Cargando…

Integrity Verification of Distributed Nodes in Critical Infrastructures

The accuracy and reliability of time synchronization and distribution are essential requirements for many critical infrastructures, including telecommunication networks, where 5G technologies place increasingly stringent conditions in terms of maintaining highly accurate time. A lack of synchronizat...

Descripción completa

Detalles Bibliográficos
Autores principales: Sisinni, Silvia, Margaria, Davide, Pedone, Ignazio, Lioy, Antonio, Vesco, Andrea
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9505325/
https://www.ncbi.nlm.nih.gov/pubmed/36146304
http://dx.doi.org/10.3390/s22186950
_version_ 1784796444441444352
author Sisinni, Silvia
Margaria, Davide
Pedone, Ignazio
Lioy, Antonio
Vesco, Andrea
author_facet Sisinni, Silvia
Margaria, Davide
Pedone, Ignazio
Lioy, Antonio
Vesco, Andrea
author_sort Sisinni, Silvia
collection PubMed
description The accuracy and reliability of time synchronization and distribution are essential requirements for many critical infrastructures, including telecommunication networks, where 5G technologies place increasingly stringent conditions in terms of maintaining highly accurate time. A lack of synchronization between the clocks causes a malfunction of the 5G network, preventing it from providing a high quality of service; this makes the time distribution network a very viable target for attacks. Various solutions have been analyzed to mitigate attacks on the Global Navigation Satellite System (GNSS) radio-frequency spectrum and the Precision Time Protocol (PTP) used for time distribution over the network. This paper highlights the significance of monitoring the integrity of the software and configurations of the infrastructural nodes of a time distribution network. Moreover, this work proposes an attestation scheme, based on the Trusted Computing principles, capable of detecting both software violations on the nodes and hardware attacks aimed at tampering with the configuration of the GNSS receivers. The proposed solution has been implemented and validated on a testbed representing a typical synchronization distribution network. The results, simulating various types of adversaries, emphasize the effectiveness of the proposed approach in a wide range of typical attacks and the certain limitations that need to be addressed to enhance the security of the current GNSS receivers.
format Online
Article
Text
id pubmed-9505325
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-95053252022-09-24 Integrity Verification of Distributed Nodes in Critical Infrastructures Sisinni, Silvia Margaria, Davide Pedone, Ignazio Lioy, Antonio Vesco, Andrea Sensors (Basel) Article The accuracy and reliability of time synchronization and distribution are essential requirements for many critical infrastructures, including telecommunication networks, where 5G technologies place increasingly stringent conditions in terms of maintaining highly accurate time. A lack of synchronization between the clocks causes a malfunction of the 5G network, preventing it from providing a high quality of service; this makes the time distribution network a very viable target for attacks. Various solutions have been analyzed to mitigate attacks on the Global Navigation Satellite System (GNSS) radio-frequency spectrum and the Precision Time Protocol (PTP) used for time distribution over the network. This paper highlights the significance of monitoring the integrity of the software and configurations of the infrastructural nodes of a time distribution network. Moreover, this work proposes an attestation scheme, based on the Trusted Computing principles, capable of detecting both software violations on the nodes and hardware attacks aimed at tampering with the configuration of the GNSS receivers. The proposed solution has been implemented and validated on a testbed representing a typical synchronization distribution network. The results, simulating various types of adversaries, emphasize the effectiveness of the proposed approach in a wide range of typical attacks and the certain limitations that need to be addressed to enhance the security of the current GNSS receivers. MDPI 2022-09-14 /pmc/articles/PMC9505325/ /pubmed/36146304 http://dx.doi.org/10.3390/s22186950 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Sisinni, Silvia
Margaria, Davide
Pedone, Ignazio
Lioy, Antonio
Vesco, Andrea
Integrity Verification of Distributed Nodes in Critical Infrastructures
title Integrity Verification of Distributed Nodes in Critical Infrastructures
title_full Integrity Verification of Distributed Nodes in Critical Infrastructures
title_fullStr Integrity Verification of Distributed Nodes in Critical Infrastructures
title_full_unstemmed Integrity Verification of Distributed Nodes in Critical Infrastructures
title_short Integrity Verification of Distributed Nodes in Critical Infrastructures
title_sort integrity verification of distributed nodes in critical infrastructures
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9505325/
https://www.ncbi.nlm.nih.gov/pubmed/36146304
http://dx.doi.org/10.3390/s22186950
work_keys_str_mv AT sisinnisilvia integrityverificationofdistributednodesincriticalinfrastructures
AT margariadavide integrityverificationofdistributednodesincriticalinfrastructures
AT pedoneignazio integrityverificationofdistributednodesincriticalinfrastructures
AT lioyantonio integrityverificationofdistributednodesincriticalinfrastructures
AT vescoandrea integrityverificationofdistributednodesincriticalinfrastructures