Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  百年期刊
Journal of Tsinghua University(Science and Technology)    2016, Vol. 56 Issue (1) : 42-50     DOI: 10.16511/j.cnki.qhdxxb.2016.23.010
INFORMATION SECURITY |
Analysis of a method for attacking WTBlink layers in a train communication network
WAN Hai1, SUN Lei2, WANG Tian1, HUANG Jin1, ZHAO Xibin1
1. Information System Security Key Laboratory of Ministry of Education, School of Software, Tsinghua University, Beijing 100084, China;
2. School of Precision Instrument & Opto-electronics Engineering, Tianjin University, Tianjin 300072, China
Download: PDF(1749 KB)  
Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks    
Abstract  Train communication network (TCN) is a specialized industrial control network, whose safety and security problems are of great importance. The wire train bus (WTB) is one of the link layer communication modules of TCN architectures. A potential risk and a possible attack method were found based on the analysis of WTB communication protocol. Formal modeling verification and experiments show that the attack method is feasible. Based on the characteristics of the attack method, this paper also proposes a precautionary method.
Keywords train communication network (TCN)      wire train bus (WTB)      attacks      preliminary solutions     
ZTFLH:  TP309  
Issue Date: 15 January 2016
Service
E-mail this article
E-mail Alert
RSS
Articles by authors
WAN Hai
SUN Lei
WANG Tian
HUANG Jin
ZHAO Xibin
Cite this article:   
WAN Hai,SUN Lei,WANG Tian, et al. Analysis of a method for attacking WTBlink layers in a train communication network[J]. Journal of Tsinghua University(Science and Technology), 2016, 56(1): 42-50.
URL:  
http://jst.tsinghuajournals.com/EN/10.16511/j.cnki.qhdxxb.2016.23.010     OR     http://jst.tsinghuajournals.com/EN/Y2016/V56/I1/42
  
  
  
  
  
  
  
  
  
  
  
  
[1] 石淑华, 池瑞楠. 计算机网络安全技术. 北京: 人民邮电出版社, 2012.
[2] 晋宽, 淑华, 雨川. 工业网络技术. 北京: 北京邮电学院出版社, 2007.
[3] 李战宝, 潘卓. 透视“震网”病毒[J]. 信息网络安全, 2011(9): 230-232.LI Zhanbao, PAN Zhuo. The perspective of Stuxnet viru [J]. Netinfo Security, 2011( 9): 230-232. (in Chinese)
[4] 陶艳. 列车网络控制技术原理与应用 [M]. 北京: 中国电力出版社, 2010.
[5] 全宏宇. CTCS-3级列控系统地车安全信息传输子系统的建模与分析 [M]. 北京: 北京交通大学出版社, 2014.
[6] 张文远. 全面加强LKJ系统设备运用管理 [J]. 铁道通信信号, 2009, 45(10): 49-50.ZHANG Wenyuan. Strengthening LKJ system equipment application management in all aspects [J]. Railway Signalling & Communication, 2009, 45(10): 49-50. (in Chinese)
[7] 申瑞源. 机车车载安全防护系统(6A系统)总体方案研究 [J]. 中国铁路, 2012(12): 1-6.SHEN Ruiyuan. Research on the overall scheme of train-carried safety protection system (6A system) [J]. Chinese Railways, 2012(12): 1-6. (in Chinese)
[8] IEC. IEC 61375-1. Electric railway equipment-Train bus- Part 1: Train communication network [S]. Switzerland: IEC, 1999.
[9] Bengtsson J, Larsen K, Larsson F, et al. Uppaal: A tool suite for automatic verification of real-time systems [J]. Hybrid Systems III, 1996, 232-243.
[10] Alur R, Dill D. A theory of timed automata [J]. Theoretical Computer Science, 1994, 126(2): 183-235.
[11] YU Jiang, ZHANG Hehua, SONG Xiaoyu, et al. Verification and implementation of the protocol standard in train control system [C]//Computer Software and Applications Conference (COMPSAC), 2013 IEEE 37th Annual. IEEE, 2013: 549-558. null
[1] ZHANG Yu, LIU Qingzhong, SHI Yuanquan, CAO Junkuo. Digital vaccine-based dynamic defense model for stealthy ransomware attacks[J]. Journal of Tsinghua University(Science and Technology), 2020, 60(5): 402-407.
[2] HUANG Lida, CHEN Jianguo, YUAN Hongyong, WANG Yan. Terrorist attack vulnerability analysis of a natural gas network based on the Attacker-Defender game model[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(6): 609-613.
[3] ZHANG Yu, PAN Xiaoming, LIU Qingzhong, CAO Junkuo, LUO Ziqiang. APT attacks and defenses[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(11): 1127-1133.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
Copyright © Journal of Tsinghua University(Science and Technology), All Rights Reserved.
Powered by Beijing Magtech Co. Ltd