Experimental evaluation of attacks on TESLA-secured time synchronization protocols

3Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

There is an increasingly relevant class of protocols that employ TESLA stream authentication to provide authenticity for one-way time synchronization. For such protocols, an interdependency between synchronization and security has been found to theoretically enable attackers to render the security measures useless. We evaluate to what extent this attack works in practice. To this end, we use a tailor-made configurable testbed implementation to simulate behaviors of TESLA-protected one-way synchronization protocols in hostile networks. In particular, this lets us confirm vulnerabilities to the attack for two published protocols, TinySeRSync and ASTS. Our analysis also yields a set of countermeasures, with which in-development and future specifications can potentially use TESLA to successfully secure one-way time synchronization.

Cite

CITATION STYLE

APA

Teichel, K., & Hildermeier, G. (2018). Experimental evaluation of attacks on TESLA-secured time synchronization protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11322 LNCS, pp. 37–55). Springer Verlag. https://doi.org/10.1007/978-3-030-04762-7_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free