Towards a Formal Modelling, Analysis, and Verification of a Clone Node Attack Detection Scheme in the Internet of Things

08/23/2021
by   Khizar Hameed, et al.
0

In a clone node attack, an attacker attempted to physically capture the devices to gather sensitive information to conduct various insider attacks. Several solutions for detecting clone node attacks on IoT networks have been presented in the viewpoints above. These solutions are focused on specific system designs, processes, and feature sets and act as a high-level abstraction of underlying system architectures based on a few performance requirements. However, critical features like formal analysis, modelling, and verification are frequently overlooked in existing proposed solutions aimed at verifying the correctness and robustness of systems in order to ensure that no problematic scenarios or anomalies exist. This paper presents a formal analysis, modelling, and verification of our existing proposed clone node attack detection scheme in IoT. Firstly, we modelled the architectural components of the proposed scheme using High-Level Petri Nets (HLPNs) and then mapped them using their specified functionalities. Secondly, we defined and analysed the behavioural properties of the proposed scheme using Z specification language. Furthermore, we used the Satisfiability Modulo Theories Library (SMT-Lib) and the Z3 Solver to validate and demonstrate the overall functionality of the proposed scheme. Finally, in addition to modelling and analysis, this work employs Coloured Petri Nets (CPNs), which combine Petri Nets with a high-level programming language, making them more suitable for large-scale system modelling. To perform the simulations in CPN, we used both timed and untimed models, where timed models are used to evaluate performance, and untimed models are used to validate logical validity.

READ FULL TEXT

page 22

page 24

page 26

research
06/30/2021

A Context-Aware Information-Based Clone Node Attack Detection Scheme in Internet of Things

The rapidly expanding nature of the Internet of Things (IoT) networks is...
research
03/06/2022

Formal Transformation from Sequence Diagrams to Coloured Petri Nets

In this paper we define a formal strongly consistent transformation from...
research
02/15/2023

Correlation-Aware Neural Networks for DDoS Attack Detection In IoT Systems

We present a comprehensive study on applying machine learning to detect ...
research
11/08/2019

A Novel Sybil Attack Detection Scheme Based on Edge Computing for Mobile IoT Environment

Internet of things (IoT) connects all items to the Internet through info...
research
01/08/2023

A Verification Framework for Component-Based Modeling and Simulation Putting the pieces together

In this thesis a comprehensive verification framework is proposed to con...
research
05/02/2022

Attack Detection for Networked Control Systems Using Event-Triggered Dynamic Watermarking

Dynamic watermarking schemes can enhance the cyber attack detection capa...
research
11/02/2017

Formal Analysis of Hybrid Systems Using Feature Indented Assertions

Model based design is a recommended step in the design of embedded contr...

Please sign up or login with your details

Forgot password? Click here to reset