2015
DOI: 10.1109/mcom.2015.7295471
|View full text |Cite
|
Sign up to set email alerts
|

Cyber security analysis of the European train control system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0
2

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 34 publications
(25 citation statements)
references
References 4 publications
0
23
0
2
Order By: Relevance
“…As an example, based on [15], we add the property Cipher Algorithm to the GSM-R stencil (see Figure 1) and extend the rule set accordingly. Based on this in further evaluation of existing models we will receive a warning that there are potential problems with 3DES.…”
Section: Railway Templatementioning
confidence: 99%
See 1 more Smart Citation
“…As an example, based on [15], we add the property Cipher Algorithm to the GSM-R stencil (see Figure 1) and extend the rule set accordingly. Based on this in further evaluation of existing models we will receive a warning that there are potential problems with 3DES.…”
Section: Railway Templatementioning
confidence: 99%
“…With the transition to information and communication systems, the cyber-attack surface has increased tremendously. Evaluations showed vulnerabilities and weaknesses in European Rail Traffic Management System (ERTMS) [3,15] and a rail-based honeypot setup showed an active threat landscape [14].…”
Section: Introductionmentioning
confidence: 99%
“…Additionally, [14] pointed out that since the distribution of the KMAC key is made off-line and this requires personnel to manually deliver the keys from the KMC to the ERTMS entities, many operators decide to simplify the process by using the same KMAC for large train fleets, amplifying the risk of having an attack. Therefore, if the attack is performed during the session establishment process and the same key is shared between different parties, the whole system could be compromised: an attacker could take the identity of many trains in other session establishments.…”
Section: Related Workmentioning
confidence: 99%
“…Trenbideen ingurunean lan handia egin da prebentzio-segurtasuna bermatzeko, honako artikulu hauetan ikus daitekeen moduan: [7,8]. Baina babes-segurtasuna eskakizun berria da, eta hori bermatzeko ikerketan ahaleginak egin badira ere [5,9,11,12], oraindik ere lan handia behar du. Gainera, prebentzio-segurtasuna bermatzeko erabiltzen diren arriskuen probabilitateetan oinarritutako analisiak ez dira baliagarriak babes-segurtasuna bermatzeko, ezin baita jakin erasotzaile batek noiz aurkituko dituen sistemaren ahultasunak.…”
Section: Ertms Sistemaren Segurtasunaunclassified
“…Horien ondorioz, mezuak errepikatzeko aukera sortzen da. Aurrekoez gain, [11] artikuluan EuroRadio protokoloaren bestelako ahultasunak deskribatzen dira, bereziki KMAC kodea off-line banatzearen Irene Arsuaga Oria, Nerea Toledo Gandarias ondorioz sortzen diren ahultasunak. Izan ere, banaketa hori off-line egitearen ondorioz, beharrezkoa da banaketan gizakien esku-hartzea, lehen esandako moduan.…”
Section: Ertms Sistemaren Segurtasun-arazoakunclassified