Vulnerability Analysis of LTE-R Train-to-Ground Communication Time Synchronization
Abstract
:1. Introduction
2. Network Architecture and Basic Knowledge
2.1. GSM-R and LTE-R Network Architectures
2.2. PTP Time Synchronization Principle
- 1.
- The master clock sends a Sync message to the slave clock in the form of a broadcast at T1, and the slave clock receives the message at T2;
- 2.
- Then, the master clock sends a Follow_up message to the slave clock in the form of a broadcast, which carries the sending T1 timestamp of the Sync message;
- 3.
- The slave clock sends a Delay_Req message to the master clock in a point-to-point manner at T3, and the master clock receives the message at T4;
- 4.
- The master clock sends a Delay_Rep message to the slave clock in a point-to-point manner, which carries the T4 timestamp of the master clock reception time.
2.3. LTE-R Train-to-Ground Communication Time Synchronization Process
3. Attack Analysis of Time Synchronization Process of LTE-R Train-to-Ground Communication
- LTE-R has an all-IP architecture. The LTE-R railway wireless communication system is designed with an all-IP architecture, and the IP protocol is an unreliable packet communication protocol. It has a potential fault whereby the PTP message loss and wrong sequence caused by an attacker’s intrusion are not detected. The attacker can continuously attack the PTP synchronization process, and this is not easily detected. This problem seriously affects the traffic safety of high-speed railways.
- The PTP sends synchronization messages in the form of multicast addresses [17]. Attackers can make full use of this feature to monitor and obtain the synchronization messages sent by the master clock. Moreover, attackers can make a spoofing packet with the frame format shown in Figure 4 to complete two-way deception between the master and slave clocks. This method is also imperceptible.
4. Establishment of LTE-R Time Synchronization SPN and MC Models
4.1. Basic Concepts of Stochastic Petri Nets
- P = {P1, P2, …, Pn} is a finite set of repositories, and n is the number of repositories;
- T = {t1, t2, …, tn} is a finite set of changes, and m is the number of changes, satisfying and ;
- is a set of directed arcs, where I represents the set of transition input arcs, ; O represents the set of transition output arcs, ; the forbidden arc is allowed in F; and the forbidden arc only exists in the arc from the depot to the transition;
- is an arc function, where (1, 2, 3, …);
- is the marking of the Petri net. M0 is the initial marking, which indicates the initial state of the system;
- = {,, …,} represents the average firing rate set associated with the transition.
4.2. Modeling Analysis of LTE-R Time Synchronization Vulnerability Based on Stochastic Petri Nets
4.3. SPN Model of LTE-R Time Synchronization Process
- 1.
- 2.
- Analyze the reachability set of the SPN model. Transform the actual transition marked on each arc into its average firing rate, and construct a continuous-time Markov chain;
- 3.
- Solve the steady-state probability according to the related theorem of Markov chain stationary distribution and Chapman–Kolmogorov equations. Suppose the steady-state probability of n reachable states is P[Mi] = xi(). Determine the element xi in the steady-state probability set X = [x1, x2, … , xn] using the following system of equations:
- 4.
- Substitute = {,, …,}, solve the equations, solve the stability probability of each state, and analyze the LTE-R time synchronization process according to the obtained steady-state probabilities.
4.4. Isomorphic MC Based on SPN
- 1.
- Firstly, the firing rule between states in the SPN model is analyzed, and the marked reachable sets of all states are obtained;
- 2.
- Each marking of the SPN is converted into a node corresponding to the continuous-time Markov chain reachability graph;
- 3.
- The transition events between different markings in the SPN model are mapped into arcs between nodes of the CTMC reachability graph, showing the logical relationship between the different states of the system;
- 4.
- Then, the transition firing rate in the SPN model is marked on each arc in the reachability graph of CTMC, and the CTMC distribution probability function is obtained.
5. Vulnerability Analysis of LTE-R Time Synchronization
5.1. Calculate the Steady-State Probability of Each State of MC
5.2. Vulnerability Analysis
6. Simulation Analysis
6.1. eNodeB Vulnerability Analysis
6.2. OBC Vulnerability Analysis
7. Conclusions
- 1.
- The master–slave clock is a vulnerable node in the whole process when it is waiting to receive the key PTP message. If it is attacked to varying degrees at this critical time, the whole synchronization process will be greatly impacted.
- 2.
- Whenthe master clock of the synchronization process, eNodeB, is attacked to varying degrees, the end states of the whole synchronization process are affected. However, when the slave clock, the OBC, whose timing structure is lower than that of eNodeB, is attacked to varying degrees, only the OBC is affected. This conclusion is consistent with the conclusion drawn in a previous study that conducted a physical experiment, further verifying the effectiveness of the SPN analysis model in this paper.
