvw |
ContentType | Book Chapter |
Copyright | Springer Nature Switzerland AG 2022 |
Copyright_xml | – notice: Springer Nature Switzerland AG 2022 |
DBID | FFUUA |
DEWEY | 004.35 |
DOI | 10.1007/978-3-030-96772-7_58 |
DatabaseName | ProQuest Ebook Central - Book Chapters - Demo use only |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 9783030967727 3030967727 |
EISSN | 1611-3349 |
Editor | Sang, Yingpeng Fox, Geoffrey Malek, Manu Shen, Hong Arabnia, Hamid R Xiao, Nong Gupta, Ajay Zhang, Yong |
Editor_xml | – sequence: 1 fullname: Sang, Yingpeng – sequence: 2 fullname: Arabnia, Hamid R – sequence: 3 fullname: Fox, Geoffrey – sequence: 4 fullname: Malek, Manu – sequence: 5 fullname: Shen, Hong – sequence: 6 fullname: Xiao, Nong – sequence: 7 fullname: Gupta, Ajay – sequence: 8 fullname: Zhang, Yong |
EndPage | 628 |
ExternalDocumentID | EBC6926803_704_628 |
GroupedDBID | 38. AABBV AAZWU ABSVR ABTHU ABVND ACBPT ACHZO ACPMC ADNVS AEDXK AEJLV AEKFX AHVRR AIYYB ALMA_UNASSIGNED_HOLDINGS BBABE CZZ FFUUA I4C IEZ SBO TPJZQ TSXQS Z7R Z7U Z7X Z7Z Z81 Z83 Z84 Z85 Z88 -DT -GH -~X 1SB 29L 2HA 2HV 5QI 875 AASHB ABMNI ACGFS ADCXD AEFIE EJD F5P FEDTE HVGLF LAS LDH P2P RNI RSU SVGTG VI1 ~02 |
ID | FETCH-LOGICAL-p243t-3c4e3129d0a34da3b5c4f6bdb60c3668c687f397e26a245a3a13dd8c8bac1e3b3 |
ISBN | 9783030967710 3030967719 |
ISSN | 0302-9743 |
IngestDate | Wed Sep 17 04:24:53 EDT 2025 Thu May 29 01:21:49 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
LCCallNum | QA75.5-76.95 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-p243t-3c4e3129d0a34da3b5c4f6bdb60c3668c687f397e26a245a3a13dd8c8bac1e3b3 |
OCLC | 1305014844 |
PQID | EBC6926803_704_628 |
PageCount | 13 |
ParticipantIDs | springer_books_10_1007_978_3_030_96772_7_58 proquest_ebookcentralchapters_6926803_704_628 |
PublicationCentury | 2000 |
PublicationDate | 2022 |
PublicationDateYYYYMMDD | 2022-01-01 |
PublicationDate_xml | – year: 2022 text: 2022 |
PublicationDecade | 2020 |
PublicationPlace | Switzerland |
PublicationPlace_xml | – name: Switzerland – name: Cham |
PublicationSeriesSubtitle | Theoretical Computer Science and General Issues |
PublicationSeriesTitle | Lecture Notes in Computer Science |
PublicationSeriesTitleAlternate | Lect.Notes Computer |
PublicationSubtitle | 22nd International Conference, PDCAT 2021, Guangzhou, China, December 17-19, 2021, Proceedings |
PublicationTitle | Parallel and Distributed Computing, Applications and Technologies |
PublicationYear | 2022 |
Publisher | Springer International Publishing AG Springer International Publishing |
Publisher_xml | – name: Springer International Publishing AG – name: Springer International Publishing |
RelatedPersons | Hartmanis, Juris Gao, Wen Bertino, Elisa Woeginger, Gerhard Goos, Gerhard Steffen, Bernhard Yung, Moti |
RelatedPersons_xml | – sequence: 1 givenname: Gerhard surname: Goos fullname: Goos, Gerhard – sequence: 2 givenname: Juris surname: Hartmanis fullname: Hartmanis, Juris – sequence: 3 givenname: Elisa surname: Bertino fullname: Bertino, Elisa – sequence: 4 givenname: Wen surname: Gao fullname: Gao, Wen – sequence: 5 givenname: Bernhard orcidid: 0000-0001-9619-1558 surname: Steffen fullname: Steffen, Bernhard – sequence: 6 givenname: Gerhard orcidid: 0000-0001-8816-2693 surname: Woeginger fullname: Woeginger, Gerhard – sequence: 7 givenname: Moti orcidid: 0000-0003-0848-0873 surname: Yung fullname: Yung, Moti |
SSID | ssj0002726203 ssj0002792 |
Score | 2.046904 |
Snippet | With the rapid expansion of Internet of Things (IoT), Constrained Application Protocol (CoAP) is developed to enable those devices with small memory,... |
SourceID | springer proquest |
SourceType | Publisher |
StartPage | 616 |
SubjectTerms | CoAP CSP Group communication Modeling Verification |
Title | Formalization and Verification of Group Communication CoAP Using CSP |
URI | http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=6926803&ppg=628 http://link.springer.com/10.1007/978-3-030-96772-7_58 |
Volume | 13148 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07b9swECacdCk69I2mL2hoJkOFJNKkNHQw3BhBkAZF80DQheBLaIDCLmJ56S_pmN-SX9Y7krIkN0u6CDYhiNJ9B_J4d98dIR-cQu9ElaW21FXKODepsnWWmkLlDuxxIxy6Br6c8MNzdnQ5uRyN_vSyltaN_mh-38kr-R9UYQxwRZbsPZDdPBQG4DfgC1dAGK5bxu_QzRqKXqhr7IMSqP6fsf4ttq5Ch61v1BB7lUx7AWp_58aX3ssenEWKxunV4mqToePD_N865fn-Y-33qTWSTJZ9VZuj3fszEjpxkv1ZsT_NLkAEdZwbbNIwGJxfA1oK_Jt-HYfchdlp4ACg-Nzq03GMcJwsG584Nm6bULRrUt9pURRbTovWabnl9uw8b4NTLsUwEBci5r9Gthes5HAWCoujC4s3x5KMNJRAjQsyz3lvb-eBiP7PttHPFIEnpzgbHDzkpNwhO0LAyvlgenB0fLHx3hUCC_l3ez6WYQzxqvBWyCJq37oKdZ66r-gxOO-acnDW2QrPe6vn7Al5hEyYBCkqIL-nZOQWz8jjFoIkQvCczAcKkIAC3N70wU-W9e2NBz4ZAJ8g8IkHPgHgX5Dz-cHZ7DCN_TnSXwWjTUoNcxTsRZspyqyiemJYzbXVPDOU89LwUtRg77qCq4JNFFU5tbY0pVYmd1TTl2R3sVy4VyTBnmki00rbyjGdKy2YZlnJlBF1XTK7R9JWJtJnEcTUZRMksJK8KniZUSkyJgHlPTJuBSfx9pVsy3ODxCWVIHHpJS5R4q_vdfcb8rBT6bdkt7leu3dgmTb6fVSTv--Sh0Q |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Parallel+and+Distributed+Computing%2C+Applications+and+Technologies&rft.au=Chen%2C+Sini&rft.au=Li%2C+Ran&rft.au=Zhu%2C+Huibiao&rft.atitle=Formalization+and%C2%A0Verification+of%C2%A0Group+Communication+CoAP+Using+CSP&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2022-01-01&rft.pub=Springer+International+Publishing&rft.isbn=9783030967710&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=616&rft.epage=628&rft_id=info:doi/10.1007%2F978-3-030-96772-7_58 |
thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F6926803-l.jpg |