Computer Modeling of Protocols for a Secure Cyber-physical System of a «Smart Home»

Authors

  • Александр [Aleksandr] Михайлович [M.] Винников [Vinnikov]
  • Мария [Mariya] Александровна [A.] Дедова [Dedova]
  • Наталья [Natalya] Петровна [P.] Кочетова [Kochetova]
  • Александр [Aleksandr] Борисович [B.] Фролов [Frolov]

DOI:

https://doi.org/10.24160/1993-6982-2024-4-158-168

Keywords:

cyber-physical system, combinatorial block design, Blom’s scheme, system of key spaces, «Kuznechik», «Stribog», computer modeling, ZigBee technology

Abstract

The aim of the work is to validate the functionality of a secure wireless sensor network (WSN) based on a multiple key space, characterized by the use of different key subspaces according to the Blom scheme, corresponding to blocks and dual blocks of the combined projective plane (CPP), with scaling effects. The goal is achieved by computer modeling with simulation of the execution of key and information exchange protocols in the WSN. A computer model is used in the form of four programs corresponding to a router, a trusted center with a virtual sleeper node, a virtual router, and a sleeper node. It is assumed that before the initialization stage of the model, there are pre-distributed keys in the trusted center, as well as in sleeping nodes, and each sleeping node has a key corresponding to the CPP block and a key corresponding to the dual CPP block; the trusted center has copies of these keys. At the initialization stage, these keys are used to compute the password and encrypt the Blom scheme pre-keys computed in the trusted center, with which the used keys in sleeping nodes are replaced by the pre-key distribution (initialization) protocol. Secure switching in BSSs is performed using pre-shared keys and node identifiers. If there is an unimplemented sleep node in the route, its functions are simulated in the trusted center by a virtual node by calculating the pre-shared key and performing the necessary operations according to the communication protocol. Computer simulation confirmed the functionality of the preliminary key distribution protocol using the «Stribog» algorithm for generating a password and the «Kuznechik» algorithm for transferring a preliminary key from a trusted center to a sleeping node with integrity verification. The functionality of the secure one-, two- or three-step communication protocol using the same algorithm at each step has been confirmed. The computer model can be used to plan communications in the WSN of a complex cyber-physical smart home system built using technology based on the IEEE 802.15.4 standard and the ZigBee routing protocol, as well as for preliminary testing of a real system. As a result, the security of communications specified by the Blom scheme parameter in a cyber-physical system, including about a thousand sleeping nodes, was confirmed.

Author Biographies

Александр [Aleksandr] Михайлович [M.] Винников [Vinnikov]

Master's Degree of Mathematical and Computer Modeling Dept., NRU MPEI, Affiliation of LLC «SoftEngineering», e-mail: al.vin@bk.ru

Мария [Mariya] Александровна [A.] Дедова [Dedova]

Bachelor of Mathematical and Computer Modeling Dept., NRU MPEI, e-mail: mari.dedova.01@mail.ru

Наталья [Natalya] Петровна [P.] Кочетова [Kochetova]

Master's Degree of Mathematical and Computer Modeling Dept., NRU MPEI, e-mail: kochetovanp@mpei.ru

Александр [Aleksandr] Борисович [B.] Фролов [Frolov]

 Dr.Sci. (Techn.), Professor of Mathematical and Computer Modeling Dept., NRU MPEI, e-mail: frolovab@mpei.ru

