Securing Balise-based Train Control Systems using Cryptographic Random Fountains

被引:0
作者
Harshan, J. [1 ]
Chang, Sang-Yoon [3 ,4 ]
Kang, Seungmin [2 ]
Hu, Yih-Chun [2 ,3 ,4 ]
机构
[1] Indian Inst Technol Delhi, Delhi, India
[2] Adv Digital Sci Ctr, Singapore, Singapore
[3] Univ Colorado, Colorado Springs, CO 80907 USA
[4] Univ Illinois, Urbana, IL USA
来源
2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS) | 2017年
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In modern train control systems, a moving train retrieves its location information through passive transponders called balises, which are placed on the sleepers of the track at regular intervals. When the train-borne antenna energizes them using tele-powering signals, balises backscatter preprogrammed telegrams, which carry information about the train's current location. Since the telegrams are static in the existing implementations, the uplink signals from the balises could be recorded by an adversary and then replayed at a different location of the track, leading to what is well-known as the replay attack. Such an attack, while the legitimate balise is still functional, introduces ambiguity to the train about its location, can impact the physical operations of the trains. For balise-to-train communication, we propose a new communication framework referred to as cryptographic random fountains (CRF), where each balise, instead of transmitting telegrams with fixed information, transmits telegrams containing random signals. A salient feature of CRF is the use of challenge-response based interaction between the train and the balise for communication integrity. We present a thorough security analysis of CRF to showcase its ability to mitigate sophisticated replay attacks. Finally, we also discuss the implementation aspects of our framework.
引用
收藏
页码:405 / 410
页数:6
相关论文
共 11 条
[1]   Train position and speed estimation using wheel velocity measurements [J].
Allotta, B ;
Colla, V ;
Malvezzi, M .
PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART F-JOURNAL OF RAIL AND RAPID TRANSIT, 2002, 216 (03) :207-225
[2]  
Costin A, 2012, P BLACK HAT LAS VEG, P1
[3]  
Dhahbi S., 2011, 2011 4th International Conference on Logistics (LOGISTIQUA), P468, DOI 10.1109/LOGISTIQUA.2011.5939444
[4]  
FELDHOFER M, 2004, INT WORKSH CRYPT, V3156, P357
[5]  
Hämäläinen P, 2006, DSD 2006: 9TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN: ARCHITECTURES, METHODS AND TOOLS, PROCEEDINGS, P577
[6]  
Hornstein R., 2005, IFAC P VOLUMES, V38, P99
[7]  
Katagi M., 2008, Lightweight cryptography for the internet of things, P7
[8]  
Malvezzi M., 2011, 9 WORLD C RAILW RES, P22
[9]  
Tippenhauer NO, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P75
[10]  
Wu Y., IEEE T INTELLIGENT T