| Literature DB >> 36081172 |
Abstract
EnOcean, a commonly used control protocol in smart lighting systems, provides authentication, as well as message integrity verification services, and can resist replay attack and tamper attack. However, since the device identity information transmitted between sensors in smart lighting control systems is easily accessible by malicious attackers, attackers can analyze users' habits based on the intercepted information. This paper analyzed the security of the EnOcean protocol using a formal analysis method based on the colored Petri net (CPN) theory and the Dolev-Yao attacker model and found that the protocol did not anonymize the device identity information and did not have a communication key update mechanism, so an attacker could easily initiate a key compromise impersonation attack (KCIA) after breaking the pre-shared communication key. To address the above security issues, this paper proposed an EnOcean-A protocol with higher security based on the EnOcean protocol. The EnOcean-A protocol introduced a trusted third-party server to send communication keys to communication devices because devices must obtain different communication keys from the trusted third-party server each time they communicated. Thus, this protocol could resist a KCIA and achieve forward security. Meanwhile, the device identity information was anonymized using a homomorphic hash function in the EnOcean-A protocol, and the dynamic update mechanism of the device identity information was added so that an attacker could not obtain the real identity information of the device. Finally, the formal analysis of the EnOcean-A protocol showed that the new protocol could resist a KCIA and ensure the anonymity and untraceability of the communication device, which had higher security compared with the EnOcean protocol.Entities:
Keywords: Dolev–Yao attacker model; EnOcean protocol; colored Petri net; smart lighting control
Mesh:
Year: 2022 PMID: 36081172 PMCID: PMC9460674 DOI: 10.3390/s22176713
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Comparison of related works.
| Main Contribution | Drawbacks | |
|---|---|---|
| Sadri et al. [ | Proposed a two-factor authentication protocol | These three authentication schemes required user’s physical information and were not applicable to device-to-device authentication protocol |
| Banerjee et al. [ | Presented a three-factor authentication scheme | |
| Fakroon et al. [ | Proposed a new authentication scheme that combined physical context | |
| Hajian et al. [ | Suggested an authentication protocol between two devices | Neither of these protocols used a third-party server. The computational performance of lightweight sensor devices could not perform the key computation and complex encryption algorithms, so such designs were not suitable for communication between lightweight sensor devices with limited computational power and storage space |
| Li et al. [ | Proposed an anonymous authentication and key negotiation protocol | |
| Hasan et al. [ | Proposed a lightweight, secure smart home protocol based on mutual anonymous authentication and key negotiation of devices | These two schemes were only applicable for authentication between three points: the user, sensor node, and gateway node. They were not applicable to device-to-device authentication services |
| Banerjee et al. [ | Suggested a more secure and robust authentication scheme | |
| Rasheed et al. [ | Proposed a zero-knowledge proof-based authentication mechanism | This approach could be used with a multicast environment’s identity authentication protocol. It was not necessary to authenticate between two nodes |
| Shuai et al. [ | Proposed an efficient, anonymous authentication scheme based on ECC for smart home environments | The ECC public key encryption scheme was used in this scheme, which has a certain demand on the performance of the device. However, the computational performance of lightweight sensor devices could not accomplish the key computation and the complex encryption algorithm |
| Kumar et al. [ | Suggested an anonymous security framework for smart home environments | The device information in this scheme did not change dynamically and did not provide untraceability of communication devices |
Symbolic representation of EnOcean communication process.
| Symbol | Definition |
|---|---|
|
| Chip ID of sending device |
|
| Chip ID of receiving device |
|
| Sender A, Receiver B |
|
| Rolling code |
|
| Pre-shared key |
|
| Session key |
|
| Random number |
|
| Payload of telegram |
|
| Cipher-based message authentication code |
|
| Encryption function |
Figure 1EnOcean protocol data flow.
EnOcean protocol color set definitions.
| Key Elements | Color Set Definition |
|---|---|
| ID | colset ID = with ida | idb; |
| RANDOM | colset RANDOM = with rlc | rndb | rndb’ | none; |
| KEY | colset KEY = with S | SA; |
| PAYLOAD | colset PAYLOAD = STRING; |
| MSG1 | colset MSG1 = record ida:ID × idb:ID × enc:ENC_IN1; |
| MSG2 | colset MSG2 = record ida:ID × idb:ID; |
| MSG3 | colset MSG3 = record ida:ID × idb:ID × rnd:Random; |
| MSG4 | colset MSG4 = record ida:ID × idb:ID × enc2:ENC2; |
Figure 2EnOcean protocol top-level model.
Figure 3Substitution transition teach-in internal model.
Figure 4Substitution transition learn internal model.
Figure 5Substitution transition authentication internal model.
Figure 6Substitution transition authentication internal model.
State-space analysis of EnOcean protocol model.
| Type | Number |
|---|---|
| State-Space Nodes | 1380 |
| State-Space Arcs | 3582 |
| Scc Graph Nodes | 1380 |
| Scc Graph Arcs | 3582 |
| Dead Marking | 1 |
| Dead Transition | 0 |
Figure 7EnOcean protocol attacker model.
State space analysis of the model.
| Type | Tamper Attack | Replay Attack | KCIA |
|---|---|---|---|
| State Space Nodes | 7380 | 131 | 4537 |
| State Space Arcs | 24,672 | 280 | 12,318 |
| Scc Graph Nodes | 7380 | 131 | 4537 |
| Scc Graph Arcs | 24,672 | 280 | 12,318 |
| Dead Markings | 1 | 1 | 1 |
| Dead Transitions | 0 | 23 | 0 |
Figure 8Identity authentication result on the receiver.
Figure 9Attacker obtains information query results.
Symbolic representation of EnOcean-A communication process.
| Symbol | Definition |
|---|---|
|
| Old ID of device X |
|
| New ID of device X |
|
| One-way hash function |
|
| |
|
| String |
|
| Device name |
|
| Rolling data |
|
| Payload |
| SK | Session key |
| CK | Communication key |
|
| Random number |
|
| Hash value of device I’s ID |
|
| Device A, Device B, and Server S |
|
| Cipher-based message authentication code |
|
| XOR operation |
|
| Concatenation operation |
|
| Encryption function |
Figure 10EnOcean-A protocol data flow.
Figure 11EnOcean-A top-level model.
Figure 12Substitution transition Authentication_Server internal model.
Figure 13Substitution transition Authentication_A internal model.
Figure 14Tamper attack and replay attack at the network transport layer.
Figure 15KCIA at the network transport layer.
State-space analysis of EnOcean-A protocol.
| Type | EnOcean-A | Tamper Attack | Replay Attack | KCIA |
|---|---|---|---|---|
| State-Space Nodes | 726 | 48 | 9 | 1326 |
| State-Space Arcs | 944 | 47 | 8 | 2224 |
| Scc Graph Nodes | 726 | 48 | 9 | 1326 |
| Scc Graph Arcs | 944 | 47 | 8 | 2224 |
| Dead Markings | 1 | 1 | 1 | 1 |
| Dead Transitions | 0 | 40 | 81 | 4 |
Figure 16Information search in attacker’s place.
Figure 17Information search in trusted third-party server’s place.
Security comparison between EnOcean protocol and EnOcean-A protocol.
| Protocol | Tamper Attack | Replay Attack | Impersonation Attack | KCIA | Anonymity | Unlinkability |
|---|---|---|---|---|---|---|
| EnOcean | × | × | √ | √ | √ | √ |
| EnOcean-A | × | × | × | × | × | × |