Abstract
Incompatible updates of IoT systems and protocols give rise to interoperability problems. Even though various protocol adaptation and unknown protocol inference schemes have been proposed, they either do not work where the updated protocol specifications are not given or suffer from inefficiency issues. In this work, we present an efficient protocol inference scheme for incompatible updates in IoT environments. The scheme refines an active automata learning algorithm, L*, by incorporating a knowledge base of the legacy protocol behavior into its membership query selection procedure for updated protocol behavior inference. It also infers protocol syntax based on our previous work that computes the most probable message field updates and adapts the legacy protocol message accordingly. We evaluate the proposed scheme with two case studies with the most popular IoT protocols and prove that it infers updated protocols efficiently while improving the L* algorithm’s performance for resolving the incompatibility.
- [1] . 2010. Generating models of infinite-state communication protocols using regular inference with abstraction. In Proceedings of the IFIP International Conference on Testing Software and Systems. 188–204. Google Scholar
Digital Library
- [2] . 1987. Learning regular sets from queries and counterexamples. Information and Computation 75, 2 (1987), 87–106. Google Scholar
Digital Library
- [3] . 2002. The nonstochastic multiarmed bandit problem. SIAM Journal on Computing 32, 1 (2002), 48–77. Google Scholar
Digital Library
- [4] . 2019. Automated synthesis of application-layer connectors from automata-based specifications. Journal of Computer and System Sciences 104 (2019), 17–40.Google Scholar
Cross Ref
- [5] . 2013. The role of models@ run.time in supporting on-the-fly interoperability. Computing 95, 3 (2013), 167–190. Google Scholar
Digital Library
- [6] . 2014. Automated synthesis of mediators to support component interoperability. IEEE Transactions on Software Engineering 41, 3 (2014), 221–240.Google Scholar
Digital Library
- [7] . 2011. Automatic service categorisation through machine learning in emergent middleware. In Proceedings of the International Symposium on Formal Methods for Components and Objects. 133–149.Google Scholar
- [8] . 2014. IoT interoperability: A hub-based approach. In Proceedings of the 2014 International Conference on the Internet of Things
(IOT’14) . IEEE, Los Alamitos, CA, 79–84.Google ScholarCross Ref
- [9] . 2011. Starlink: Runtime interoperability between heterogeneous middleware protocols. In Proceedings of the 2011 31st International Conference on Distributed Computing Systems. IEEE, Los Alamitos, CA, 446–455. Google Scholar
Digital Library
- [10] . 2009. Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering. In Proceedings of the 16th ACM Conference on Computer and Communications Security. ACM, New York, NY, 621–634. Google Scholar
Digital Library
- [11] . 2007. Architecture of a bidirectional Bluetooth-UPNP proxy. In Proceedings of the 4th Annual IEEE Consumer Communications and Networking Conference
(CCNC’07) . IEEE, Los Alamitos, CA, 34–38. Google ScholarDigital Library
- [12] . 2017. Eclipse Paho (1.2.0). Retrieved September 24, 2021 from https://www.eclipse.org/paho/.Google Scholar
- [13] . 2018. JProfiler. Retrieved September 24, 2021 from https://www.ej-technologies.com/products/jprofiler/overview.html.Google Scholar
- [14] . 2013. Dynamic adapter reconfiguration in the context of business protocol evolution. In Proceedings of the 2013 IEEE 16th International Conference on Computational Science and Engineering
(CSE’13) . IEEE, Los Alamitos, CA, 301–308. Google ScholarDigital Library
- [15] . 2014. Learning fragments of the TCP network protocol. In Proceedings of the International Workshop on Formal Methods for Industrial Critical Systems. 78–93.Google Scholar
Cross Ref
- [16] . 1961. Lincos, design of a language for cosmic intercourse, part I, studies in logic and the foundations of mathematics. (1961).Google Scholar
- [17] . 2012. Overstar: An open approach to end-to-end middleware services in systems of systems. In Proceedings of the ACM/IFIP/USENIX International Conference on Distributed Systems Platforms and Open Distributed Processing. 229–248. Google Scholar
Digital Library
- [18] . 2011. Universal Semantic Communication. Springer Science & Business Media. Google Scholar
Digital Library
- [19] . 2014. Semantic interoperability architecture for pervasive computing and Internet of Things. IEEE Access 2 (2014), 856–873.Google Scholar
Cross Ref
- [20] . 2012. Seamless integration of heterogeneous devices and access control in smart homes. In Proceedings of the 2012 8th International Conference on Intelligent Environments. IEEE, Los Alamitos, CA, 206–213. Google Scholar
Digital Library
- [21] . 2018. PRETT: Protocol reverse engineering using binary tokens and network traces. In Proceedings of the IFIP International Conference on ICT Systems Security and Privacy Protection. 141–155.Google Scholar
Cross Ref
- [22] . 2019. Towards dynamically reconfigurable IoT camera virtualization for video analytics edge cloud services. IEEE Internet Computing 23, 4 (2019), 10–17.Google Scholar
Cross Ref
- [23] . 1996. Conformance testing of protocols specified as communicating finite state machines-a guided random walk based approach. IEEE Transactions on Communications 44, 5 (1996), 631–640.Google Scholar
Cross Ref
- [24] . 1994. A behavioral notion of subtyping. ACM Transactions on Programming Languages and Systems 16, 6 (1994), 1811–1841. Google Scholar
