進階搜尋


   電子論文尚未授權公開,紙本請查館藏目錄
(※如查詢不到或館藏狀況顯示「閉架不公開」,表示該本論文不在書庫,無法取用。)
系統識別號 U0026-3001201915195000
論文名稱(中文) 極輕量雙向認證協定之設計及其工業控制系統之應用
論文名稱(英文) Design of Ultra-lightweight Mutual Authentication Protocol and Its Application on Industrial Control Systems
校院名稱 成功大學
系所名稱(中) 資訊工程學系
系所名稱(英) Institute of Computer Science and Information Engineering
學年度 107
學期 1
出版年 108
研究生(中文) 黃少呈
研究生(英文) Shao-Cheng Huang
學號 P76051064
學位類別 碩士
語文別 英文
論文頁數 51頁
口試委員 指導教授-黃宗立
口試委員-李南逸
口試委員-簡宏宇
口試委員-王旭正
中文關鍵字 極輕量雙向認證協定  工業控制系統  暴露攻擊  中間人攻擊  非同步化攻擊 
英文關鍵字 Ultra-lightweight mutual authentication protocol  Industrial control systems  Disclosure attacks  Man-in-the-middle attacks  De-synchronization attacks 
學科別分類
中文摘要 工業控制系統提供了水力供給、電力能源、交通運輸、工業製造等民生、工業領域的基礎功能,其安全問題高度關乎國家的穩定與安危。相較於傳統的IT系統,工業控制系統更包含了即時性、有限能力的裝置、及高度可靠性等其他限制,因此在工業控制系統中發展安全協議,需要優先考量其限制。雖然目前有關於工業控制系統的安全協議相繼被提出,但是這些研究不是使用超過其硬體限制的安全演算法,就是存有安全疑慮。因此本篇論文將針對極輕量化雙向認證協定進行研究,探討既有的安全問題,並提出可直接運行於既有工業控制系統裝置的認證協定。本篇論文首先發現近期兩篇極輕量化雙向認證協定可以被暴露攻擊,其中一篇甚至可以被非同步化攻擊和中間人攻擊,並進一步討論基於這兩篇的想法是否有改進的方式,接著針對工業控制系統設計出新的極輕量化雙向認證協定。本篇論文實際考量工業控制系統的限制並解決目前極輕量化雙向認證協定所遭遇到的攻擊。
英文摘要 In operational technology, Industrial Control Systems (ICSs) are computing systems used to operate the critical infrastructures at the national level, including power plant and water supply network, public transportation, manufacturing, and so on. Therefore, the cybersecurity of ICSs has a certain relevance to homeland security. Different from the traditional information technology systems, the development of ICSs is considering additional environmental requirements such as hard real-time interactions, resource-constrained devices, and high availability systems. Consequently, the improvement of ICS’s security mechanism is essential to meet these requirements. Much research has successively proposed security solutions for ICSs in recent years. However, these solutions may either require over-priced cryptographic methods or incomprehensible security mechanisms.
Dedicated to the ultra-lightweight mutual authentication protocol, this thesis delves into its cybersecurity issues, indicated in previous research, and further applies it to ICSs. Firstly, this thesis points out that Tewari and Gupta’s protocol suffers from the disclosure attack, the de-synchronization attack, and the man-in-the-middle attack. Secondly, an improved protocol proposed by Wang et al. being susceptible to the disclosure attack is also demonstrated. Finally, a new ARX-based ultra-lightweight mutual authentication protocol is proposed that overcomes the environmental limitations of ICSs and solves its present cybersecurity issues.
論文目次 中文摘要 III
Abstract IV
誌 謝 VI
Content VII
List of Tables IX
List of Figures X
Chapter 1 Introduction 1
1.1 Overview 1
1.2 Motivation and Contribution 2
1.3 Thesis Structure 4
Chapter 2 Preliminaries 5
2.1 Industrial Control Systems Architecture 5
2.2 Industrial Control Systems Requirements 9
2.3 Review of Ultra-lightweight Mutual Authentication Protocols 11
2.3.1 Well-Known Protocols 11
2.3.2 Tewari and Gupta’s Protocol [21] 12
2.3.3 Wang et al.’s Protocol [22] 14
Chapter 3 Cryptanalysis of Rotation-XOR Based Protocols 16
3.1 Notations and Bitwise Operations 16
3.2 Weakness in Tewari and Gupta’s Protocol 17
3.2.1 Properties of Bitwise Operations 17
3.2.2 Attack Model 18
3.2.3 Summary 23
3.3 Weakness in Wang et al.’s Protocol 24
3.3.1 Properties of XOR-Rotation Operation 24
3.3.2 Attack Model 27
3.3.3 Summary 28
3.4 Weakness in Rotation-XOR Based Protocols 29
Chapter 4 A Novel Ultra-lightweight Mutual Authentication Protocol 32
4.1 Proposed Protocol 32
4.2 Security Analysis of the Proposed Protocol 35
4.2.1 Security Proof with BAN Logic 36
4.2.2 Security Analysis 38
4.3 Comparison 43
4.4 Realistic Evaluation 44
Chapter 5 Conclusions and Future Work 47
Bibliography 48
參考文獻 [1]Stouffer, Keith, Joe Falco, and Karen Scarfone. "Guide to industrial control systems (ICS) security." NIST special publication 800.82 (2011): 16-16.
