期刊文献+

面向TSN网络时钟同步协议的Spoofing-Dos协同攻击研究 被引量:1

Research on Spoofing-Dos Collaborative Attack Against Clock Synchronization Protocol in TSN
下载PDF
导出
摘要 时钟同步是TSN网络实现多业务流量共网传输的关键特性之一,时钟同步协议的安全性保证是TSN网络安全的基础。提出了针对时钟同步协议的Spoofing-Dos协同攻击方法,并通过搭建仿真平台和实物测试平台验证了该攻击的可行性。针对时钟同步协议中缺乏安全认证机制及同步报文序号递增量检测机制等协议漏洞,所提出的协同攻击通过对Spoofing和Dos两种传统攻击方式进行分时段、分步骤的有序协同配合实现。仿真和实物实验结果表明:相比Spoofing攻击,协同攻击更能反映出主从节点晶振频率差距对同步结果造成的影响;与Dos攻击相比,虽然主从时钟偏差变化在两种攻击中基本一致,但达到同样的偏差值,协同攻击用时在仿真和实物实验中分别比Dos攻击快2s和4s。 Clock synchronization is one of the key characteristics to realize multi traffic transmission in TSN.The security of clock synchronization protocol is the basis of TSN security.In this paper,a Spoofing-Dos cooperative attack method for clock synchronization protocol is proposed,and the feasibility of the attack is verified by simulation test platform and physical test platform.Aiming at the lack of security authentication mechanism and synchronous message sequence number increment detection mechanism in clock synchronization protocol,the proposed cooperative attack is realized by two traditional attack methods,Spoofing and Dos,which are time-sharing and step-by-step coordinated.The simulation and experiment results show thatcompared with Spoofing attack,cooperative attack can reflect the influence of crystal frequency difference between master and slave nodes on synchronization results.Compared with Dos attack,although the variation of master-slave clock deviation is basically the same in the two attacks,however,to achieve the same deviation value,the time of cooperative attack is 2s and 4s faster than Dos attack in simulation and experiment respectively.
作者 贺超 胡晓娅 He Chao
出处 《工业控制计算机》 2021年第8期5-8,11,共5页 Industrial Control Computer
基金 国家自然科学基金面上项目,项目名称:云计算环境下工业信息物理系统主动入侵反应关键技术及应用研究(61873103),起止时间:2018年9月至2022年12月。
关键词 TSN网络 时钟同步 协同攻击 时钟偏差 测试平台 Time Sensitive Networking clock synchronization coordinated attack clock skew test platform
  • 相关文献

参考文献4

二级参考文献12

  • 1D. Kyriazis and T. Varvarigou, "Smart, autonomous and reliable internet of things," in International Conference on Emerging Ubiquitous System, and Pervasive Networks, Niagara Falls, Canada, 2013. doi:1O.1016/j.pro"s.2013.09.059. 被引量:1
  • 2W. C. McCulloch and W. Pitts, "A logic calculus of the ideas immanent in nervous activity," Bulletin of Mathematical Biophysics, no. 5, PI'. 115-133, 1943. 被引量:1
  • 3D. E. Rumelhart, Parallell Distributed Processing. MA, USA: MIT Press, 1986. 被引量:1
  • 4J. Hopfield, "Neural networks and physical systems with emergent collective computational abilities," Proceedings of the National Academy of Sciences., vol. 79,pp.2554-2558,1982. 被引量:1
  • 5R. A. Brooks, "Intelligence without representation," Artificial Intelligence, no. 47,pp. 139-159, 1991. 被引量:1
  • 6R. A. Brooks, "Elephant cannot play chess," Autonomous Robots, no. 6, pp: 3- 15,1990. 被引量:1
  • 7M. Wooldridge and N. Jennings, Intelligent Agents. Germany: springer-verlag, 1995. 被引量:1
  • 8N. Nilsson, Artificial Intelligence: A New Synthesis. San Mateo, USA: Morgan Kaufmann Publishers, 1998. 被引量:1
  • 9S. Russell and P. Norvig, Artificial Intelligence: A Modem Approach. Beijing, China: Pearson Education, Inc., as Prentice Hall, Inc, and Tsinghua University Press, 2006. 被引量:1
  • 10Y. Zbong, Principles of Cognetics in Machine (in Chinese). Beijing, China: Science Press, 2007. 被引量:1

共引文献6

同被引文献14

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部