On the Complexity of Verifying Cyber-Physical Security Protocols
نویسندگان
چکیده
Many security protocols rely on the assumptions 1 on the physical properties in which its protocol sessions will be 2 carried out. For instance, Distance Bounding Protocols take into 3 account the round trip time of messages and the transmission 4 velocity to infer an upper bound of the distance between two 5 agents. We classify such security protocols as Cyber-Physical. 6 The key elements of such protocols are the use of cryptographic 7 keys, nonces and real-time. This paper studies the complexity 8 of verifying Cyber-Physical Protocols. We propose a multiset 9 rewriting framework with real-time and that may create fresh 10 values. We demonstrate that distance bounding protocols may be 11 specified in this framework. We also observe that the standard 12 Dolev-Yao intruder is not a reasonable intruder model for Cyber13 Physical Security Protocols Verification and propose a novel 14 intruder model that takes into account the Physical Properties 15 of the environment. From previous work, we infer that the 16 corresponding reachability problem is undecidable in general 17 even if the size of terms is bounded. We show that for the 18 important class of Bounded Memory Cyber-Physical Security 19 Protocols with a Memory Bounded Intruder the same problem 20 is PSPACE-complete if the size of terms is bounded. 21
منابع مشابه
TAuth: Verifying Timed Security Protocols
Quantitative timing is often relevant to the security of systems, like web applications, cyber-physical systems, etc. Verifying timed security protocols is however challenging as both arbitrary attacking behaviors and quantitative timing may lead to undecidability. In this work, we develop a service framework to support intuitive modeling of the timed protocol, as well as automatic verification...
متن کاملTime, computational complexity, and probability in the analysis of distance-bounding protocols
Many security protocols rely on the assumptions on the physical properties in which its protocol sessions will be carried out. For instance, Distance Bounding Protocols take into account the round trip time of messages and the transmission velocity to infer an upper bound of the distance between two agents. We classify such security protocols as Cyber-Physical. Time plays a key role in design a...
متن کاملDetecting Bot Networks Based On HTTP And TLS Traffic Analysis
Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...
متن کاملIEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification
Industrial control systems (ICSs) which are used in critical infrastructure and other industries mostly use various communication protocols. Most of these communication protocols have various cyber security challenges and weakness that give the attackers the opportunity to gain to their malicious intentions. In this paper, we assess IEC 60870-5-104 protocols from security perspective which is u...
متن کاملA Declarative Logic-Based Approach for Threat Analysis of Advanced Metering Infrastructure
The Advanced Metering Infrastructure (AMI) is the core component in a smart grid. It exhibits highly complex heterogeneous network configurations comprising of different cyber-physical components. These components are interconnected through different communication media, protocols, and secure tunnels, and are operated using different modes of data delivery and security policies. The inherent co...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014