protocol in order to find vulnerabilities since the early
stages of protocol development.
As a short-term objective, we plan to further in-
vestigate the Z-Wave protocol, both by modeling the
application layer, and by covering the whole S2 Secu-
rity layer, searching for other vulnerabilities.
Since the mathematical base of formal methods
discourages designers from their usage, as a long-
term objective, we plan to develop a “user-friendly”
environment for the formal specification, verification
and development of IoT security protocols.
REFERENCES
Arcaini, P., Gargantini, A., and Riccobene, E. (2017). Rig-
orous development process of a safety-critical system:
from ASM models to Java code. Int. J. Softw. Tools
Technol. Transf., 19(2):247–269.
Arcaini, P., Gargantini, A., Riccobene, E., and Scandurra,
P. (2011). A model-driven process for engineering a
toolset for a formal method. Software: Practice and
Experience, 41(2):155–166.
Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Com-
pagna, L., Cuellar, J., Drielsma, P. H., He
´
am, P. C.,
Kouchnarenko, O., Mantovani, J., M
¨
odersheim, S.,
von Oheimb, D., Rusinowitch, M., Santiago, J., Tu-
ruani, M., Vigan
`
o, L., and Vigneron, L. (2005). The
AVISPA tool for the automated validation of inter-
net security protocols and applications. In Computer
Aided Verification, pages 281–285. Springer.
Badenhop, C. W., Graham, S. R., Ramsey, B. W., Mullins,
B. E., and Mailloux, L. O. (2017). The z-wave routing
protocol and its security implications. Computers &
Security, 68:112–129.
Basin, D., Dreier, J., Hirschi, L., Radomirovic, S., Sasse,
R., and Stettler, V. (2018). A formal analysis of
5g authentication. In Proceedings of the 2018 ACM
SIGSAC Conference on Computer and Communica-
tions Security, CCS ’18, page 1383–1396, New York,
NY, USA. Association for Computing Machinery.
Bonfanti, S., Gargantini, A., and Mashkoor, A. (2020). De-
sign and validation of a C++ code generator from ab-
stract state machines specifications. J. Softw. Evol.
Process., 32(2).
B
¨
orger, E. and Raschke, A. (2018). Modeling Companion
for Software Practitioners. Springer.
B
¨
orger, E. and St
¨
ark, R. (2003). Abstract State Machines:
A Method for High-Level System Design and Analysis.
Springer Verlag.
Dolev, D. and Yao, A. (1983). On the security of public key
protocols. IEEE Transactions on Information Theory,
29(2):198–208.
Eldefrawy, M., Butun, I., Pereira, N., and Gidlund, M.
(2019). Formal security analysis of lorawan. Com-
puter Networks, 148:328 – 339.
Fouladi, B. and Ghanoun, S. (2013). Security evaluation of
the z-wave wireless protocol. In Proceedings of Black
Hat USA, pages 1–2.
Hofer-Schmitz, K. and Stojanovi
´
c, B. (2020). Towards for-
mal verification of IoT protocols: A review. Computer
Networks, 174:107233.
Kim, K., Cho, K., Lim, J., Jung, Y., Sung, M., Kim, S.,
and Kim, H. (2020). What’s your protocol: Vulnera-
bilities and security threats related to z-wave protocol.
Pervasive and Mobile Computing, 66.
Melaragno, A. P., Bandara, D., Wijesekera, D., and
Michael, J. B. (2012). Securing the zigbee protocol
in the smart grid. Computer, 45(4):92–94.
Mohsin, M., Sardar, M. U., Hasan, O., and Anwar, Z.
(2017). Iotriskanalyzer: A probabilistic model check-
ing based framework for formal risk analytics of the
internet of things. IEEE Access, 5:5494–5505.
Qiu, Y. and Ma, M. (2016). A pmipv6-based secured mobil-
ity scheme for 6lowpan. In 2016 IEEE Global Com-
munications Conference (GLOBECOM), pages 1–6.
Qiu, Y. and Ma, M. (2018). Secure group mobility support
for 6lowpan networks. IEEE Internet of Things Jour-
nal, 5(2):1131–1141.
Sun, D.-Z. and Sun, L. (2019). On secure simple pair-
ing in bluetooth standard v5.0-part i: Authenticated
link key security and its home automation and enter-
tainment applications. Sensors (Basel, Switzerland),
19(5):1158.
Unwala, I., Taqvi, Z., and Lu, J. (2018). Iot security: Zwave
and thread. In 2018 IEEE Green Technologies Confer-
ence (GreenTech), pages 176–182.
Vigan
`
o, L. (2006). Automated security protocol analysis
with the avispa tool. Electronic Notes in Theoreti-
cal Computer Science, 155:61 – 86. Proceedings of
the 21st Annual Conference on Mathematical Foun-
dations of Programming Semantics (MFPS XXI).
Z-wave (2020). Z-wave protocol. https://www.z-
wave.com/.
Z-Wave (2020). Z-wave protocol. https://www.silabs.com
/documents/login/miscellaneous/SDS13783-Z-Wave-
Transport-Encapsulation-Command-Class-
Specification.pdf.
Formal Proof of a Vulnerability in Z-Wave IoT Protocol
209