[2]Koushik, Ashish N., and B. S. Rashmi. "4th Generation SCADA Implementation for Automation." International Journal of Advanced Research in Computer and Communication Engineering 5.3 (2016).
[3]Maglaras, L.A., Kim, K.H., Janicke, H., Ferrag, M.A., Rallis, S., Fragkou, P., Maglaras, A.,Cruz, T.J.: Cyber security of critical infrastructures. ICT Express 4(1), (2018): 42–45.
[4]Mueller, Paul, and Babak Yadegari. "The Stuxnet Worm." Département des sciences de l’informatique, Université de l’Arizona, 2012 http://www.cs.arizona.edu/~collberg/Teaching/466-566/2012/Resources/presentations/2012/topic9-final/report.pdf
[5]行政院 "815 停電事故行政調查專案報告". 2017.
[6]Gilchrist, Grant. "Secure authentication for DNP3." Power and Energy Society General Meeting-Conversion and Delivery of Electrical Energy in the 21st Century, 2008 IEEE. IEEE, 2008.
[7]Igor Nai Fovino, Andrea Carcano, Marcelo Masera and Alberto Trombetta. "Design and implementation of a secure modbus protocol." International conference on critical infrastructure protection. Springer, Berlin, Heidelberg, 2009.
[8]Amoah, Raphael, Seyit Camtepe, and Ernest Foo. "Securing DNP3 broadcast communications in SCADA systems." IEEE Transactions on Industrial Informatics 12.4 (2016): 1474-1485.
[9]Vaidya, Binod, Dimitrios Makrakis, and Hussein T. Mouftah. "Authentication and authorization mechanisms for substation automation in smart grid network." IEEE Network 27.1 (2013): 5-11.
[10]Duka, Adrian-Vasile, Béla Genge, and Piroska Haller. "Enabling authenticated data exchanges in industrial control systems." Digital Forensic and Security (ISDFS), 2018 6th International Symposium on. IEEE, 2018.
[11]Hayden, Ernie, Michael Assante, and Tim Conway. "An abbreviated history of automation & industrial controls systems and cybersecurity." A Sans Analyst Whitepaper (2014).
[12]Bolton, William. Programmable logic controllers. Newnes, 2015.
[13]Alphonsus, Ephrem Ryan, and Mohammad Omar Abdullah. "A review on the applications of programmable logic controllers (PLCs)." Renewable and Sustainable Energy Reviews 60 (2016): 1185-1205.
[14]Preneel, Bart. "Cryptographic hash functions." European Transactions on Telecommunications 5.4 (1994): 431-448.
[15]Chien, H.Y.: SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity. IEEE Trans. on Dependable and Secure Computing 4(4), (2007): 337–340.
[16]Peris-Lopez, Pedro, et al. "LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags." Proc. of 2nd Workshop on RFID Security. 2006.
[17]Peris-Lopez, Pedro, et al. "M 2 AP: a minimalist mutual-authentication protocol for low-cost RFID tags." International conference on ubiquitous intelligence and computing. Springer, Berlin, Heidelberg, 2006.
[18]Peris-Lopez, Pedro, et al. "EMAP: An efficient mutual-authentication protocol for low-cost RFID tags." OTM Confederated International Conferences" On the Move to Meaningful Internet Systems". Springer, Berlin, Heidelberg, 2006.
[19]Peris-Lopez, Pedro, et al. "Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol." International Workshop on Information Security Applications. Springer, Berlin, Heidelberg, 2008.
[20]Tian, Y., Chen, G., Li, J.: A new ultralightweight rfid authentication protocol with permutation. IEEE Communications Letters 16(5), (2012): 702–705.
[21]Tewari, Aakanksha, and B. B. Gupta. "Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags." The Journal of Supercomputing 73.3 (2017): 1085-1102.
[22]Wang, King-Hang, et al. "On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags." The Journal of Supercomputing 74.1 (2018): 65-70.
[23]Safkhani, Masoumeh, and Nasour Bagheri. "Passive secret disclosure attack on an ultralightweight authentication protocol for internet of things." The Journal of Supercomputing 73.8 (2017): 3579-3585.
[24]Modbus, I. D. A. "Modbus application protocol specification v1. 1a." North Grafton, Massachusetts (www.modbus.org/specs.php) (2004).
[25]IEEE Standard for Electric Power Systems Communications-Distributed Network Protocol (DNP3), Standard 1815-2012, Oct. 2012, pp. 1–821.
[26]Bowen, C. L., Timothy K. Buennemeyer, and Ryan W. Thomas. "Next generation SCADA security: best practices and client puzzles." Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop. 2005.
