skip to main content
research-article

An Efficient Interaction Protocol Inference Scheme for Incompatible Updates in IoT Environments

Authors Info & Claims
Published:22 October 2021Publication History
Skip Abstract Section

Abstract

Incompatible updates of IoT systems and protocols give rise to interoperability problems. Even though various protocol adaptation and unknown protocol inference schemes have been proposed, they either do not work where the updated protocol specifications are not given or suffer from inefficiency issues. In this work, we present an efficient protocol inference scheme for incompatible updates in IoT environments. The scheme refines an active automata learning algorithm, L*, by incorporating a knowledge base of the legacy protocol behavior into its membership query selection procedure for updated protocol behavior inference. It also infers protocol syntax based on our previous work that computes the most probable message field updates and adapts the legacy protocol message accordingly. We evaluate the proposed scheme with two case studies with the most popular IoT protocols and prove that it infers updated protocols efficiently while improving the L* algorithm’s performance for resolving the incompatibility.

REFERENCES

  1. [1] Aarts Fides, Jonsson Bengt, and Uijen Johan. 2010. Generating models of infinite-state communication protocols using regular inference with abstraction. In Proceedings of the IFIP International Conference on Testing Software and Systems. 188204. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Angluin Dana. 1987. Learning regular sets from queries and counterexamples. Information and Computation 75, 2 (1987), 87106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3] Auer Peter, Cesa-Bianchi Nicolo, Freund Yoav, and Schapire Robert E.. 2002. The nonstochastic multiarmed bandit problem. SIAM Journal on Computing 32, 1 (2002), 4877. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Autili Marco, Inverardi Paola, Spalazzese Romina, Tivoli Massimo, and Mignosi Filippo. 2019. Automated synthesis of application-layer connectors from automata-based specifications. Journal of Computer and System Sciences 104 (2019), 17–40.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Bencomo Nelly, Bennaceur Amel, Grace Paul, Blair Gordon, and Issarny Valérie. 2013. The role of models@ run.time in supporting on-the-fly interoperability. Computing 95, 3 (2013), 167190. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. [6] Bennaceur Amel and Issarny Valérie. 2014. Automated synthesis of mediators to support component interoperability. IEEE Transactions on Software Engineering 41, 3 (2014), 221240.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7] Bennaceur Amel, Issarny Valérie, Johansson Richard, Moschitti Alessandro, Spalazzese Romina, and Sykes Daniel. 2011. Automatic service categorisation through machine learning in emergent middleware. In Proceedings of the International Symposium on Formal Methods for Components and Objects. 133149.Google ScholarGoogle Scholar
  8. [8] Blackstock Michael and Lea Rodger. 2014. IoT interoperability: A hub-based approach. In Proceedings of the 2014 International Conference on the Internet of Things (IOT’14). IEEE, Los Alamitos, CA, 7984.Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] Bromberg Yerom-David, Grace Paul, and Réveillère Laurent. 2011. Starlink: Runtime interoperability between heterogeneous middleware protocols. In Proceedings of the 2011 31st International Conference on Distributed Computing Systems. IEEE, Los Alamitos, CA, 446455. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. [10] Caballero Juan, Poosankam Pongsin, Kreibich Christian, and Song Dawn. 2009. Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering. In Proceedings of the 16th ACM Conference on Computer and Communications Security. ACM, New York, NY, 621634. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [11] Delphinanto Archi, Lukkien J. J., Koonen A. M. J., Madureira A. J. P. S., Niemegeers I. G. M. M., Hartog F. T. H. den, and Selgert F.. 2007. Architecture of a bidirectional Bluetooth-UPNP proxy. In Proceedings of the 4th Annual IEEE Consumer Communications and Networking Conference (CCNC’07). IEEE, Los Alamitos, CA, 3438. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. [12] Foundaion Eclipse. 2017. Eclipse Paho (1.2.0). Retrieved September 24, 2021 from https://www.eclipse.org/paho/.Google ScholarGoogle Scholar
  13. [13] ej-technologies. 2018. JProfiler. Retrieved September 24, 2021 from https://www.ej-technologies.com/products/jprofiler/overview.html.Google ScholarGoogle Scholar
