Reference : Assessing the Impact of Attacks on an Automotive Ethernet Time Synchronization Testbed
Scientific congresses, symposiums and conference proceedings : Paper published in a book
Engineering, computing & technology : Computer science
Security, Reliability and Trust
http://hdl.handle.net/10993/54722
Assessing the Impact of Attacks on an Automotive Ethernet Time Synchronization Testbed
English
Fotouhi, Mahdi mailto [University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS) >]
Buscemi, Alessio mailto [University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS) >]
Boualouache, Abdelwahab mailto [University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS) >]
Jomrich, Florian mailto [Honda R&D (Germany)]
Koebel, Christian mailto [Honda R&D (Germany)]
Engel, Thomas mailto [University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS) >]
Jul-2023
2023 IEEE Vehicular Networking Conference (VNC), Istanbul 26-28 April 2023
Fotouhi, Mahdi mailto
Buscemi, Alessio mailto
Boualouache, Abdelwahab mailto
Jomrich, Florian mailto
Koebel, Christian mailto
Engel, Thomas mailto
Yes
2023 IEEE Vehicular Networking Conference (VNC)
From 26-04-2023 to 28-04-2023
[en] Connected Vehicles ; Time Sensitive Networking ; Cybersecurity ; Automotive Ethernet
[en] Time Sensitive Network (TSN) standards are gaining traction in the scientific community and automotive Original Equipment Manufacturers (OEMs) due their promise of deterministic Ethernet networking. Among these standards, Generalized Precision Time Protocol (gPTP) - IEEE 802.1AS - allows network devices to be synchronized with a precision far higher than other synchronization standards, such as Network Time Protocol (NTP). gPTP is a profile of Precision Time Protocol (PTP) which, due to its robustness to delay variations, has been designated for automotive applications. Nonetheless, gPTP was designed without security controls, which makes it vulnerable to a number of attacks. This work reveals a critical vulnerability caused by a common implementation practice that opens the door to spoofing attacks on gPTP. To assess the impact of this vulnerability, we built two real gPTP-capable testbeds. Our results show high risks of this vulnerability destabilizing the system functionality.
FnR, Honda R&D
Researchers ; Professionals ; General public
http://hdl.handle.net/10993/54722
FnR ; FNR15381341 > Thomas Engel > SETICA > Securing Time Critical Traffic In (Next Gen) Automotive Networks > 01/06/2021 > 31/05/2024 > 2020

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Open access
Assessing_impact.pdfAuthor preprint701.87 kBView/Open

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.