Digital Library
- [25] . 2013. Extracting sent message formats from executables using backward slicing. In Proceedings of the 2013 4th International Conference on Emerging Intelligent Data and Web Technologies. IEEE, Los Alamitos, CA, 377–384. Google Scholar
Digital Library
- [26] . 2013. Position-based automatic reverse engineering of network protocols. Journal of Network and Computer Applications 36, 3 (2013), 1070–1077.Google Scholar
Cross Ref
- [27] . 2011. Adaptation of service protocols using process algebra and on-the-fly reduction techniques. IEEE Transactions on Software Engineering 38, 4 (2011), 755–777. Google Scholar
Digital Library
- [28] . 2010. Protocol-aware matching of web service interfaces for adapter development. In Proceedings of the 19th International Conference on World Wide Web. ACM, New York, NY, 731–740. Google Scholar
Digital Library
- [29] . 2017. Moquette MQTT. Retrieved September 24, 2021 from https://projects.eclipse.org/projects/iot.moquette.Google Scholar
- [30] . 2006. A bridging framework for universal interoperability in pervasive systems. In Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
(ICDCS’06) . IEEE, Los Alamitos, CA, 3. Google ScholarDigital Library
- [31] . 2018. Netty Project (4.1.25). Retrieved September 24, 2021 from http://netty.io/.Google Scholar
- [32] . 1994. Usability Engineering. Elsevier.Google Scholar
Digital Library
- [33] . 2018. Opportunistic edge computing: Concepts, opportunities and research challenges. Future Generation Computer Systems 89 (2018), 633–645.Google Scholar
Digital Library
- [34] . 2011. InterX: A service interoperability gateway for heterogeneous smart objects. In Proceedings of the 2011 IEEE International Conference on Pervasive Computing and Communications Workshops
(PERCOM Workshops’11) . IEEE, Los Alamitos, CA, 233–238.Google ScholarCross Ref
- [35] . 2015. A layered interface-adaptation architecture for distributed component-based systems. Future Generation Computer Systems 47 (2015), 113–126. Google Scholar
Digital Library
- [36] . 2009. LearnLib: A framework for extrapolating behavioral models. International Journal on Software Tools for Technology Transfer 11, 5 (2009), 393. Google Scholar
Digital Library
- [37] . 2008. JSLP project, Java Service Location Protocol, Retrieved October 4, 2021 from http://jslp.sourceforge.netGoogle Scholar
- [38] . 2018. Rational interoperability: A pragmatic path toward a data-centric IoT. In Proceedings of the 2018 IEEE 38th International Conference on Distributed Computing Systems
(ICDCS’18) . IEEE, Los Alamitos, CA, 1139–1149.Google ScholarCross Ref
- [39] . 2016. Edge computing: Vision and challenges. IEEE Internet of Things Journal 3, 5 (2016), 637–646.Google Scholar
Cross Ref
- [40] . 2019. Towards interactive networking: Runtime message inference approach for incompatible protocol updates in IoT environments. Future Generation Computer Systems 96 (2019), 563–578.Google Scholar
Cross Ref
- [41] . 2011. Introduction to active automata learning from a practical perspective. In Formal Methods for Eternal Networked Software Systems. Lecture Notes in Computer Science, Vol. 6659. Springer, 256–296.Google Scholar
- [42] . 2018. Extending automated protocol state learning for the 802.11 4-way handshake. In Proceedings of the European Symposium on Research in Computer Security. 325–345.Google Scholar
- [43] . 2010. Vision and challenges for realising the Internet of Things. Cluster of European Research Projects on the Internet of Things, European Commission 3, 3 (2010), 34–36.Google Scholar
- [44] . 2017. Model-based testing IoT communication via active automata learning. In Proceedings of the 2017 IEEE International Conference on Software Testing, Verification, and Validation
(ICST’17) . IEEE, Los Alamitos, CA, 276–287.Google ScholarCross Ref
- [45] . 2011. Biprominer: Automatic mining of binary protocol features. In Proceedings of the 2011 12th International Conference on Parallel and Distributed Computing, Applications, and Technologies. IEEE, Los Alamitos, CA, 179–184. Google Scholar
Digital Library
- [46] . 2015. Engineering self-organizing urban superorganisms. Engineering Applications of Artificial Intelligence 41 (2015), 325–332.Google Scholar
Digital Library
Index Terms
An Efficient Interaction Protocol Inference Scheme for Incompatible Updates in IoT Environments
Recommendations
Towards interactive networking: Runtime message inference approach for incompatible protocol updates in IoT environments
AbstractAs IoT (Internet of Things) devices become pervasive in our surroundings, it is more important for them to dynamically discover and interact with nearby IoT devices. However, as interaction protocols are often updated without backward ...
Highlights- SeM2Bit infers an updated protocol message efficiently based on protocol knowledge.
An efficient certified email protocol
ISC'07: Proceedings of the 10th international conference on Information SecurityA certified email protocol, also known as a nonrepudiation protocol, allows a message to be exchanged for an acknowledgement of reception in a fair manner: a sender Alice sends a message to a receiver Bob if and only if Alice receives a receipt from ...
An efficient fair UC-secure protocol for two-party computation
With the development of modern Internet and mobile networks, there is an increasing need for collaborative privacy-preserving applications. Secure multi-party computation SMPC gives a general solution to these applications and has become a hot topic. ...






Comments