[27]Ahmadian, Zahra, Mahmoud Salmasizadeh, and Mohammad Reza Aref. "Recursive linear and differential cryptanalysis of ultralightweight authentication protocols." IEEE Transactions on Information Forensics and Security 8.7 (2013): 1140-1151.
[28]Cao, T., Bertino, E., Lei, H.: Security analysis of the sasi protocol. IEEE Transactions on Dependable and Secure Computing 6(1), (2009): 73–77.
[29]Sun, H.M., Ting, W.C., Wang, K.H.: On the Security of Chien’s Ultralightweight RFID Authentication Protocol. IEEE Trans. on Dependable and Secure Computing 8(2), (2009): 315–317.
[30]D’Arco, P., De Santis, A.: On ultralightweight rfid authentication protocols. IEEE Transactions on Dependable and Secure Computing 8(4), (2011): 548–563.
[31]Hernandez-Castro, J.C., Tapiador, J.M., Peris-Lopez, P., Quisquater, J.J.: Cryptanalysis of the sasi ultralightweight rfid authentication protocol with modular rotations. arXiv preprint arXiv:0811.4257 (2008).
[32]Phan, Raphael C-W. "Cryptanalysis of a new ultralightweight RFID authentication protocol—SASI." IEEE Transactions on Dependable and secure Computing 6.4 (2009): 316-320.
[33]Bilal, Zeeshan, Ashraf Masood, and Firdous Kausar. "Security analysis of ultra-lightweight cryptographic protocol for low-cost RFID tags: Gossamer protocol." 2009 International Conference on Network-Based Information Systems. IEEE, 2009.
[34]Y Yeh, Kuo-Hui, and N. W. Lo. "Improvement of two lightweight RFID authentication protocols." Information Assurance and Security Letters 1.1 (2010): 6-11.
[35]Tagra, Deepak, Musfiq Rahman, and Srinivas Sampalli. "Technique for preventing DoS attacks on RFID systems." Software, Telecommunications and Computer Networks (SoftCOM), 2010 International Conference on. IEEE, 2010.
[36]Ahmadian, Zahra, Mahmoud Salmasizadeh, and Mohammad Reza Aref. "Desynchronization Attack on RAPP Ultralightweight Authentication Protocol." Inf. Process. Lett. 113.7 (2013): 205-209.
[37]Zhuang, Xu, et al. "Security analysis of a new ultra-lightweight RFID protocol and its improvement." Journal of Information Hiding and Multimedia Signal Processing 4.3 (2013): 166-177.
[38]Shao-hui, Wang, et al. "Security analysis of RAPP an RFID authentication protocol based on permutation." College of computer, Nanjing University of Posts and Telecommunications, Nanjing 210046 (2012).
[39]Zhuang, Xu, et al. "Security analysis of a new ultra-lightweight RFID protocol and its improvement." Journal of Information Hiding and Multimedia Signal Processing 4.3 (2013): 166-177.
[40]Avoine, Gildas, and Xavier Carpent. "Yet another ultralightweight authentication protocol that is broken." International Workshop on Radio Frequency Identification: Security and Privacy Issues. Springer, Berlin, Heidelberg, 2012.
[41]Bernstein, Daniel J. "Salsa20 specification." eSTREAM Project algorithm description, 2005 https://cr.yp.to/snuffle/spec.pdf
[42]Rivest, Ronald L. "The invertibility of the XOR of rotations of a binary word." International Journal of Computer Mathematics 88.2 (2011): 281-284.
[43]Marc B. Reynolds. (2017, October 13). Basic XOR-rotates and their inverse. Retrieved January 18, 2019, from http://marc-b-reynolds.github.io/math/2017/10/13/XorRotate.html
[44]Tsunoo, Yukiyasu, et al. "Differential cryptanalysis of Salsa20/8." Workshop Record of SASC. Vol. 28. 2007.
[45]Automation, S. "MODBUS over serial line--Specification and Implementation guide." V2002 (2002).
[46]Olga Ruban. "Analysis and Development of the PLC Control System with the Distributed I/Os." 2008.
[47]Kilinc, H. Hakan, and Tugrul Yanik. "A survey of SIP authentication and key agreement schemes." IEEE Communications Surveys & Tutorials 16.2 (2014): 1005-1023.
[48]Tawde, Reshma, Ashwin Nivangune, and Manoj Sankhe. "Cyber security in smart grid SCADA automation systems." Innovations in Information, Embedded and Communication Systems (ICIIECS), 2015 International Conference on. IEEE, 2015.
[49]Donghyun Choi, Hanjae Jeong, Dongho Won and Seungjoo Kim. "Hybrid key management architecture for robust SCADA systems." Journal of information science and engineering 29.2 (2013): 281-298.
論文全文使用權限
  • 同意授權校內瀏覽/列印電子全文服務,於2024-01-30起公開。
  • 同意授權校外瀏覽/列印電子全文服務,於2024-01-30起公開。


  • 如您有疑問,請聯絡圖書館
    聯絡電話:(06)2757575#65773
    聯絡E-mail:etds@email.ncku.edu.tw