Implicit Encryption of Timing Packet with Statistical Side Channel Coding

Article Preview

Abstract:

This paper proposes a statistical coding methodology using covert side channel information to solve timing packet security issue, the main purpose here is to enhance the security of the timing protocol with backward compatible capability. In wireless communications, either ad-hoc military/ industrial network, or LTE/ LTE-A networks, GPS is used to provide time and location; however, the hackers often trying to spoof the signal. The alternative way of providing such signal is using protocols like IEEE1588 Precision Time Protocol (PTP); unfortunately, current timing packet is not encrypted, it can be altered by the hackers. To maintain the simplicity of such protocols, most vendors are reluctant to add encryption on top of it; nevertheless, the end customer wishes to see it. To solve this dilemma, we propose a backward compatible solution here. The basic idea is demonstrated using Matlab FFT calculation tool. The future extension using Fractional FFT is also suggested at.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1221-1226

Citation:

Online since:

February 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] D. Mills, J. Martin, J. Burbank, W. Kasch, Network time protocol version 4: protocol and algorithms specification, RFC 5905, June (2010).

DOI: 10.17487/rfc5905

Google Scholar

[2] B. Haberman, D. Mills, Network time protocol version 4: autokey specification, RFC 5906, June (2010).

DOI: 10.17487/rfc5906

Google Scholar

[3] IEEE TC 9 Test and Measurement Society 2000, 1588 IEEE Standard for a Precision Clock Synchronization Protocol for Network Measurement and Control Systems Version 2,. IEEE Standard, (2008).

DOI: 10.6028/nist.ir.7070

Google Scholar

[4] A. Treytl, G. Gaderer, B. Hirschler, R. Cohen, Traps and pitfalls in secure clock synchronization,. International Symposium for Precision Clock Synchronization for Measurement, Control and Communication, ISPCS 2007, pp.18-24, (2007).

DOI: 10.1109/ispcs.2007.4383768

Google Scholar

[5] T. Mizrahi, Time synchronization security using IPsec and MACsec, ISPCS 2011, pp.38-43, (2011).

DOI: 10.1109/ispcs.2011.6070153

Google Scholar

[6] J. Tsang, K. Beznosov, A security analysis of the precise time protocol,. 8th International Conference on Information and Communication Security, pp.50-59, (2006).

DOI: 10.1007/11935308_4

Google Scholar

[7] S. Ganeriwal, C. Popper, S. Capkun, B. Srivastava, Secure time synchronization in sensor network,. ACM Trans. Info. And Sys. Sec., Volume 11, Issue 4, July (2008).

Google Scholar

[8] A. Treytl, B. Hirschler, Securing IEEE 1588 by IPsec Tunnels- an analysis, 2010 International Symposium for Precision Clock Synchroniation for Measurement, Control and Communication, ISPCS 2010, pp.83-90, (2010).

DOI: 10.1109/ispcs.2010.5609765

Google Scholar

[9] A. Trettl, B. Hirschler, and T. Sauter, Secure tunneling of high precision clock synchronization protocols and other timestamped data,. 8th IEEE International Workshop on Factory Communication Systems, vol. ISBN 978-1-4244-5461-7, pp.303-313, (2010).

DOI: 10.1109/wfcs.2010.5548622

Google Scholar