SwePub
Sök i LIBRIS databas

  Extended search

onr:"swepub:oai:DiVA.org:mdh-31363"
 

Search: onr:"swepub:oai:DiVA.org:mdh-31363" > Protecting Clock Sy...

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist

Protecting Clock Synchronization : Adversary Detection through Network Monitoring

Lisova, Elena (author)
Mälardalens högskola,Inbyggda system
Gutiérrez, Marina (author)
Mälardalens högskola,Inbyggda system
Steiner, Wilfried (author)
TTTech Computertechnik AG, Austria
show more...
Uhlemann, Elisabeth (author)
Mälardalens högskola,Inbyggda system
Åkerberg, Johan (author)
Mälardalens högskola,Inbyggda system
Dobrin, Radu (author)
Mälardalens högskola,Inbyggda system
Björkman, Mats (author)
Mälardalens högskola,Inbyggda system
show less...
 (creator_code:org_t)
Hindawi Limited, 2016
2016
English.
In: Journal of Electrical and Computer Engineering. - : Hindawi Limited. - 2090-0147 .- 2090-0155.
  • Journal article (peer-reviewed)
Abstract Subject headings
Close  
  • Today, industrial networks are often used for safetycritical applications with real-time requirements. The architecture of such applications usually has a time-triggered nature that has message scheduling as a core property. Real-time scheduling can be applied only in networks where nodes share the same notion of time, i.e., they are synchronized. Therefore, clock synchronization is one of the fundamental assets of industrial networks with real-time requirements. However, standards for clock synchronization, i.e., IEEE 1588, do not provide the required level of security. This raises the question about clock synchronization protection. In this paper we identify a way to break synchronization based on the IEEE 1588 standard by conducting a man-in-the-middle (MIM) attack followed by a delay attack. MIM attack can be accomplished through e.g., Address Resolution Protocol (ARP) poisoning. Using AVISPA tool we evaluate the potential to perform an ARP poisoning attack. Next, an analysis of the consequences of introducing delays is made, showing both that the attack can, indeed, break clock synchronization and that some design choices, such as a relaxed synchronization condition mode, delay bounding and using knowledge of environmental conditions, can be made to make the network more robust/resilient against these kinds of attacks. Lastly, network monitoring is proposed as a technique to detect anomalies introduced by an adversary performing attacks targeting clock synchronization. The monitoring capabilities are added to the network using a Configuration Agent, which, based on data obtained from the network, is able to detect an attack. The main contribution of the paper is a detailed problem description and evaluation of a security vulnerability in IEEE 1588 against delay attacks together with an evaluation of several approaches as possible mitigation techniques for the attack.

Subject headings

TEKNIK OCH TEKNOLOGIER  -- Elektroteknik och elektronik (hsv//swe)
ENGINEERING AND TECHNOLOGY  -- Electrical Engineering, Electronic Engineering, Information Engineering (hsv//eng)

Publication and Content Type

ref (subject category)
art (subject category)

Find in a library

To the university's database

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist

Search outside SwePub

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view