Cargando…
Integrity Verification of Distributed Nodes in Critical Infrastructures
The accuracy and reliability of time synchronization and distribution are essential requirements for many critical infrastructures, including telecommunication networks, where 5G technologies place increasingly stringent conditions in terms of maintaining highly accurate time. A lack of synchronizat...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9505325/ https://www.ncbi.nlm.nih.gov/pubmed/36146304 http://dx.doi.org/10.3390/s22186950 |
_version_ | 1784796444441444352 |
---|---|
author | Sisinni, Silvia Margaria, Davide Pedone, Ignazio Lioy, Antonio Vesco, Andrea |
author_facet | Sisinni, Silvia Margaria, Davide Pedone, Ignazio Lioy, Antonio Vesco, Andrea |
author_sort | Sisinni, Silvia |
collection | PubMed |
description | The accuracy and reliability of time synchronization and distribution are essential requirements for many critical infrastructures, including telecommunication networks, where 5G technologies place increasingly stringent conditions in terms of maintaining highly accurate time. A lack of synchronization between the clocks causes a malfunction of the 5G network, preventing it from providing a high quality of service; this makes the time distribution network a very viable target for attacks. Various solutions have been analyzed to mitigate attacks on the Global Navigation Satellite System (GNSS) radio-frequency spectrum and the Precision Time Protocol (PTP) used for time distribution over the network. This paper highlights the significance of monitoring the integrity of the software and configurations of the infrastructural nodes of a time distribution network. Moreover, this work proposes an attestation scheme, based on the Trusted Computing principles, capable of detecting both software violations on the nodes and hardware attacks aimed at tampering with the configuration of the GNSS receivers. The proposed solution has been implemented and validated on a testbed representing a typical synchronization distribution network. The results, simulating various types of adversaries, emphasize the effectiveness of the proposed approach in a wide range of typical attacks and the certain limitations that need to be addressed to enhance the security of the current GNSS receivers. |
format | Online Article Text |
id | pubmed-9505325 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-95053252022-09-24 Integrity Verification of Distributed Nodes in Critical Infrastructures Sisinni, Silvia Margaria, Davide Pedone, Ignazio Lioy, Antonio Vesco, Andrea Sensors (Basel) Article The accuracy and reliability of time synchronization and distribution are essential requirements for many critical infrastructures, including telecommunication networks, where 5G technologies place increasingly stringent conditions in terms of maintaining highly accurate time. A lack of synchronization between the clocks causes a malfunction of the 5G network, preventing it from providing a high quality of service; this makes the time distribution network a very viable target for attacks. Various solutions have been analyzed to mitigate attacks on the Global Navigation Satellite System (GNSS) radio-frequency spectrum and the Precision Time Protocol (PTP) used for time distribution over the network. This paper highlights the significance of monitoring the integrity of the software and configurations of the infrastructural nodes of a time distribution network. Moreover, this work proposes an attestation scheme, based on the Trusted Computing principles, capable of detecting both software violations on the nodes and hardware attacks aimed at tampering with the configuration of the GNSS receivers. The proposed solution has been implemented and validated on a testbed representing a typical synchronization distribution network. The results, simulating various types of adversaries, emphasize the effectiveness of the proposed approach in a wide range of typical attacks and the certain limitations that need to be addressed to enhance the security of the current GNSS receivers. MDPI 2022-09-14 /pmc/articles/PMC9505325/ /pubmed/36146304 http://dx.doi.org/10.3390/s22186950 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Sisinni, Silvia Margaria, Davide Pedone, Ignazio Lioy, Antonio Vesco, Andrea Integrity Verification of Distributed Nodes in Critical Infrastructures |
title | Integrity Verification of Distributed Nodes in Critical Infrastructures |
title_full | Integrity Verification of Distributed Nodes in Critical Infrastructures |
title_fullStr | Integrity Verification of Distributed Nodes in Critical Infrastructures |
title_full_unstemmed | Integrity Verification of Distributed Nodes in Critical Infrastructures |
title_short | Integrity Verification of Distributed Nodes in Critical Infrastructures |
title_sort | integrity verification of distributed nodes in critical infrastructures |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9505325/ https://www.ncbi.nlm.nih.gov/pubmed/36146304 http://dx.doi.org/10.3390/s22186950 |
work_keys_str_mv | AT sisinnisilvia integrityverificationofdistributednodesincriticalinfrastructures AT margariadavide integrityverificationofdistributednodesincriticalinfrastructures AT pedoneignazio integrityverificationofdistributednodesincriticalinfrastructures AT lioyantonio integrityverificationofdistributednodesincriticalinfrastructures AT vescoandrea integrityverificationofdistributednodesincriticalinfrastructures |