  14. [14] Eslamichalandar Maryam, Barkaoui Kamel, and Motahari-Nezhad Hamid Reza. 2013. Dynamic adapter reconfiguration in the context of business protocol evolution. In Proceedings of the 2013 IEEE 16th International Conference on Computational Science and Engineering (CSE’13). IEEE, Los Alamitos, CA, 301308. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. [15] Fiterău-Broştean Paul, Janssen Ramon, and Vaandrager Frits. 2014. Learning fragments of the TCP network protocol. In Proceedings of the International Workshop on Formal Methods for Industrial Critical Systems. 7893.Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Freudenthal Hans. 1961. Lincos, design of a language for cosmic intercourse, part I, studies in logic and the foundations of mathematics. (1961).Google ScholarGoogle Scholar
  17. [17] Grace Paul, Bromberg Yérom-David, Réveillère Laurent, and Blair Gordon. 2012. Overstar: An open approach to end-to-end middleware services in systems of systems. In Proceedings of the ACM/IFIP/USENIX International Conference on Distributed Systems Platforms and Open Distributed Processing. 229248. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. [18] Juba Brendan. 2011. Universal Semantic Communication. Springer Science & Business Media. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. [19] Kiljander Jussi, D’elia Alfredo, Morandi Francesco, Hyttinen Pasi, Takalo-Mattila Janne, Ylisaukko-Oja Arto, Soininen Juha-Pekka, and Cinotti Tullio Salmon. 2014. Semantic interoperability architecture for pervasive computing and Internet of Things. IEEE Access 2 (2014), 856873.Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] Kim Ji Eun, Boulos George, Yackovich John, Barth Tassilo, Beckel Christian, and Mosse Daniel. 2012. Seamless integration of heterogeneous devices and access control in smart homes. In Proceedings of the 2012 8th International Conference on Intelligent Environments. IEEE, Los Alamitos, CA, 206213. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] Lee Choongin, Bae Jeonghan, and Lee Heejo. 2018. PRETT: Protocol reverse engineering using binary tokens and network traces. In Proceedings of the IFIP International Conference on ICT Systems Security and Privacy Protection. 141155.Google ScholarGoogle ScholarCross RefCross Ref
  22. [22] Lee Dongman, Jang Si Young, Shin Byoungheon, and Lee Yoonhyoung. 2019. Towards dynamically reconfigurable IoT camera virtualization for video analytics edge cloud services. IEEE Internet Computing 23, 4 (2019), 10–17.Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Lee David, Sabnani Krishan K., Kristol David M., and Paul Sanjoy. 1996. Conformance testing of protocols specified as communicating finite state machines-a guided random walk based approach. IEEE Transactions on Communications 44, 5 (1996), 631640.Google ScholarGoogle ScholarCross RefCross Ref
  24. [24] Liskov Barbara H. and Wing Jeannette M.. 1994. A behavioral notion of subtyping. ACM Transactions on Programming Languages and Systems 16, 6 (1994), 18111841. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. [25] Liu Min, Jia Chunfu, Liu Lu, and Wang Zhi. 2013. Extracting sent message formats from executables using backward slicing. In Proceedings of the 2013 4th International Conference on Emerging Intelligent Data and Web Technologies. IEEE, Los Alamitos, CA, 377384. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. [26] Luo Jian-Zhen and Yu Shun-Zheng. 2013. Position-based automatic reverse engineering of network protocols. Journal of Network and Computer Applications 36, 3 (2013), 10701077.Google ScholarGoogle ScholarCross RefCross Ref
  27. [27] Mateescu Radu, Poizat Pascal, and Salaün Gwen. 2011. Adaptation of service protocols using process algebra and on-the-fly reduction techniques. IEEE Transactions on Software Engineering 38, 4 (2011), 755777. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. [28] Nezhad Hamid Reza Motahari, Xu Guang Yuan, and Benatallah Boualem. 2010. Protocol-aware matching of web service interfaces for adapter development. In Proceedings of the 19th International Conference on World Wide Web. ACM, New York, NY, 731740. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. [29] Foundation Eclipse. 2017. Moquette MQTT. Retrieved September 24, 2021 from https://projects.eclipse.org/projects/iot.moquette.Google ScholarGoogle Scholar
  30. [30] Nakazawa Jin, Tokuda Hideyuki, Edwards W. Keith, and Ramachandran Umakishore. 2006. A bridging framework for universal interoperability in pervasive systems. In Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS’06). IEEE, Los Alamitos, CA, 3. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. [31] Project Netty. 2018. Netty Project (4.1.25). Retrieved September 24, 2021 from http://netty.io/.Google ScholarGoogle Scholar
  32. [32] Nielsen Jakob. 1994. Usability Engineering. Elsevier.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. [33] Olaniyan Richard, Fadahunsi Olamilekan, Maheswaran Muthucumaru, and Zhani Mohamed Faten. 2018. Opportunistic edge computing: Concepts, opportunities and research challenges. Future Generation Computer Systems 89 (2018), 633645.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. [34] Park Hyunho, Kim Byoungoh, Ko Yangwoo, and Lee Dongman. 2011. InterX: A service interoperability gateway for heterogeneous smart objects. In Proceedings of the 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops’11). IEEE, Los Alamitos, CA, 233238.Google ScholarGoogle ScholarCross RefCross Ref
