Author:
Feng Tao,Zhang Bugang,Liu Chunyan,Zheng Lu
Abstract
AbstractKNXnet/IP is a KNX-building automation protocol that communicates through an IP network. It is mainly used in the field of smart home and building automation control, allowing remote access to KNX devices through an IP network, so that building functions can be managed and controlled anywhere through an Internet connection. However, with the development of smart homes and building automation, such physical devices based on IP communication are more and more frequently in contact with the Internet, resulting in more and more security issues for home devices and buildings exposed to the Internet. This paper uses the formal analysis method-colored Petri net (CPN) combined with the CPN Tools to model the KNXnet/IP protocol and analyze the protocol interaction process. Based on the Dolev-Yao attacker model, the security of the KNXnet/IP protocol is evaluated and tested, and it is verified whether there are three types of attackable vulnerabilities in the protocol: replay, tampering, and spoofing. After CPN modeling analysis and verification, it is found that tampering and replay vulnerabilities in the original protocol. Therefore, we introduce timestamp and hash to strengthen the security mechanism of the protocol, which ensures the integrity, confidentiality, and freshness of the security mechanism of the protocol. After the final analysis and verification, the improvement scheme proposed in this paper can effectively improve the security performance of the protocol.
Funder
National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Reference28 articles.
1. Association K. Open data communication in building automation. Controls and Building Management-Home and Building Electronic Systems-Part. 2.
2. Vernier and Geneva S. Open data communication in building automation, controls and building management - Home and building electronic systems - KNXnet/IP communication, ISO 22510:2019, International Organization for Standardization. Nov. 2019
3. Feng T, Wu Y. Formal Security Analysis and Improvement Based on LonTalk Authentication Protocol. Secur Commun Networks. 2022. https://doi.org/10.1155/2022/8104884.
4. Wu Y, Feng T. An anonymous authentication and key update mechanism for IoT devices based on EnOcean protocol. Sensors. 2022;22(17):6713. https://doi.org/10.3390/s22176713.
5. Langels H-J, Sector I. KNX IP-using IP networks as KNX medium. in Proceedings of the KNX Scientific Conference 2008.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献