Cargando…

A Formal Verification of a Reputation Multi-Factor Authentication Mechanism for Constrained Devices and Low-Power Wide-Area Network Using Temporal Logic

There are many security challenges in IoT, especially related to the authentication of restricted devices in long-distance and low-throughput networks. Problems such as impersonation, privacy issues, and excessive battery usage are some of the existing problems evaluated through the threat modeling...

Descripción completa

Detalles Bibliográficos
Autores principales: Bezerra, Wesley R., Martina, Jean E., Westphall, Carlos B.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10422480/
https://www.ncbi.nlm.nih.gov/pubmed/37571715
http://dx.doi.org/10.3390/s23156933
_version_ 1785089220733304832
author Bezerra, Wesley R.
Martina, Jean E.
Westphall, Carlos B.
author_facet Bezerra, Wesley R.
Martina, Jean E.
Westphall, Carlos B.
author_sort Bezerra, Wesley R.
collection PubMed
description There are many security challenges in IoT, especially related to the authentication of restricted devices in long-distance and low-throughput networks. Problems such as impersonation, privacy issues, and excessive battery usage are some of the existing problems evaluated through the threat modeling of this work. A formal assessment of security solutions for their compliance in addressing such threats is desirable. Although several works address the verification of security protocols, verifying the security of components and their non-locking has been little explored. This work proposes to analyze the design-time security of the components of a multi-factor authentication mechanism with a reputation regarding security requirements that go beyond encryption or secrecy in data transmission. As a result, it was observed through temporal logic that the mechanism is deadlock-free and meets the requirements established in this work. Although it is not a work aimed at modeling the security mechanism, this document provides the necessary details for a better understanding of the mechanism and, consequently, the process of formal verification of its security properties.
format Online
Article
Text
id pubmed-10422480
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-104224802023-08-13 A Formal Verification of a Reputation Multi-Factor Authentication Mechanism for Constrained Devices and Low-Power Wide-Area Network Using Temporal Logic Bezerra, Wesley R. Martina, Jean E. Westphall, Carlos B. Sensors (Basel) Article There are many security challenges in IoT, especially related to the authentication of restricted devices in long-distance and low-throughput networks. Problems such as impersonation, privacy issues, and excessive battery usage are some of the existing problems evaluated through the threat modeling of this work. A formal assessment of security solutions for their compliance in addressing such threats is desirable. Although several works address the verification of security protocols, verifying the security of components and their non-locking has been little explored. This work proposes to analyze the design-time security of the components of a multi-factor authentication mechanism with a reputation regarding security requirements that go beyond encryption or secrecy in data transmission. As a result, it was observed through temporal logic that the mechanism is deadlock-free and meets the requirements established in this work. Although it is not a work aimed at modeling the security mechanism, this document provides the necessary details for a better understanding of the mechanism and, consequently, the process of formal verification of its security properties. MDPI 2023-08-03 /pmc/articles/PMC10422480/ /pubmed/37571715 http://dx.doi.org/10.3390/s23156933 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Bezerra, Wesley R.
Martina, Jean E.
Westphall, Carlos B.
A Formal Verification of a Reputation Multi-Factor Authentication Mechanism for Constrained Devices and Low-Power Wide-Area Network Using Temporal Logic
title A Formal Verification of a Reputation Multi-Factor Authentication Mechanism for Constrained Devices and Low-Power Wide-Area Network Using Temporal Logic
title_full A Formal Verification of a Reputation Multi-Factor Authentication Mechanism for Constrained Devices and Low-Power Wide-Area Network Using Temporal Logic
title_fullStr A Formal Verification of a Reputation Multi-Factor Authentication Mechanism for Constrained Devices and Low-Power Wide-Area Network Using Temporal Logic
title_full_unstemmed A Formal Verification of a Reputation Multi-Factor Authentication Mechanism for Constrained Devices and Low-Power Wide-Area Network Using Temporal Logic
title_short A Formal Verification of a Reputation Multi-Factor Authentication Mechanism for Constrained Devices and Low-Power Wide-Area Network Using Temporal Logic
title_sort formal verification of a reputation multi-factor authentication mechanism for constrained devices and low-power wide-area network using temporal logic
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10422480/
https://www.ncbi.nlm.nih.gov/pubmed/37571715
http://dx.doi.org/10.3390/s23156933
work_keys_str_mv AT bezerrawesleyr aformalverificationofareputationmultifactorauthenticationmechanismforconstraineddevicesandlowpowerwideareanetworkusingtemporallogic
AT martinajeane aformalverificationofareputationmultifactorauthenticationmechanismforconstraineddevicesandlowpowerwideareanetworkusingtemporallogic
AT westphallcarlosb aformalverificationofareputationmultifactorauthenticationmechanismforconstraineddevicesandlowpowerwideareanetworkusingtemporallogic
AT bezerrawesleyr formalverificationofareputationmultifactorauthenticationmechanismforconstraineddevicesandlowpowerwideareanetworkusingtemporallogic
AT martinajeane formalverificationofareputationmultifactorauthenticationmechanismforconstraineddevicesandlowpowerwideareanetworkusingtemporallogic
AT westphallcarlosb formalverificationofareputationmultifactorauthenticationmechanismforconstraineddevicesandlowpowerwideareanetworkusingtemporallogic