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
ARP | Address Resolution Protocol |
BSC | Base station controller |
BTS | Base transceiver station |
CTMC | Continuous-time Markov chain |
DoS | Denial of service |
eNodeB | evolved Node B |
EPC | Evolved Packet Core |
E-UTRAN | Evolved Universal Telecommunication Radio Access Network |
GPRS | General Packet Radio Service |
HSS | Home Subscriber Server |
IMS | Information Management System |
LTE-R | Long-term evolution for railway |
MC | Markov chain |
MME | Mobility Management Entity |
MIMO | Multiple-input multiple-output |
MITM | Man-in-the-middle |
NTP | Network time protocol |
OBC | On-board controller |
OFDM | Orthogonal frequency division multiplexing |
P-GW | PDN GateWay |
PTP | Precision time protocol |
S-GW | Serving GateWay |
SPN | Stochastic Petri net |
VS | Vehicle station |
References
- Chen, Y.; Chen, Y.; Zhang, W. Modeling and analysis of LTE-R wireless communication reliability based on SPN. JCRS 2020, 42, 111–119. [Google Scholar]
- Chen, Y.; Niu, K.Y.; Wang, Z. Adaptive handover algorithm for LTE-R system in high-speed railway scenario. IEEE Access 2021, 9, 59540–59547. [Google Scholar] [CrossRef]
- Xie, H.Y. Interpretation of the railway industy standard technical conditions for railway time synchronization network. RQC 2016, 44, 6–14. [Google Scholar]
- Lan, L.; Zhang, Y.P. Modeling and security analysis of railway time synchronization protocol based on colored petri nets. JCRS 2019, 16, 1089–1096. [Google Scholar]
- Zhang, Y.P.; Zou, X.Y.; Lan, L. Research of an improved PTP protocol in railway ground signal equipment system. JRSE 2019, 16, 1790–1799. [Google Scholar]
- Pepiciello, A.; Vaccaro, A.; Pietropaoli, T. Experimental assessment of a PTP-based system for large scale time synchronization of smart grids. In Proceedings of the 2020 55th International Universities Power Engineering Conference, Turin, Italy, 1–4 September 2020. [Google Scholar]
- Garg, A.; Yadav, A.; Silora, A.; Sairam, A.S. Wireless precision time protocol. IEEE Commun. Lett. 2018, 22, 812–815. [Google Scholar] [CrossRef]
- Kong, B. Research on Field Strength and Quality of Service of LTE-R Network in ShuoHuang Railway. Master’s Thesis, Shijiazhuang Tiedao University, Shijiazhuang, China, 2018. [Google Scholar]
- Alghamdi, W.; Schukat, M. Practical implementation of APTs on PTP time synchronization networks. In Proceedings of the 2020 31st Irish Signals and Systems Conference, Letterkenny, Ireland, 11–12 June 2020. [Google Scholar]
- Han, M.; Crossley, P. Vulnerability of IEEE 1588 under time synchronization attacks. In Proceedings of the 2019 IEEE Power & Energy Society General Meeting, Atlanta, GA, USA, 4–8 August 2019. [Google Scholar]
- Yao, Z.Q.; Zhu, Z.R.; Ye, G.H. Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement. JOC 2021, 42, 103–110. [Google Scholar]
- Yu, C.; Chen, S.H. On effects of mobility management signaling based DoS attacks against LTE terminals. In Proceedings of the 2019 IEEE 38th International Performance Computing and Communications Conference, London, UK, 29–31 October 2019. [Google Scholar]
- DeCusatis, C.; Lynch, R.M.; Kluge, W.; Houston, J.; Wojciak, P.A.; Guendert, S. Impact of cyberattacks on precision time protocol. IEEE Trans. Instrum. Meas. 2020, 69, 2172–2181. [Google Scholar] [CrossRef]
- Narula, L.; Humphreys, T.E. Requirements for secure cock synchronization. IEEE J. Sel. Top Signal Process 2018, 12, 749–762. [Google Scholar] [CrossRef]
- Wang, Y.; Zhang, W.; Wang, X.; Guo, W.; Khan, M.K.; Fan, P. Improving the security of LTE-R for high-speed railway: From the access authentication view. IEEE Trans. Intell. Transp. Syst. 2022, 23, 1332–1346. [Google Scholar] [CrossRef]
- He, S.Y.; Huang, L.S.; Shen, J.; Gao, G.; Wang, G.H.; Chen, X.J.; Zhu, L.L. Time synchronization network for EAST poloidal field power supply control system based on IEEE 1588. IEEE Trans. PlasmaSci. 2018, 46, 2680–2684. [Google Scholar] [CrossRef]