  35. [35] Pramsohler Thomas, Schenk Simon, Barthels Andreas, and Baumgarten Uwe. 2015. A layered interface-adaptation architecture for distributed component-based systems. Future Generation Computer Systems 47 (2015), 113126. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. [36] Raffelt Harald, Steffen Bernhard, Berg Therese, and Margaria Tiziana. 2009. LearnLib: A framework for extrapolating behavioral models. International Journal on Software Tools for Technology Transfer 11, 5 (2009), 393. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. [37] Rellermeyer Jan S.. 2008. JSLP project, Java Service Location Protocol, Retrieved October 4, 2021 from http://jslp.sourceforge.netGoogle ScholarGoogle Scholar
  38. [38] Schooler Eve M., Milenkovic Milan, Ellis Keith A., McCarthy Jessica, Sedayao Jeff, and McCarson Brian. 2018. Rational interoperability: A pragmatic path toward a data-centric IoT. In Proceedings of the 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS’18). IEEE, Los Alamitos, CA, 11391149.Google ScholarGoogle ScholarCross RefCross Ref
  39. [39] Shi Weisong, Cao Jie, Zhang Quan, Li Youhuizi, and Xu Lanyu. 2016. Edge computing: Vision and challenges. IEEE Internet of Things Journal 3, 5 (2016), 637646.Google ScholarGoogle ScholarCross RefCross Ref
  40. [40] Son Heesuk and Lee Dongman. 2019. Towards interactive networking: Runtime message inference approach for incompatible protocol updates in IoT environments. Future Generation Computer Systems 96 (2019), 563–578.Google ScholarGoogle ScholarCross RefCross Ref
  41. [41] Steffen Bernhard, Howar Falk, and Merten Maik. 2011. Introduction to active automata learning from a practical perspective. In Formal Methods for Eternal Networked Software Systems. Lecture Notes in Computer Science, Vol. 6659. Springer, 256296.Google ScholarGoogle Scholar
  42. [42] Stone Chris McMahon, Chothia Tom, and Ruiter Joeri de. 2018. Extending automated protocol state learning for the 802.11 4-way handshake. In Proceedings of the European Symposium on Research in Computer Security. 325345.Google ScholarGoogle Scholar
  43. [43] Sundmaeker Harald, Guillemin Patrick, Friess Peter, and Woelfflé Sylvie. 2010. Vision and challenges for realising the Internet of Things. Cluster of European Research Projects on the Internet of Things, European Commission 3, 3 (2010), 3436.Google ScholarGoogle Scholar
  44. [44] Tappler Martin, Aichernig Bernhard K., and Bloem Roderick. 2017. Model-based testing IoT communication via active automata learning. In Proceedings of the 2017 IEEE International Conference on Software Testing, Verification, and Validation (ICST’17). IEEE, Los Alamitos, CA, 276287.Google ScholarGoogle ScholarCross RefCross Ref
  45. [45] Wang Yipeng, Li Xingjian, Meng Jiao, Zhao Yong, Zhang Zhibin, and Guo Li. 2011. Biprominer: Automatic mining of binary protocol features. In Proceedings of the 2011 12th International Conference on Parallel and Distributed Computing, Applications, and Technologies. IEEE, Los Alamitos, CA, 179184. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. [46] Zambonelli Franco. 2015. Engineering self-organizing urban superorganisms. Engineering Applications of Artificial Intelligence 41 (2015), 325332.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. An Efficient Interaction Protocol Inference Scheme for Incompatible Updates in IoT Environments

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              • Published in

                cover image ACM Transactions on Internet Technology
                ACM Transactions on Internet Technology  Volume 22, Issue 2
                May 2022
                582 pages
                ISSN:1533-5399
                EISSN:1557-6051
                DOI:10.1145/3490674
                • Editor:
                • Ling Liu
                Issue’s Table of Contents

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 22 October 2021
                • Accepted: 1 October 2020
                • Revised: 1 June 2020
                • Received: 1 July 2019
                Published in toit Volume 22, Issue 2

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article
                • Refereed
              • Article Metrics

                • Downloads (Last 12 months)91
                • Downloads (Last 6 weeks)9

                Other Metrics

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader

              Full Text

              View this article in Full Text.

              View Full Text

              HTML Format

              View this article in HTML Format .

              View HTML Format
              About Cookies On This Site

              We use cookies to ensure that we give you the best experience on our website.

              Learn more

              Got it!