Message authentication based on physical location on a bus

Researcher:
Prof. Eli Biham | Computer Science

Categories:

Automation, Mobility and Aerospace | Information and Computer Science

The Technology

With the ever evolving connectivity and functionality of devices, systems, infrastructures and/or the like, cyber-attacks and cyber threats may present a major and ever growing security concern for multiple networks, systems and infrastructures. Potential malicious attackers may penetrate a network either by connecting to the network and/or by taking over one or more devices connected to the network and intercept and/or inject malicious data to the network. One of the major methods to detect, prevent and/or circumvent such cyber threats is message authentication in which the origin of a message is authenticated as the valid legitimate member of the network as opposed to a potential attacker and/or a compromised member of the network. The developed technology is a system for authenticating messages transmitted on a bus based on physical location of transmitting units, comprising a reflector adapted to inject a plurality of reflection signals at a first point of a line topology bus, each in response to each of a plurality of messages transmitted by a plurality of bus connected units and a probe adapted to intercept the messages and the reflection signals at a second point of the bus. The probe calculates propagation timing between a reception time of the message and a reception time of an associated reflection signal transmitted in response to the message and determines validity of the message according to a match between the calculated propagation timing and a predefined propagation timings associated with the bus connected units. Wherein the bus connected units are statically connected to the bus between the first point and the second point.

Advantages

  • Easy message authentication with minimal overhead
  • Location-based authentication significantly reduces complexity of the bus units which may be relived of supporting cryptographic abilities which are typically extensive
  • Bus bandwidth utilization (traffic) may be maintained as in normal bus operation
  • Allows connection of legacy bus units to bus deployments incorporating the probe and reflector for the message origin location based authentication

Applications and Opportunities

  • Protecting transportation against cyber threats
arrow Business Development Contacts
Shikma Litmanovitz
Director of Business Development, Physical Science