- Kerö, N.; Puhm, A.; Kernen, T.; Mroczkowski, A. Performance and reliability aspects of clock synchronization techniques for industrial automation. Proc. IEEE 2019, 107, 1011–1026. [Google Scholar] [CrossRef]
- Moussa, B.; Kassouf, M.; Hadjidj, R.; Debbabi, M.; Assi, C. An extension to the precision time protocol (PTP) to enable the detection of cyber attacks. IEEE Trans. Industr. Inform. 2020, 16, 18–27. [Google Scholar] [CrossRef]
Places | Definition |
---|---|
P0 | Attacker intrusion status |
P1 | Initialization of the primary clock node eNodeB |
P2 | Initialization of the secondary clock node OBC |
P3 | eNodeB waits to receive the Delay_Req message |
P4 | OBC waits to receive Follow_up message |
P5 | eNodeB receives the malicious tampered PTP message |
P6 | eNodeB receives the Delay_Rep message |
P7 | Complete the process of calculating clock offset |
P8, P13 | OBC receives the malicious tampered PTP message |
P9 | eNodeB time synchronization failed, entering the next cycle |
P10 | eNodeB time synchronization succeeded, entering the next cycle |
P11 | OBC waits to receive the Delay_Req message |
P12 | Complete the process of calculating clock delay |
P14 | OBC time synchronization succeeded, entering the next cycle |
P15 | OBC time synchronization failed, entering the next cycle |
Transitions | Definition |
---|---|
t1, t2 | The primary and secondary clock nodes eNodeB and OBC establish communication connections with each other |
t3, t6, t14 | Clock nodes receive the malicious tampered PTP synchronization message |
t4 | eNodeB receives Delay_Req message |
t5 | OBC receives Follow_up message and calculates the value of offset |
t7, t10, t15 | Exception handling of tampered message |
t8 | eNodeB sends Delay_Rep message |
t9 | OBC sends Delay_Req message |
t11 | eNodeB abnormal end |
t12 | eNodeB normal end |
t13 | OBC receives Delay_Rep message and calculates the value of delay |
t16 | It is determined that offset and delay meet the time threshold |
t17 | It is determined that offset and delay do not meet the time threshold |
t18 | OBC normal end |
t19 | OBC abnormal end |
Transitions | Corresponding Firing Rate | Definition |
---|---|---|
t4 | eNodeB receives the Delay_Req message sent by the OBC | |
t5 | OBC receives the Follow_up message sent by eNodeB | |
t13 | OBC receives the Delay_Rep message sent by eNodeB |
Steady-State Probability | Variation Range | Changing Amplitude | Change Trend |
---|---|---|---|
P(M5) | 0.1429–0.0064 | −0.1365 | Reduces Sharply |
P(M6) | 0–0.1911 | 0.1911 | Rises Sharply |
P(M13) | 0.1071–0.1481 | 0.041 | Rises Slightly |
P(M14) | 0.0179–0.0247 | 0.0068 | Almost Unchanged |
Steady-State Probability | Fragile Node | Variation Range | Changing Amplitude | Change Trend |
---|---|---|---|---|
P(M5) | 0.0769–0.0769 | 0 | Unchanged | |
0.0714–0.0829 | 0.0115 | Almost Unchanged | ||
P(M6) | 0.0769–0.0769 | 0 | Unchanged | |
0.0714–0.0829 | 0.0115 | Almost Unchanged | ||
P(M13) | 0.1538–0.0794 | −0.0744 | Reduces Slightly | |
0.1429–0.0856 | −0.0573 | Reduces Slightly | ||
P(M14) | 0–0.0372 | 0.0372 | Rises Slightly | |
0–0.0401 | 0.0401 | Rises Slightly |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Chen, Y.; Zhan, Z.; Niu, K. Vulnerability Analysis of LTE-R Train-to-Ground Communication Time Synchronization. Appl. Sci. 2022, 12, 5572. https://doi.org/10.3390/app12115572
Chen Y, Zhan Z, Niu K. Vulnerability Analysis of LTE-R Train-to-Ground Communication Time Synchronization. Applied Sciences. 2022; 12(11):5572. https://doi.org/10.3390/app12115572
Chicago/Turabian StyleChen, Yong, Zhixian Zhan, and Kaiyu Niu. 2022. "Vulnerability Analysis of LTE-R Train-to-Ground Communication Time Synchronization" Applied Sciences 12, no. 11: 5572. https://doi.org/10.3390/app12115572
APA StyleChen, Y., Zhan, Z., & Niu, K. (2022). Vulnerability Analysis of LTE-R Train-to-Ground Communication Time Synchronization. Applied Sciences, 12(11), 5572. https://doi.org/10.3390/app12115572