Abstract
The Data Distribution Service (DDS) for real-time systems is an industrial Internet communication protocol. Due to its distributed high reliability and the ability to transmit device data communication in real-time, it has been widely used in industry, medical care, transportation, and national defense. With the wide application of various protocols, protocol security has become a top priority. There are many studies on protocol security, but these studies lack a formal security assessment of protocols. Based on the above status, this paper evaluates and improves the security of the DDS protocol using a model detection method combining the Dolev–Yao attack model and the Coloring Petri Net (CPN) theory. Because of the security loopholes in the original protocol, a timestamp was introduced into the original protocol, and the shared key establishment process in the original protocol lacked fairness and consistency. We adopted a new establishment method to establish the shared secret and re-verified its security. The results show that the overall security of the protocol has been improved by 16.7% while effectively preventing current replay attack.
Subject
Computer Networks and Communications
Reference40 articles.
1. Nebbione, G., and Calzarossa, M.C. (2020). Security of IoT application layer protocols: Challenges and findings. Future Internet, 12.
2. Yassein, M.B., and Shatnawi, M.Q. (2016, January 22–24). Application layer protocols for the Internet of Things: A survey. Proceedings of the International Conference on Engineering and MIS (ICEMIS), Agadir, Morocco.
3. Mahmoud, R., Yousuf, T., and Aloul, F. (2015, January 14–16). Internet of things (IoT) security: Current status, challenges and prospective measures. Proceedings of the 10th International Conference for Internet Technology and Secured Transactions (ICITST), London, UK.
4. Industrial Application Architecture IoT and protocols AMQP, MQTT, JMS, REST, CoAP, XMPP, DDS;Seleznev;Int. J. Open Inf. Technol.,2019
5. DDS vs. MQTT vs. VSL for IoT;Aures;Network,2019
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献