References

1. Stinson D.R. Combinatorial Designs: Constructions and Analysis. Berlin: Springer, 2007.
2. Таранников Ю.В. Комбинаторные свойства дискретных структур и приложения к криптологии. М.: МЦНМО, 2014.
3. Barwick S., Gary Ebert G. Unitals in Projective Planes. Springer: Springer Sci. & Business Media, 2008.
4. Çamtepe S.A., Yener B. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks // IEEE/ACM Trans. Networking (TON). 2004. V. 15. Pp. 293—308.
5. Lee J., Stinson D.R. On the Construction of Practical Key Predistribution Schemes for Distributed Sensor Networks Using Combinatorial Designs // ACM Trans. Inf. Syst. Secur. 2008. V. 11(1). Pp. 1—35.
6. Modiri V., Javadi H.H., Anzani M. A Novel Scalable Key Pre-distribution Scheme for Wireless Sensor Networks Based on Residual Design // Wireless Personal Communications. 2017. V. 96. Pp. 2821—2841.
7. Kumar A., Pais A.R. A New Combinatorial Design Based Key Pre-distribution Scheme for Wireless Sensor Networks // J. Ambient Intelligence and Humanized Computing. 2018. V. 10. Pp. 2401—2416.
8. Blom R. An Optimal Class of Symmetric Key Generation Systems // Advances in Cryptology: Proc. of EUROCRYPT. Lecture Notes in Computer Sci. 1985. V. 209. Pp. 335—338.
9. Du W. e. a. A Pairwise Key Predistribution Scheme for Wireless Sensor Networks // ACM Trans. Inf. Syst. Secur. 2005. V. 8. Pp. 228—258.
10. Urivskiy A. Key Predistribution Scheme Using Affine Planes and Blom’s Scheme [Электрон. ресурс] https://iitp.ru/upload/content/839/Urivskiy.pdf (дата обращения 01.02.2023).
11. Кочетова Н.П., Фролов А.Б. Масштабирование сетей и их ключевых систем на основе совмещенных комбинаторных блок-дизайнов // Информационные технологии. 2023. № 4. С. 171—182.
12. Gholami K.El., Yassine M.Y., Fatani I. F-E. The IEEE 802.15.4 Standard in Industrial Applications: a Survey // J. Theoretical and Appl. Information Technol. 2021. V. 99. No 15. Pp. 1—17.
13. Kim S.H., Chong P.K., Kim T. Performance Study of Routing Protocols in ZigBee Wireless Mesh Networks // Wireless Personal Communications. 2017. V. 95. Pp. 1829—1853.
14. Kim T. e. a. Neighbor Table-based Shortcut Tree Routing in Zigbee Wireless Networks // IEEE Trans. Parallel and Distributed Systems. 2014. V. 25(3). Pp. 706—716.
15. Gomez C., Paradells J. Wireless Home Automation Networks: а Survey of Architectures and Technologies // IEEE Communications Magazine. 2010. V. 48(6). Pp. 92—101.
16. Фролов А.Б., Кочетова Н.П. О схемах предварительного распределения ключей и ключевых пространств в беспроводных сенсорных сетях со структурой комбинаторного блок-дизайна // Вестник МЭИ. 2023. № 4. С. 162—176.
17. ГОСТ Р 34.11—2018. Информационная технология. Криптографическая защита информации. Функция хеширования.
18. ГОСТ Р 34.12—2015. Информационная технология. Криптографическая защита информации. Блочные шифры.
19. ГОСТ Р 34.13—2015. Информационная технология. Криптографическая защита информации. Режимы работы блочных шифров.
20. Frolov A.B., Vinnikov A.M. Modeling Cryptographic Protocols Using Computer Algebra Systems // Proc. V Intern. Conf. Information Technol. in Engineering Education. 2020. Pp. 1—4.
21. SageMath — Open-Source Mathematical Software System [Офиц. сайт] https://www.sagemath.org/ (дата обращения 23.04.2023).
22. Frolov A., Vinnikov A. FSM Simulation of Cryptographic Protocols Using Algebraic Processor // Advances in Intelligent Systems and Computing. 2014. V. 286. Pp. 189—198.
---
Для цитирования: Винников А.М., Дедова М.А., Кочетова Н.П., Фролов А.Б. Компьютерное моделирование протоколов безопасной киберфизической системы «умного дома» // Вестник МЭИ. 2024. № 4. С. 158—168. DOI: 10.24160/1993-6982-2024-4-158-168
---
Конфликт интересов: авторы заявляют об отсутствии конфликта интересов
#
1. Stinson D.R. Combinatorial Designs: Constructions and Analysis. Berlin: Springer, 2007.
