Abstract
This chapter presents a novel security framework developed for a multi-channel communications architecture that achieves security by distributing messages and their authentication codes across multiple channels at the bit level. This method of transmission provides protection from confidentiality and integrity attacks without relying on encryption. The two communicating parties utilize existing key exchange mechanisms to pass initialization information. The framework operates by assigning to each message bit a fragment identifier using a hardware-based stream cipher as a pseudorandom number generator, and transmitting specific message fragments across each channel. This prevents the entirety of a message from being transmitted over a single channel and spreads the authentication across the available channels, enabling the sender and receiver to identify a compromised channel even in the presence of a sophisticated man-in-the-middle attack where the adversary forces message acceptance at the destination, perhaps by altering the message error detecting code. Under some conditions, the receiver can recover the original message without retransmission. The holistic framework is attractive for critical infrastructure communications because it provides availability while defending against confidentiality and integrity attacks.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Barnes, R., Thomson, M., Pironti, A., Langley, A.: Deprecating Secure Sockets Layer Version 3.0, RFC 7568 (2015)
Blake, I., Garefalakis, T.: On the complexity of the discrete logarithm and Die-Hellman problems. J. Complex. 20(2–3), 148–170 (2004)
De Canniere, C., Preneel, B.: Trivium Specifications, Computer Security and Industrial Cryptography Group, Department of Electrical Engineering, Catholic University of Leuven, Heverlee, Belgium (2006). www.ecrypt.eu.org/stream/p3ciphers/trivium/trivium_p3.pdf
Dierks, T., Allen, C.: The TLS Protocol Version 1.0, RFC 2246 (1999)
Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.1, RFC 4346 (2006)
Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2, RFC 5246 (2008)
Fries, S., Falk, R.: Ensuring secure communications in critical infrastructures. In: Proceedings of the Sixth International Conference on Smart Grids, Green Communications and IT Energy-Aware Technologies, pp. 15–20 (2016)
North American Electric Reliability Corporation, United States Mandatory Standards Subject to Enforcement, Atlanta, Georgia (2020). www.nerc.com/pa/stand/Pages/ReliabilityStandardsUnitedStates.aspx
Paar, C., Pelzl, J.: Understanding Cryptography: A Textbook for Students and Practitioners. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-04101-3
Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.3, RFC 8446 (2018)
Rescorla, E., Korver, B.: Guidelines for Writing RFC Text on Security Considerations, RFC 3552 (2003)
Wolfe, C., Graham, S., Mills, R., Nykl, S., Simon, P.: Securing data in power-limited sensor networks using two-channel communications. ICCIP 2018. IAICT, vol. 542, pp. 81–90. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-04537-1_5
Yakymenko, I., Kasianchuk, M., Ivasiev, S., Melnyk, A., Nykolaichuk, Y.: Realization of RSA cryptographic algorithm based on vector-module method of modular exponentiation. In: Proceedings of the Fourteenth IEEE International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering, pp. 550–554 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 IFIP International Federation for Information Processing
About this paper
Cite this paper
Hayden, M., Graham, S., Betances, A., Mills, R. (2020). Multi-channel Security Through Data Fragmentation. In: Staggs, J., Shenoi, S. (eds) Critical Infrastructure Protection XIV. ICCIP 2020. IFIP Advances in Information and Communication Technology, vol 596. Springer, Cham. https://doi.org/10.1007/978-3-030-62840-6_7
Download citation
DOI: https://doi.org/10.1007/978-3-030-62840-6_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-62839-0
Online ISBN: 978-3-030-62840-6
eBook Packages: Computer ScienceComputer Science (R0)