A Clock Skew Replication Attack Detection Approach Utilizing the Resolution of System Time

碩士 === 國立臺灣科技大學 === 資訊工程系 === 103 === The clock skew, or the physical ticking rate of the clock, of a device is potential to serve as the fingerprint in identification/authentication purpose. However, it remains an open issue on detecting clock skew replication attacks realized by sending fake times...

Full description

Bibliographic Details
Main Authors: Yi-Hao Chu, 竺宜豪
Other Authors: Wei-Chung Teng
Format: Others
Language:zh-TW
Published: 2015
Online Access:http://ndltd.ncl.edu.tw/handle/76543291644017240429
id ndltd-TW-103NTUS5392053
record_format oai_dc
spelling ndltd-TW-103NTUS53920532016-11-06T04:19:40Z http://ndltd.ncl.edu.tw/handle/76543291644017240429 A Clock Skew Replication Attack Detection Approach Utilizing the Resolution of System Time 一個利用系統時間解析度的時脈偏移複製攻擊偵測方法 Yi-Hao Chu 竺宜豪 碩士 國立臺灣科技大學 資訊工程系 103 The clock skew, or the physical ticking rate of the clock, of a device is potential to serve as the fingerprint in identification/authentication purpose. However, it remains an open issue on detecting clock skew replication attacks realized by sending fake timestamps. In this research, it is confirmed that an attacker may fake any target skew with errors in the range of ±1ppm. On the other hand, it is also observed that the values of fake timestamps are affected by the resolution of the system time clock. When the resolution is 1ms or lower, there exists regularly the so-called jump points between consecutive offsets. The scale of each jump is theoretically the very resolution of the system clock. We utilized this characteristic to develop a filtering method on the detection of fake timestamps. When regular jumps are detected, the filter module would abandon the scale of jumps to recover the origin clock skews. Experiment results on 15.6ms and 1ms time resolutions have shown that the developed method is effective on detecting replication attacks, and the recovered clock skews are no more than 1ppm away from the real skews of attackers’ devices. Wei-Chung Teng 鄧惟中 2015 學位論文 ; thesis 44 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立臺灣科技大學 === 資訊工程系 === 103 === The clock skew, or the physical ticking rate of the clock, of a device is potential to serve as the fingerprint in identification/authentication purpose. However, it remains an open issue on detecting clock skew replication attacks realized by sending fake timestamps. In this research, it is confirmed that an attacker may fake any target skew with errors in the range of ±1ppm. On the other hand, it is also observed that the values of fake timestamps are affected by the resolution of the system time clock. When the resolution is 1ms or lower, there exists regularly the so-called jump points between consecutive offsets. The scale of each jump is theoretically the very resolution of the system clock. We utilized this characteristic to develop a filtering method on the detection of fake timestamps. When regular jumps are detected, the filter module would abandon the scale of jumps to recover the origin clock skews. Experiment results on 15.6ms and 1ms time resolutions have shown that the developed method is effective on detecting replication attacks, and the recovered clock skews are no more than 1ppm away from the real skews of attackers’ devices.
author2 Wei-Chung Teng
author_facet Wei-Chung Teng
Yi-Hao Chu
竺宜豪
author Yi-Hao Chu
竺宜豪
spellingShingle Yi-Hao Chu
竺宜豪
A Clock Skew Replication Attack Detection Approach Utilizing the Resolution of System Time
author_sort Yi-Hao Chu
title A Clock Skew Replication Attack Detection Approach Utilizing the Resolution of System Time
title_short A Clock Skew Replication Attack Detection Approach Utilizing the Resolution of System Time
title_full A Clock Skew Replication Attack Detection Approach Utilizing the Resolution of System Time
title_fullStr A Clock Skew Replication Attack Detection Approach Utilizing the Resolution of System Time
title_full_unstemmed A Clock Skew Replication Attack Detection Approach Utilizing the Resolution of System Time
title_sort clock skew replication attack detection approach utilizing the resolution of system time
publishDate 2015
url http://ndltd.ncl.edu.tw/handle/76543291644017240429
work_keys_str_mv AT yihaochu aclockskewreplicationattackdetectionapproachutilizingtheresolutionofsystemtime
AT zhúyíháo aclockskewreplicationattackdetectionapproachutilizingtheresolutionofsystemtime
AT yihaochu yīgèlìyòngxìtǒngshíjiānjiěxīdùdeshímàipiānyífùzhìgōngjīzhēncèfāngfǎ
AT zhúyíháo yīgèlìyòngxìtǒngshíjiānjiěxīdùdeshímàipiānyífùzhìgōngjīzhēncèfāngfǎ
AT yihaochu clockskewreplicationattackdetectionapproachutilizingtheresolutionofsystemtime
AT zhúyíháo clockskewreplicationattackdetectionapproachutilizingtheresolutionofsystemtime
_version_ 1718391519097913344