在遗留工业协议未使用的报头字段中改进完整性保护

Eric Wagner, †. NilsRothaug, Konrad Wolsing, L. Bader, Klaus Wehrle, Martin Henze, Cyber Analysis, Fraunhofer Defense, Fkie
{"title":"在遗留工业协议未使用的报头字段中改进完整性保护","authors":"Eric Wagner, †. NilsRothaug, Konrad Wolsing, L. Bader, Klaus Wehrle, Martin Henze, Cyber Analysis, Fraunhofer Defense, Fkie","doi":"10.1109/lcn58197.2023.10223384","DOIUrl":null,"url":null,"abstract":"—Industrial networks become increasingly interconnected, which opens the floodgates for cyberattacks on legacy networks designed without security in mind. Consequently, the vast landscape of legacy industrial communication protocols urgently demands a universal solution to integrate security features retroactively. However, current proposals are hardly adaptable to new scenarios and protocols, even though most industrial protocols share a common theme: Due to their progressive development, previously important legacy features became irrelevant and resulting unused protocol fields now offer a unique opportunity for retrofitting security. Our analysis of three prominent protocols shows that headers offer between 36 and 63 bits of unused space. To take advantage of this space, we designed the REtrofittable ProtEction Library (RePeL), which supports embedding authentication tags into arbitrary combinations of unused header fields. We show that RePeL incurs negligible overhead beyond the cryptographic processing, which can be adapted to hit performance targets or fulfill legal requirements.","PeriodicalId":178458,"journal":{"name":"2023 IEEE 48th Conference on Local Computer Networks (LCN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial Protocols\",\"authors\":\"Eric Wagner, †. NilsRothaug, Konrad Wolsing, L. Bader, Klaus Wehrle, Martin Henze, Cyber Analysis, Fraunhofer Defense, Fkie\",\"doi\":\"10.1109/lcn58197.2023.10223384\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"—Industrial networks become increasingly interconnected, which opens the floodgates for cyberattacks on legacy networks designed without security in mind. Consequently, the vast landscape of legacy industrial communication protocols urgently demands a universal solution to integrate security features retroactively. However, current proposals are hardly adaptable to new scenarios and protocols, even though most industrial protocols share a common theme: Due to their progressive development, previously important legacy features became irrelevant and resulting unused protocol fields now offer a unique opportunity for retrofitting security. Our analysis of three prominent protocols shows that headers offer between 36 and 63 bits of unused space. To take advantage of this space, we designed the REtrofittable ProtEction Library (RePeL), which supports embedding authentication tags into arbitrary combinations of unused header fields. We show that RePeL incurs negligible overhead beyond the cryptographic processing, which can be adapted to hit performance targets or fulfill legal requirements.\",\"PeriodicalId\":178458,\"journal\":{\"name\":\"2023 IEEE 48th Conference on Local Computer Networks (LCN)\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-10-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 IEEE 48th Conference on Local Computer Networks (LCN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/lcn58197.2023.10223384\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE 48th Conference on Local Computer Networks (LCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/lcn58197.2023.10223384","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

工业网络变得越来越互联,这为没有考虑安全的传统网络打开了网络攻击的闸门。因此,遗留工业通信协议的巨大前景迫切需要一种通用的解决方案来追溯地集成安全特性。然而,目前的建议很难适应新的场景和协议,尽管大多数工业协议都有一个共同的主题:由于它们的逐步发展,以前重要的遗留特性变得无关紧要,导致未使用的协议字段现在为改进安全性提供了一个独特的机会。我们对三个主要协议的分析表明,报头提供了36到63位的未使用空间。为了利用这个空间,我们设计了REtrofittable ProtEction Library(击退),它支持将身份验证标签嵌入到未使用的头字段的任意组合中。我们表明,除了加密处理之外,击退的开销可以忽略不计,它可以适应达到性能目标或满足法律要求。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial Protocols
—Industrial networks become increasingly interconnected, which opens the floodgates for cyberattacks on legacy networks designed without security in mind. Consequently, the vast landscape of legacy industrial communication protocols urgently demands a universal solution to integrate security features retroactively. However, current proposals are hardly adaptable to new scenarios and protocols, even though most industrial protocols share a common theme: Due to their progressive development, previously important legacy features became irrelevant and resulting unused protocol fields now offer a unique opportunity for retrofitting security. Our analysis of three prominent protocols shows that headers offer between 36 and 63 bits of unused space. To take advantage of this space, we designed the REtrofittable ProtEction Library (RePeL), which supports embedding authentication tags into arbitrary combinations of unused header fields. We show that RePeL incurs negligible overhead beyond the cryptographic processing, which can be adapted to hit performance targets or fulfill legal requirements.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Demo: Remote Heart Assessment using Deep Learning over IoT Phonocardiograms SyNIG: Synthetic Network Traffic Generation through Time Series Imaging Demo: Realtime Recording of IDN-Streams with the Audio Stream Input/Output (ASIO) Protocol On the Limits of Lossy Compression for Human Activity Recognition in Sensor Networks Towards Automatic Annotation and Detection of Fake News
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1