2. Tarannikov Yu.V. Kombinatornye Svoystva Diskretnykh Struktur i Prilozheniya k Kriptologii. M.: MTSNMO, 2014. (in Russian).
3. Barwick S., Gary Ebert G. Unitals in Projective Planes. Springer: Springer Sci. & Business Media, 2008.
4. Çamtepe S.A., Yener B. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. IEEE/ACM Trans. Networking (TON). 2004;15:293—308.
5. Lee J., Stinson D.R. On the Construction of Practical Key Predistribution Schemes for Distributed Sensor Networks Using Combinatorial Designs. ACM Trans. Inf. Syst. Secur. 2008;11(1):1—35.
6. Modiri V., Javadi H.H., Anzani M. A Novel Scalable Key Pre-distribution Scheme for Wireless Sensor Networks Based on Residual Design. Wireless Personal Communications. 2017;96:2821—2841.
7. Kumar A., Pais A.R. A New Combinatorial Design Based Key Pre-distribution Scheme for Wireless Sensor Networks. J. Ambient Intelligence and Humanized Computing. 2018;10:2401—2416.
8. Blom R. An Optimal Class of Symmetric Key Generation Systems. Advances in Cryptology: Proc. of EUROCRYPT. Lecture Notes in Computer Sci. 1985;209:335—338.
9. Du W. e. a. A Pairwise Key Predistribution Scheme for Wireless Sensor Networks. ACM Trans. Inf. Syst. Secur. 2005;8:228—258.
10. Urivskiy A. Key Predistribution Scheme Using Affine Planes and Blom’s Scheme [Elektron. Resurs] https://iitp.ru/upload/content/839/Urivskiy.pdf (Data Obrashcheniya 01.02.2023).
11. Kochetova N.P., Frolov A.B. Masshtabirovanie Setey i Ikh Klyuchevykh Sistem na Osnove Sovmeshchennykh Kombinatornykh Blok-dizaynov. Informatsionnye Tekhnologii. 2023;4:171—182. (in Russian).
12. Gholami K.El., Yassine M.Y., Fatani I. F-E. The IEEE 802.15.4 Standard in Industrial Applications: a Survey. J. Theoretical and Appl. Information Technol. 2021;99;15:1—17.
13. Kim S.H., Chong P.K., Kim T. Performance Study of Routing Protocols in ZigBee Wireless Mesh Networks. Wireless Personal Communications. 2017;95:1829—1853.
14. Kim T. e. a. Neighbor Table-based Shortcut Tree Routing in Zigbee Wireless Networks. IEEE Trans. Parallel and Distributed Systems. 2014;25(3):706—716.
15. Gomez C., Paradells J. Wireless Home Automation Networks: а Survey of Architectures and Technologies. IEEE Communications Magazine. 2010;48(6):92—101.
16. Frolov A.B., Kochetova N.P. O Skhemakh Predvaritel'nogo Raspredeleniya Klyuchey i Klyuchevykh Prostranstv v Besprovodnykh Sensornykh Setyakh so Strukturoy Kombinatornogo Blok-dizayna. Vestnik MEI. 2023;4:162—176. (in Russian).
17. GOST R 34.11—2018. Informatsionnaya Tekhnologiya. Kriptograficheskaya Zashchita Informatsii. Funktsiya Kheshirovaniya. (in Russian).
18. GOST R 34.12—2015. Informatsionnaya Tekhnologiya. Kriptograficheskaya Zashchita Informatsii. Blochnye Shifry. (in Russian).
19. GOST R 34.13—2015. Informatsionnaya Tekhnologiya. Kriptograficheskaya Zashchita Informatsii. Rezhimy Raboty Blochnykh Shifrov. (in Russian).
20. Frolov A.B., Vinnikov A.M. Modeling Cryptographic Protocols Using Computer Algebra Systems. Proc. V Intern. Conf. Information Technol. in Engineering Education. 2020:1—4.
21. SageMath — Open-Source Mathematical Software System [Ofits. Sayt] https://www.sagemath.org/ (Data Obrashcheniya 23.04.2023).
22. Frolov A., Vinnikov A. FSM Simulation of Cryptographic Protocols Using Algebraic Processor. Advances in Intelligent Systems and Computing. 2014;286:189—198
---
For citation: Vinnikov A.M., Dedova M.A., Kochetova N.P., Frolov A.B. Computer Modeling of Protocols for a Secure Cyber-physical System of a «Smart Home». Bulletin of MPEI. 2024;4:158—168. (in Russian). DOI: 10.24160/1993-6982-2024-4-158-168
---
Conflict of interests: the authors declare no conflict of interest

Published

2024-06-18

Issue

Section

Computing systems and their elements (technical sciences) (2.3.2.)