A Clock Skew Replication Attack Detection Approach Utilizing the Resolution of System Time
碩士 === 國立臺灣科技大學 === 資訊工程系 === 103 === The clock skew, or the physical ticking rate of the clock, of a device is potential to serve as the fingerprint in identification/authentication purpose. However, it remains an open issue on detecting clock skew replication attacks realized by sending fake times...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2015
|
Online Access: | http://ndltd.ncl.edu.tw/handle/76543291644017240429 |
id |
ndltd-TW-103NTUS5392053 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-103NTUS53920532016-11-06T04:19:40Z http://ndltd.ncl.edu.tw/handle/76543291644017240429 A Clock Skew Replication Attack Detection Approach Utilizing the Resolution of System Time 一個利用系統時間解析度的時脈偏移複製攻擊偵測方法 Yi-Hao Chu 竺宜豪 碩士 國立臺灣科技大學 資訊工程系 103 The clock skew, or the physical ticking rate of the clock, of a device is potential to serve as the fingerprint in identification/authentication purpose. However, it remains an open issue on detecting clock skew replication attacks realized by sending fake timestamps. In this research, it is confirmed that an attacker may fake any target skew with errors in the range of ±1ppm. On the other hand, it is also observed that the values of fake timestamps are affected by the resolution of the system time clock. When the resolution is 1ms or lower, there exists regularly the so-called jump points between consecutive offsets. The scale of each jump is theoretically the very resolution of the system clock. We utilized this characteristic to develop a filtering method on the detection of fake timestamps. When regular jumps are detected, the filter module would abandon the scale of jumps to recover the origin clock skews. Experiment results on 15.6ms and 1ms time resolutions have shown that the developed method is effective on detecting replication attacks, and the recovered clock skews are no more than 1ppm away from the real skews of attackers’ devices. Wei-Chung Teng 鄧惟中 2015 學位論文 ; thesis 44 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣科技大學 === 資訊工程系 === 103 === The clock skew, or the physical ticking rate of the clock, of a device is potential to serve as the fingerprint in identification/authentication purpose. However, it remains an open issue on detecting clock skew replication attacks realized by sending fake timestamps. In this research, it is confirmed that an attacker may fake any target skew with errors in the range of ±1ppm. On the other hand, it is also observed that the values of fake timestamps are affected by the resolution of the system time clock. When the resolution is 1ms or lower, there exists regularly the so-called jump points between consecutive offsets. The scale of each jump is theoretically the very resolution of the system clock. We utilized this characteristic to develop a filtering method on the detection of fake timestamps. When regular jumps are detected, the filter module would abandon the scale of jumps to recover the origin clock skews. Experiment results on 15.6ms and 1ms time resolutions have shown that the developed method is effective on detecting replication attacks, and the recovered clock skews are no more than 1ppm away from the real skews of attackers’ devices.
|
author2 |
Wei-Chung Teng |
author_facet |
Wei-Chung Teng Yi-Hao Chu 竺宜豪 |
author |
Yi-Hao Chu 竺宜豪 |
spellingShingle |
Yi-Hao Chu 竺宜豪 A Clock Skew Replication Attack Detection Approach Utilizing the Resolution of System Time |
author_sort |
Yi-Hao Chu |
title |
A Clock Skew Replication Attack Detection Approach Utilizing the Resolution of System Time |
title_short |
A Clock Skew Replication Attack Detection Approach Utilizing the Resolution of System Time |
title_full |
A Clock Skew Replication Attack Detection Approach Utilizing the Resolution of System Time |
title_fullStr |
A Clock Skew Replication Attack Detection Approach Utilizing the Resolution of System Time |
title_full_unstemmed |
A Clock Skew Replication Attack Detection Approach Utilizing the Resolution of System Time |
title_sort |
clock skew replication attack detection approach utilizing the resolution of system time |
publishDate |
2015 |
url |
http://ndltd.ncl.edu.tw/handle/76543291644017240429 |
work_keys_str_mv |
AT yihaochu aclockskewreplicationattackdetectionapproachutilizingtheresolutionofsystemtime AT zhúyíháo aclockskewreplicationattackdetectionapproachutilizingtheresolutionofsystemtime AT yihaochu yīgèlìyòngxìtǒngshíjiānjiěxīdùdeshímàipiānyífùzhìgōngjīzhēncèfāngfǎ AT zhúyíháo yīgèlìyòngxìtǒngshíjiānjiěxīdùdeshímàipiānyífùzhìgōngjīzhēncèfāngfǎ AT yihaochu clockskewreplicationattackdetectionapproachutilizingtheresolutionofsystemtime AT zhúyíháo clockskewreplicationattackdetectionapproachutilizingtheresolutionofsystemtime |
_version_ |
1718391519097913344 |