Protecting Clock Synchronization: Adversary Detection through Network Monitoring

被引:16
|
作者
Lisova, Elena [1 ]
Gutierrez, Marina [1 ,2 ]
Steiner, Wilfried [2 ]
Uhlemann, Elisabeth [1 ]
Akerberg, Johan [1 ]
Dobrin, Radu [1 ]
Bjorkman, Andmats [1 ]
机构
[1] Malardalen Univ, Sch Innovat Design & Engn, Vasteras, Sweden
[2] TTTech Comp Tech AG, Vienna, Austria
关键词
D O I
10.1155/2016/6297476
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, industrial networks are often used for safety-critical applications with real-time requirements. Such applications usually have a time-triggered nature with message scheduling as a core property. Scheduling requires nodes to share the same notion of time, that is, to be synchronized. Therefore, clock synchronization is a fundamental asset in real-time networks. However, since typical standards for clock synchronization, for example, IEEE 1588, do not provide the required level of security, it raises the question of clock synchronization protection. In this paper, we identify a way to break synchronization based on the IEEE 1588 standard, by conducting a man-in-the-middle (MIM) attack followed by a delay attack. A MIM attack can be accomplished through, for example, Address Resolution Protocol (ARP) poisoning. Using the AVISPA tool, we evaluate the potential to perform a delay attack using ARP poisoning and analyze its consequences showing both that the attack can, indeed, break clock synchronization and that some design choices, such as a relaxed synchronization condition mode, delay bounding, and using knowledge of environmental conditions, can make the network more robust/resilient against these kinds of attacks. Lastly, a Configuration Agent is proposed to monitor and detect anomalies introduced by an adversary performing attacks targeting clock synchronization.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] NETWORK CLOCK SYNCHRONIZATION
    METZ, R
    REIBLE, EL
    WINCHELL, DF
    BELL SYSTEM TECHNICAL JOURNAL, 1981, 60 (06): : 1109 - 1129
  • [2] Network clock frequency synchronization
    Gurewitz, Omer
    Cidon, Israel
    Sidi, Moshe
    25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, : 883 - +
  • [3] Skewless Network Clock Synchronization
    Mallada, Enrique
    Meng, Xiaoqiao
    Hack, Michel
    Zhang, Li
    Tang, Ao
    2013 21ST IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2013,
  • [4] Secure topology discovery through network-wide clock synchronization
    Robles, Roberto Solis
    Haas, Jason J.
    Chiang, Jerry T.
    Hu, Yih-Chun
    Kumar, P. R.
    2010 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS (SPCOM), 2010,
  • [5] Robust recursive network clock synchronization
    Nilsson, John-Olof
    Handel, Peter
    2014 IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTING AND COMMUNICATION TECHNOLOGIES (IEEE CONECCT), 2014,
  • [6] Clock synchronization algorithms for network measurements
    Zhang, L
    Liu, Z
    Xia, CHH
    IEEE INFOCOM 2002: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2002, : 160 - 169
  • [7] Positioning and clock synchronization through entanglement
    Giovannetti, V
    Lloyd, S
    Maccone, L
    PHYSICAL REVIEW A, 2002, 65 (02): : 9
  • [8] Clock synchronization through handshake signalling
    Kessels, J
    Peeters, A
    Wielage, P
    Kim, SJ
    ASYNC: EIGHTH INTERNATIONAL SYMPOSIUM ON ASYNCHRONOUS CIRCUITS AND SYSTEMS, PROCEEDINGS, 2002, : 59 - 68
  • [9] Clock synchronization through handshake signalling
    Kessels, J
    Peeters, A
    Wielage, P
    Kim, SJ
    MICROPROCESSORS AND MICROSYSTEMS, 2003, 27 (09) : 447 - 460
  • [10] Resilient Distributed Estimation Through Adversary Detection
    Chen, Yuan
    Kar, Soummya
    Moura, Jose M. F.
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2018, 66 (09) : 2455 - 2469