Affiliation:
1. School of Software, East China Jiaotong University, Nanchang 330013, China
Abstract
Security protocols are the basis of modern network communication, proving that the security problem of protocols is one of the hot research topics today. The data in industrial IoT are usually transmitted through insecure channels, which brings certain security risks. The Logic of Events is a formal method for proving the security properties of protocols based on event systems. The new theoretical extension is based on the Logic of Events theory, which proposes new event classes Compurte, TimeGap, Construct, and Reconstruct and an axiom AxiomRe and related inference rules for malicious attacks and security privacy issues in emerging protocols, as well as extending the matching descriptions of protocol behaviours in complex cryptographic algorithms and information sharing techniques for applications for the formal analysis of authentication protocols for the Industrial Internet of Things. Finally, formal analysis is carried out using the example of a secure multi-factor authentication protocol for the industrial IoT, which proves the security of the protocol.
Funder
National Natural Science Foundation of China
Jiangxi “Double Thousand Plan”
Jiangxi Provincial Natural Science Foundation
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference22 articles.
1. Efficient heterogeneous signcryption scheme based on Edge Computing for Industrial Internet of Things;Niu;J. Syst. Archit.,2023
2. A systematic survey on internet of things: Energy efficiency and interoperability perspective;Rana;Trans. Emerg. Telecommun. Technol.,2021
3. Industrial internet of things: Challenges, opportunities, and directions;Sisinni;IEEE Trans. Ind. Inform.,2018
4. Implementation of Theorem Prover for PPTL with Indexed Expressions;Wang;J. Softw.,2022
5. Silva, A., and Leino, K.R.M. (2021, January 20–23). GenMC: A model checker for weak memory models. Proceedings of the 33rd International Conference on Computer Aided Verification, Virtual Event.