2022
DOI: 10.3390/s22186950
|View full text |Cite
|
Sign up to set email alerts
|

Integrity Verification of Distributed Nodes in Critical Infrastructures

Abstract: The accuracy and reliability of time synchronization and distribution are essential requirements for many critical infrastructures, including telecommunication networks, where 5G technologies place increasingly stringent conditions in terms of maintaining highly accurate time. A lack of synchronization between the clocks causes a malfunction of the 5G network, preventing it from providing a high quality of service; this makes the time distribution network a very viable target for attacks. Various solutions hav… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…Related to our goal are the previous works in trusted computing that studied the remote code attestation using both the software and the hardware security (e.g., trusted platform module and trusted execution environment), real-time interactive protocols for providing fresh evidence (e.g., challenge and response), and a remote trusted server, e.g., [25][26][27][28][29][30][31][32][33][34][35][36][37]. Some of the aforementioned previous research specifically focused on the wireless and mobile networking context [34][35][36][37] and is thus especially related to our work.…”
Section: Remote Code Attestationmentioning
confidence: 99%
See 1 more Smart Citation
“…Related to our goal are the previous works in trusted computing that studied the remote code attestation using both the software and the hardware security (e.g., trusted platform module and trusted execution environment), real-time interactive protocols for providing fresh evidence (e.g., challenge and response), and a remote trusted server, e.g., [25][26][27][28][29][30][31][32][33][34][35][36][37]. Some of the aforementioned previous research specifically focused on the wireless and mobile networking context [34][35][36][37] and is thus especially related to our work.…”
Section: Remote Code Attestationmentioning
confidence: 99%
“…Related to our goal are the previous works in trusted computing that studied the remote code attestation using both the software and the hardware security (e.g., trusted platform module and trusted execution environment), real-time interactive protocols for providing fresh evidence (e.g., challenge and response), and a remote trusted server, e.g., [25][26][27][28][29][30][31][32][33][34][35][36][37]. Some of the aforementioned previous research specifically focused on the wireless and mobile networking context [34][35][36][37] and is thus especially related to our work. In [34], the authors proposed two attestation protocols for wireless sensor networks where the base station and the sensor node use node-specific identities during attestation and involve additional networking communications, including the challenge-response protocol (to authenticate the attestation request).…”
Section: Remote Code Attestationmentioning
confidence: 99%
“…To resume, the Verifier performs the following operations: 1) checks the TPM quote signature; 2) validates that the ML entries match the value of PCR 10; 3) checks whether the files in the ML are the same ones as in the Verifier's whitelist (golden values) and their digests must match. A more detailed explanation of this process can be found also in [72] and [78].…”
Section: ) Remote Attestation Technique Adoptedmentioning
confidence: 99%