• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

使用着色 Petri 网对 RPL 协议安全方案进行形式化建模与分析。

Formal modeling and analysis of security schemes of RPL protocol using colored Petri nets.

机构信息

Department of Computer Science, COMSATS University Islamabad, Lahore Campus, Lahore, Pakistan.

Universidad Europea del Atlántico, Santander, Spain.

出版信息

PLoS One. 2023 Aug 17;18(8):e0285700. doi: 10.1371/journal.pone.0285700. eCollection 2023.

DOI:10.1371/journal.pone.0285700
PMID:37590247
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10434935/
Abstract

In the Internet of things (IoT), data packets are accumulated and disseminated across IoT devices without human intervention, therefore the privacy and security of sensitive data during transmission are crucial. For this purpose, multiple routing techniques exist to ensure security and privacy in IoT Systems. One such technique is the routing protocol for low power and lossy networks (RPL) which is an IPv6 protocol commonly used for routing in IoT systems. Formal modeling of an IoT system can validate the reliability, accuracy, and consistency of the system. This paper presents the formal modeling of RPL protocol and the analysis of its security schemes using colored Petri nets that applies formal validation and verification for both the secure and non-secure modes of RPL protocol. The proposed approach can also be useful for formal modeling-based verification of the security of the other communication protocols.

摘要

在物联网 (IoT) 中,数据包在没有人为干预的情况下在 IoT 设备之间累积和传播,因此传输过程中敏感数据的隐私和安全性至关重要。为此,存在多种路由技术来确保 IoT 系统中的安全性和隐私性。其中一种技术是低功耗有损网络 (RPL) 的路由协议,这是一种常用于 IoT 系统中的 IPv6 协议。对 IoT 系统进行形式化建模可以验证系统的可靠性、准确性和一致性。本文使用着色 Petri 网对 RPL 协议进行了形式化建模,并对其安全方案进行了分析,该方法对 RPL 协议的安全和非安全模式都进行了正式验证和确认。该方法还可用于基于形式化建模的其他通信协议的安全性验证。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c747/10434935/f33e2465e3d7/pone.0285700.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c747/10434935/8079309de775/pone.0285700.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c747/10434935/2efe6f20eae0/pone.0285700.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c747/10434935/97e2988e8875/pone.0285700.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c747/10434935/27783898b4ff/pone.0285700.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c747/10434935/37362862c6cf/pone.0285700.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c747/10434935/95a3a443072b/pone.0285700.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c747/10434935/f33e2465e3d7/pone.0285700.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c747/10434935/8079309de775/pone.0285700.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c747/10434935/2efe6f20eae0/pone.0285700.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c747/10434935/97e2988e8875/pone.0285700.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c747/10434935/27783898b4ff/pone.0285700.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c747/10434935/37362862c6cf/pone.0285700.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c747/10434935/95a3a443072b/pone.0285700.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c747/10434935/f33e2465e3d7/pone.0285700.g007.jpg

相似文献

1
Formal modeling and analysis of security schemes of RPL protocol using colored Petri nets.使用着色 Petri 网对 RPL 协议安全方案进行形式化建模与分析。
PLoS One. 2023 Aug 17;18(8):e0285700. doi: 10.1371/journal.pone.0285700. eCollection 2023.
2
Trust and Mobility-Based Protocol for Secure Routing in Internet of Things.基于信任和移动性的物联网安全路由协议
Sensors (Basel). 2022 Aug 18;22(16):6215. doi: 10.3390/s22166215.
3
A secure remote user authentication scheme for 6LoWPAN-based Internet of Things.基于 6LoWPAN 的物联网的安全远程用户认证方案。
PLoS One. 2021 Nov 8;16(11):e0258279. doi: 10.1371/journal.pone.0258279. eCollection 2021.
4
Research on the Security of IPv6 Communication Based on Petri Net under IoT.基于物联网的 IPv6 通信的 Petri 网安全研究。
Sensors (Basel). 2023 May 30;23(11):5192. doi: 10.3390/s23115192.
5
A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things.一种基于信任的物联网中抵御RPL攻击的安全路由模型
Sensors (Basel). 2022 Sep 17;22(18):7052. doi: 10.3390/s22187052.
6
Rank and Wormhole Attack Detection Model for RPL-Based Internet of Things Using Machine Learning.基于机器学习的物联网 RPL 中等级和虫洞攻击检测模型。
Sensors (Basel). 2022 Sep 7;22(18):6765. doi: 10.3390/s22186765.
7
Customised Intrusion Detection for an Industrial IoT Heterogeneous Network Based on Machine Learning Algorithms Called FTL-CID.基于机器学习算法的工业物联网异构网络的定制入侵检测,称为 FTL-CID。
Sensors (Basel). 2022 Dec 28;23(1):321. doi: 10.3390/s23010321.
8
Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security.多移动代理信任框架,用于减轻内部攻击并增强 RPL 安全性。
Sensors (Basel). 2022 Jun 16;22(12):4539. doi: 10.3390/s22124539.
9
Routing Protocols for Low Power and Lossy Networks in Internet of Things Applications.物联网应用中低功耗有损网络的路由协议
Sensors (Basel). 2019 May 9;19(9):2144. doi: 10.3390/s19092144.
10
THC-RPL: A lightweight Trust-enabled routing in RPL-based IoT networks against Sybil attack.THC-RPL:一种基于 RPL 的物联网网络中的轻量级信任启用路由,用于防范 Sybil 攻击。
PLoS One. 2022 Jul 28;17(7):e0271277. doi: 10.1371/journal.pone.0271277. eCollection 2022.

本文引用的文献

1
Petri Net based modeling and analysis for improved resource utilization in cloud computing.基于Petri网的云计算资源利用优化建模与分析
PeerJ Comput Sci. 2021 Feb 8;7:e351. doi: 10.7717/peerj-cs.351. eCollection 2021.
2
Modeling the Internet of Things, Self-Organizing and Other Complex Adaptive Communication Networks: A Cognitive Agent-Based Computing Approach.物联网、自组织及其他复杂自适应通信网络建模:一种基于认知主体的计算方法。
PLoS One. 2016 Jan 26;11(1):e0146760. doi: 10.1371/journal.pone.0146760. eCollection 2016.