kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Extended Formal Analysis of the EDHOC Protocol in Tamarin
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS. Ericsson Research, Security, Stockholm, Sweden.ORCID iD: 0000-0003-0164-1478
Indian Institute of Technology Delhi, New Delhi, India.
IT University of Copenhagen, Copenhagen, Denmark.
Number of Authors: 42023 (English)In: E-Business and Telecommunications, Springer Nature , 2023, p. 224-248Conference paper, Published paper (Refereed)
Abstract [en]

Given how common IoT devices that use constrained resources are becoming today, the need of the hour is communication protocols which can operate securely under such limitations. For a few years, the Internet Engineering Task Force (IETF) has been working to standardize EDHOC, an authenticated key establishment protocol for such constrained IoT devices. The first version of EDHOC was proposed in 2016. In 2018, Bruni et al. [3] used the ProVerif tool [2] to formally analyze an early version of EDHOC, which had only two key establishment methods. By 2021, the protocol had been fleshed out much more, with multiple new key establishment methods, and this version was formally analyzed using the Tamarin prover [15] in [17]. In this paper, we build on that work, by modifying the model, analyzing some new properties, and discussing some aspects of the latest EDHOC specification. In particular, we extend the modeling in [17] with trusted execution environments (TEEs), modify the way we model XOR encryption, and in addition to the properties verified in [17], we verify weak post-compromise security (PCS) as well as the secrecy and integrity of some additional data used as part of the protocol.

Place, publisher, year, edition, pages
Springer Nature , 2023. p. 224-248
Series
Communications in Computer and Information Science, ISSN 18650929
Keywords [en]
Authenticated key establishment, Formal verification, IoT, Protocols, Symbolic dolev-yao model, Tamarin
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:kth:diva-338050DOI: 10.1007/978-3-031-36840-0_11Scopus ID: 2-s2.0-85172422687OAI: oai:DiVA.org:kth-338050DiVA, id: diva2:1804564
Conference
18th International Joint Conference on e-Business and Telecommunications, ICETE 2021, Virtual/Online, Jul 9 2021 - Jul 6 2021
Note

Part of ISBN 9783031368394

QC 20231013

Available from: 2023-10-13 Created: 2023-10-13 Last updated: 2023-10-13Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Norrman, Karl

Search in DiVA

By author/editor
Norrman, Karl
By organisation
Theoretical Computer Science, TCS
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 144 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf