Experimental Evaluation of Attacks on TESLA-Secured Time Synchronization Protocols

SECURITY STANDARDISATION RESEARCH (SSR 2018)(2018)

Cited 3|Views0
No score
Abstract
There is an increasingly relevant class of protocols that employ TESLA stream authentication to provide authenticity for one-way time synchronization. For such protocols, an interdependency between synchronization and security has been found to theoretically enable attackers to render the security measures useless. We evaluate to what extent this attack works in practice. To this end, we use a tailor-made configurable testbed implementation to simulate behaviors of TESLA-protected one-way synchronization protocols in hostile networks. In particular, this lets us confirm vulnerabilities to the attack for two published protocols, TinySeRSync and ASTS. Our analysis also yields a set of countermeasures, with which in-development and future specifications can potentially use TESLA to successfully secure one-way time synchronization.
More
Translated text
Key words
(One-way) time synchronization protocols,TESLA,Authentication,Experimental attack analysis,ASTS,TinySeRSync
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined