On the Complexity of Verifying Cyber-Physical Security Protocols

نویسندگان

  • Max Kanovich
  • Tajana Ban Kirigin
  • Vivek Nigam
  • Andre Scedrov
  • Carolyn Talcott
چکیده

Many security protocols rely on the assumptions 1 on the physical properties in which its protocol sessions will be 2 carried out. For instance, Distance Bounding Protocols take into 3 account the round trip time of messages and the transmission 4 velocity to infer an upper bound of the distance between two 5 agents. We classify such security protocols as Cyber-Physical. 6 The key elements of such protocols are the use of cryptographic 7 keys, nonces and real-time. This paper studies the complexity 8 of verifying Cyber-Physical Protocols. We propose a multiset 9 rewriting framework with real-time and that may create fresh 10 values. We demonstrate that distance bounding protocols may be 11 specified in this framework. We also observe that the standard 12 Dolev-Yao intruder is not a reasonable intruder model for Cyber13 Physical Security Protocols Verification and propose a novel 14 intruder model that takes into account the Physical Properties 15 of the environment. From previous work, we infer that the 16 corresponding reachability problem is undecidable in general 17 even if the size of terms is bounded. We show that for the 18 important class of Bounded Memory Cyber-Physical Security 19 Protocols with a Memory Bounded Intruder the same problem 20 is PSPACE-complete if the size of terms is bounded. 21

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

TAuth: Verifying Timed Security Protocols

Quantitative timing is often relevant to the security of systems, like web applications, cyber-physical systems, etc. Verifying timed security protocols is however challenging as both arbitrary attacking behaviors and quantitative timing may lead to undecidability. In this work, we develop a service framework to support intuitive modeling of the timed protocol, as well as automatic verification...

متن کامل

Time, computational complexity, and probability in the analysis of distance-bounding protocols

Many security protocols rely on the assumptions on the physical properties in which its protocol sessions will be carried out. For instance, Distance Bounding Protocols take into account the round trip time of messages and the transmission velocity to infer an upper bound of the distance between two agents. We classify such security protocols as Cyber-Physical. Time plays a key role in design a...

متن کامل

Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...

متن کامل

IEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification

Industrial control systems (ICSs) which are used in critical infrastructure and other industries mostly use various communication protocols. Most of these communication protocols have various cyber security challenges and weakness that give the attackers the opportunity to gain to their malicious intentions. In this paper, we assess IEC 60870-5-104 protocols from security perspective which is u...

متن کامل

A Declarative Logic-Based Approach for Threat Analysis of Advanced Metering Infrastructure

The Advanced Metering Infrastructure (AMI) is the core component in a smart grid. It exhibits highly complex heterogeneous network configurations comprising of different cyber-physical components. These components are interconnected through different communication media, protocols, and secure tunnels, and are operated using different modes of data delivery and security policies. The inherent co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014