Cited 0 time in webofscience Cited 0 time in scopus

Cyber-attack vulnerability analysis of communication based train control

Title
Cyber-attack vulnerability analysis of communication based train control
Translated Title
무선통신 기반 열차제어에서의 사이버 공격에 대한 취약점 분석
Authors
Park, In-Hee
Advisor(s)
Park, Kyung Joon
Co-Advisor(s)
Cho, Min Gyu
Issue Date
2018
Available Date
2018-03-14
Degree Date
2018. 2
Type
Thesis
Keywords
CBTCKRTCSCyber attackVulnerability analysis
Abstract
Recently, as train control systems are replaced with wireless communication based train control systems, there is an increased risk of safety being compromised. One risk is that an attacker uses wireless communication in the train network to access the network. Accordingly, research is underway on countermeasures to prevent an attacker from interfering with the data needed to control the train. In this paper, we study the Korean radio train control system, which is one of the types of wireless communication based train control system. A cyber attack proposed in previous research is used not only for the train system but also other systems. In other words, it is an attack that does not consider the characteristics of the train properly. The main idea of the attack is to exploit a vulnerability that distinguish data only on SEQ and CRC of data without a special security system in discriminating data in train network. This cyber attack is effective and the damage that occurs is confirmed through experiments in a testbed similar to a real environment. The proposed attack is based on a message that is used in the actual train network, and is different from the existing attacks. In this sense, it is expected to cause great damage in a real environment. The results have shown that countermeasures against this problem are necessary. ⓒ 2017 DGIST
Table Of Contents
Ⅰ. INTRODUCTION 1-- Ⅱ. BACKGROUD 4-- 2.1 Communication Based Train Control (CBTC) 4-- 2.2 Korea Radio Train Control System (KRTCS) 6-- Ⅲ. RELATED WORK 7-- 3.1 Attacks against CBTC 7-- 3.2 Cyber security of CBTC 8-- Ⅳ. VULNERABILITY ANALYSIS OF CYBER ATTACK IN CBTC 10-- 4.1 Motivation and vulnerability analysis of KRTCS 10-- 4.2 Analyzed vulnerability based cyber-attack 12-- Ⅴ. EXPERIMENT RESULTS 23-- 5.1 Testbed environment 23-- 5.2 Experiment results 27-- Ⅵ. CONCLUSION 31-- REFERENCES 32-- SUMMARY (Korean) 34
URI
http://dgist.dcollection.net/common/orgView/200000005296
http://hdl.handle.net/20.500.11750/6022
DOI
10.22677/thesis.200000005296
Degree
Master
Department
Information and Communication Engineering
University
DGIST
Related Researcher
  • Author Cho, Min Gyu  
  • Research Interests IoT (Internet of Things); CPS (Cyber Physical System); WSN (Wireless Sensor Networks); Routing;security protocol on WSN; Data analysis
Files:
Collection:
Department of Information and Communication EngineeringThesesMaster


qrcode mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE