csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition,...

56
Master's Thesis 석석 석석석석 Cyber-attack vulnerability analysis of communication based train control In-Hee Park(석 석 석 석 석 석) Department of Information and Communication Engineering 석석석석석석석석석석 DGIST 2018

Transcript of csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition,...

Page 1: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

Master's Thesis석사 학위논문

Cyber-attack vulnerability analysis of communication based train control

In-Hee Park(박 인 희 朴 仁 熙)

Department of Information and Communication Engineering

정보통신융합공학전공

DGIST

2018

Page 2: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

Master's Thesis석사 학위논문

Cyber-attack vulnerability analysis of communication based train control

In-Hee Park(박 인 희 朴 仁 熙)

Department of Information and Communication Engineering

정보통신융합전공

DGIST

2018

Page 3: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

Cyber-attack vulnerability analysis of communication based train control

Advisor : Professor Kyung-Joon ParkCo-advisor : Professor Min-gyu Cho

by

In-Hee ParkDepartment of Information and Communication Engineering

DGIST

A thesis submitted to the faculty of DGIST in partial fulfillment of the requirements for the degree of Master of Science in the Department of Energy Science & Engineering. The study was conducted in accordance with Code of Research Ethics1

1 Declaration of Ethical Conduct in Research: I, as a graduate student of DGIST, hereby declare that I have not committed any acts that may damage the credibility of my research. These include, but are not limited to: falsification, thesis written by someone else, distortion of research findings or plagiarism. I affirm that my thesis contains honest conclusions based on my own careful research under the guidance of my thesis advisor.

Page 4: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

Dec. 7. 2017

Approved by

Professor Kyung-Joon Park ( signature) (Advisor)

Professor Min-gyu Cho (signature)(Co-Advisor)

Cyber-attack vulnerability analysis of communication based train control

In-Hee Park

Accepted in partial fulfillment of the requirements for the degree of Master of Science.

Page 5: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

Dec. 7. 2017

Head of Committee

Committee Member

Committee Member

( signature ) Prof. Kyung-Joon Park ( signature ) Prof. Min-gyu Cho ( signature ) Prof. Jihwan Choi

Page 6: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

MS/ES201622006

박 인 희. In-Hee Park. Cyber-attack vulnerability analysis of communication based train control. Department of Information and Communication Engineering. 2018. 34p. Advisors Prof. Kyung-Joon Park, Co-Advisors Prof. Min-gyu Cho

ABSTRACT

Recently, as train control systems are replaced with wireless communication based

train control systems, there is an increased risk of safety being compromised. One risk is

that an attacker uses wireless communication in the train network to access the network.

Accordingly, research is underway on countermeasures to prevent an attacker from

interfering with the data needed to control the train.

In this paper, we study the Korean radio train control system, which is one of the

types of wireless communication based train control system. A cyber attack proposed in

previous research is used not only for the train system but also other systems. In other

words, it is an attack that does not consider the characteristics of the train properly. The

main idea of the attack is to exploit a vulnerability that distinguish data only on SEQ and

CRC of data without a special security system in discriminating data in train network.

This cyber attack is effective and the damage that occurs is confirmed through

experiments in a testbed similar to a real environment. The proposed attack is based on a

message that is used in the actual train network, and is different from the existing attacks. In

this sense, it is expected to cause great damage in a real environment. The results have

shown that countermeasures against this problem are necessary.

Keywords: CBTC, KRTCS, Cyber attack, Vulnerability analysis

i

Page 7: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

Contents

Abstract·························································································i

List of contents···············································································ii

List of tables·················································································iii

List of algorithm·············································································iv

List of figures·················································································v

. INTRODUCTIONⅠ ·········································································1

. BACKGROUDⅡ ···········································································4

2.1 Communication Based Train Control (CBTC)···································4

2.2 Korea Radio Train Control System (KRTCS)····································6

. RELATED WORKⅢ ······································································7

3.1 Attacks against CBTC·······························································7

3.2 Cyber security of CBTC·····························································8

. VULNERABILITY ANALYSIS OF CYBER ATTACK IN CBTCⅣ ·············10

4.1 Motivation and vulnerability analysis of KRTCS······························10

4.2 Analyzed vulnerability based cyber-attack······································12

. EXPERIMENT RESULTSⅤ ····························································23

5.1 Testbed environment·······························································23

5.2 Experiment results··································································27

. CONCLUSIONⅥ ·········································································31

REFERENCES··············································································32

SUMMARY (Korean)······································································34

ii

Page 8: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

List of tables

Table 4.1 : Data packet configuration of KRTCS [11]·································11

Table 4.2 : Data transfer configuration among subsystems [11]······················11

Table 4.3 : ATP wayside message [16]···················································14

Table 4.4 : Packet 21 limit of movement protection [16]······························15

Table 4.5 : Packet 22 Most Restrictive Speed Profile (MRSP) [16]·················15

iii

Page 9: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

List of algorithm

Algorithm 1. MRSP creation [12]························································16

iv

Page 10: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

List of figures

Figure 2.1 : CBTC network structure······················································5

Figure 2.2 : KRTCS network structure····················································6

Figure 4.1 : ARP spoofing attack·························································12

Figure 4.2 : Transmitting and receiving information between devices··············13

Figure 4.3 : Message transmission cycle················································14

Figure 4.4 : MRSP calculation process··················································17

Figure 4.5 : DSP calculation process·····················································20

Figure 4.6 : DSP changed after attack····················································21

Figure 4.7 : Attack scenario·······························································22

Figure 5.1 : KRTCS simulator····························································23

Figure 5.2 : Simulator function screen···················································24

Figure 5.3 : Philippine railway route·····················································25

Figure 5.4 : Network environment·······················································26

Figure 5.5 : SDN controller screen·······················································26

Figure 5.6 : Ettercap········································································27

Figure 5.7 : Experiment situation·························································28

Figure 5.8 : Changed in MRSP···························································28

Figure 5.9 : Changed in DSP······························································29

Figure 5.10 : Data change in ATS and OATP···········································30

v

Page 11: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

Ⅰ. INTRODUCTION

Recently, cyber-physical systems (CPSs) have emerged as an enabler for the 4th industrial

revolution [1, 2]. A CPS focuses on the interaction between the physical system and cyber

system, where various information is exchanged through communication networks. In

addition, while the physical system evolves in real-time, the cyber system operates in

accordance with the logic flow according to the computation results, independent of the

time flow.

A representative example of such a CPS is communication based train control (CBTC).

CBTC is composed of a physical system train, a supervision system such as cyber system,

and a network connecting the two. The existing train control system manages the future

operation by changing the traffic lights while grasping the current position of the train

through the track circuit and wayside signal control. In addition, it uses a digital track

circuit as an onboard signal to provide control based on the information received, such as

the permitted speed of the line and the current speed of the train. This information is used to

create a speed profile. If a train speed cannot be adjusted according to a speed profile within

a time limit, it was put into full-service braking. Unlike the conventional method, CBTC is

a wireless communication based train control system with integrated information

communication technology (ICT). In other words, this system grasps the location and status

information of trains in the real-time train control monitoring system, and transmits the

control information to the train through the network environment.

In addition, it is possible to reduce the maintenance costs by minimizing the ground

equipment installed on the track compared to the existing system, while increasing the

transportation capacity through the train control monitoring system, which does not exist in

the existing system. It can thereby improve the operation and operation safety of the train,

1

Page 12: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

and it becomes possible to exchange various information. In other words, it is a system that

improves upon the existing system by using cyber components including wireless

communication, software-defined logic control, and real-time data of the train control

monitoring system.

CBTC is currently undergoing various studies and standardization, and in Europe, the

European train control system (ETCS) has been developed. In Korea, the Korea radio train

control system (KRTCS), which is based on CBTC has been developed in line with this

trend. A KRTCS performance evaluation and a safety evaluation have been carried out, and

the Korea railway standard specifications have been established.

As the train control system is replaced with remote control devices through the

communication network, interest in stability of the railway communication network is

increasing [21, 22, 23]. CBTC uses IEEE 802.11 based wireless communication in the

safety-related system, and therefore security countermeasures are essential to maintain

system security. Also, in order to protect against cyber attacks and jamming attacks on

wireless communication, security is required [3]. There are safety issues and challenges that

need to be addressed in order to operate radio-based railway systems, and what is needed

for future development [4].

In this paper, we propose a cyber attack that can occur in the CBTC communication.

Although previous studies have proposed cyber attacks that can occur in CBTC, most

studies have been conducted to investigate the countermeasures against attacks based on the

security problems that occur during wireless communication. Our main idea is to analyze

the security weakness in KRTCS and present a cyber attack against KRTCS, an example of

CBTC.

The cyber attack based on the analyzed vulnerability is verified through experiments in a

simulation environment that is similar to the actual train environment by changing the data

2

Page 13: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

required for actual train control used in KRTCS. The result from the experiment show that

it affects the train system.

The rest of this paper is organized as follows: Section II, introduces basic background

knowledge needed to understand our approach. Section III summarizes existing work with

respect to security of CBTC. In Section IV, a vulnerability based cyber-attack is introduced

and analyzed. Experimental evaluations are presented in Section V. Finally, Section VI

concludes this paper.

3

Page 14: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

Ⅱ. BACKGROUND

2.1 Communication Based Train Control (CBTC)

CBTC, which is a train control system using communication, uses highly reliable in-

vehicle and ground signal control equipment, and a computer installed in the central control

center on the ground continuously checks the position and speed of each train to determine

the distance to the preceding train position and the train speed limit point. Also, the

computer in the train uses the radio for data transmission between the ground and the train

by optimally controlling the speed according to the situation of the train [10]. The network

structure is show in Figure 2.1.

This system not only provides a communication link for information transmission but also

can measure the position of a moving train. It offers the advantage that the real-time

position of a moving train can be detected more accurately than with the conventional

positioning system and more information can be reliably transmitted. Thus, the train can

transmit detailed status information to the control center, and the control center can transmit

detailed command information to the train. Also, it is possible to keep the interval between

the trains to a minimum and improve the efficiency of operation

CBTC systems can be grouped into two cases according to the function. The first case

provides only simple communication equipment. The second case provides the

communication equipment and the corresponding control function. Also including control

functions, CBTC can be configured as a centralized control type and a distributed control

type. This can vary greatly depending on the specifications of the equipment provided or

the intention of the purchaser.

4

Page 15: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

2.2 Korea Radio Train Control System (KRTCS)

In order to solve the problems such as increased system maintenance cost caused by the

introduction of different overseas signal systems to each route, the difficulty of quick

response in the case of trouble, and interoperability when linking with other routes, the

Korea Railroad Research Institute has been developing a Korea radio-based train control

system supporting interoperability [16]. The network structure is shown in Figure 2.2.

KRTCS can use a standardized wireless communication network (W-LAN and LTE-R)

and supports unmanned operation. In addition, KRTCS's interoperability between ground

and onboard facilities, which are the requirements of railway operators, is supported. To this

end, for the tasks of ground ATP, onboard ATP, and onboard ATO, they defined sixteen

protocols between each device through a series of processes that define the inter-interface

specification.

5

Central ControlAutomatic Train

Supervision (ATS)

Wireless LAN

Zone Controller

ATS StationData

Communication System (DCS)

Interlocking Controller

Onboard Computer

Ground Facility

Onboard FacilityFigure 2.1. CBTC network structure

Page 16: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

. RELATED WORK Ⅲ

3.1 Attacks against CBTC

In [5], it is necessary to ensure as high a level of cyber security as possible for critical

threats to the signaling and communication systems on trains to the ETCS, a kind of CBTC.

In particular, it is necessary to prepare countermeasures against the following cyber

attacks : eavesdropping that captures packets moving along the network and proceeds with

the attack; a jamming attack that interferes with network communication through a

propagation attack; a denial of service (DoS) attack that excludes a target from service by

operating the target beyond its capabilities; based on a thorough knowledge of the target

system or its network topology, a replay attack that copies valid packets and inserts them

into the network to cause data overflow; and a man-in-the-middle attack that injects wrong

6

Page 17: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

packets between the attacker and the two systems by adopting the identity of the authorized

object in the network.

As outlined in [6], in order to improve the stability of the CBTC system, it is necessary to

solve the common security problems in the wireless communication system. It analyzes the

vulnerabilities of CBTC, classifies attacks on the system, explains how to exploit

vulnerabilities related to these vulnerabilities, and explains the active attack and passive

attack that can compromise system security functions. It is important to understand the

mechanism to prepare for such an attack, and if a system does not correspond appropriately

to such an attack, it can be fatal to the system and cause failures.

In [7], as urban rail systems increasingly rely on ICT, it is important to have a

cybersecurity perspective as well as a traditional focus on reliability, availability,

maintainability and safety. The digitized urban railway system has a physical area over a

wide geographical area, and many components are interconnected with the cyber area, and

thus attacks and defense appear in a form including both the physical area and the cyber

area. In this case, there is a problem that not only the cyber area but also the physical area

can be damaged, and as such a solution is needed based on this viewpoint.

3.2 Cyber security of CBTC

In [8], for CBTC, which is used in each country, an environment is built in which the

commands provided to the train and the control based thereon are based on future software

7

Page 18: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

defined radio (SDR) technology integrated into the communication framework to command

and control the moving train and relay advisory message. In order to prevent a situation

where a cyber security attack interferes with the safe operation of trains and cause a

collision in this environment, a rail radio intrusion detection system (RRIDS) using SDR

technology is introduced to detect cyber attacks such as replay, guessing, and message

corruption attacks. RRIDS is an IDS designed to secure communication between trains and

telecommunications equipment, and performs intrusion detection in near real-time. In

addition, through the proposed RRIDS algorithm and performance experiments, we can see

that the detection is performed with high probability when three attacks occur.

In [9], the authors propose a novel two-step network traffic anomaly detection method for

railway critical infrastructure using a wireless sensor network (WSN). The proposed

algorithm detects abnormal behavior by analyzing the traffic in the WSN and then uses

analyzed data to create an ARFIMA statistical model. In other words, the proposed

detection algorithm for detecting potential network attacks uses the difference between the

estimated traffic model and the actual data. Automatic detection of abnormal traffic

behavior could be confirmed through an experiment at actual railroad-crossing

infrastructure. Moreover, the results obtained through experiments show that the detection

methods are highly effective and accurate. These results suggest that the use of an efficient

intrusion detection system (IDS) is essential in railway critical infrastructure management

systems.

Ⅳ. VULNERABILITY ANALYSIS OF CYBER ATTACK IN CBTC

8

Page 19: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

4.1 Motivation and vulnerability analysis of KRTCS

As train control systems have been replaced by that are remotely controlled via a network,

interest in safety in railway networks has increased [15]. Therefore, in this paper, we

conducted this safety study on KRTCS.

The data in KRTCS is structured as shown in Table 4.1 and Table 4.2. At this time, when

the received data at SEQ is wrong, the data is dropped, or if the CRC values are not correct,

it can only be detected as bad data and a special encryption method or security scheme is

not applied. In other words, although the data of SEQ and CRC are correctly set and other

specific data is changed, the operation proceeds based on the data received without any

abnormality.

In addition, there is no defense against an attacker hacking an AP and attacking a device

with data that has correct SEQ, CRC and data format. Therefore, if such an attack is carried

out, the data may be manipulated easily, possibly causing problems in the control of the

train, which may threaten the operation and safety.

Among the various communication data in KRTCS, an attack can be carried out by using

an ATP wayside message, which has a direct influence on the speed profile and the

movement distance of the train.

9

Page 20: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

Table 4.1. Data packet configuration of KRTCS [11].

Ethernet Header IP Header UDP Header Message (Application data) Ethernet Footer

Table 4.2 Data transfer configuration among subsystems [11]Componet Length Contents

STX (Start of Text) 1 byte Start of the data, STX=0xFE (HEX)

SEQ (SEQuence number) 1 byte Transmission order of message, SEQ=0x00~0xFF (HEX)

(0xFE is not used)

MESSAGE N byte Actual data content (variable length)

CRC32 3 byte CRC operation value from STX to MESSAGE

4.2 Analyzed vulnerability based cyber-attack

The attack method presented in this paper is based on the following assumptions.

ⅰ ). It is not easy to connect from the outside because CBTC is composed of a closed

network in the case of the wired train network. Thus, the attacker connects to the

wireless LAN, that is, the wireless AP, and performs the attack.

ⅱ ). It is assumed that the attacker has expertise in the train system because the attacker

is going to attack based on the message used in the actual train network.

ⅲ ). The attack uses ARP spoofing to process the sniffer and transmit the incorrect

packet to the OATP.

10

Page 21: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

ⅳ ). An incorrect packet here means that the MA (Movement Authority) and MRSP

(Most Restrictive Speed Profile) have been manipulated.

The ARP spoofing attack is proceeds between WATP and OATP as shown in the Figure

4.1, and the information exchanged between the WATP and OATP is shown in Figure 4.2.

11

Page 22: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

ATP and EIE have the right to reject a signal in ATS if there is a problem. In other words,

ATP and EIE have more authority than ATS. Therefore, the monitoring function is the most

important in ATS, and when ATP is attacked, ATS can send the wrong control signal, which

can cause significant problems.

As ATP and EIE have higher priority than ATS, there is no way to deal with an attack if

they are attacked. Thus, attacks towards ATP are more fatal than toward ATS.

The attack proceeds with the communication between WATP and OATP. In other words, it

attacks the OATP using a message related to the train speed limit and movement distance.

This message related to train speed limit and movement distance is called an ATP wayside

message. The ATP wayside message from WATP to OATP is a message of WATP according

to the definition of train movement authority of the train control system. The information is

transmitted to OATP at 500ms cycle in WATP, and variables and packets are arranged in

Table 4.3 and Figure 4.3.

Table 4.3. ATP wayside message [16]Field number Variable/ Packet Contents

1 NID_MESSAGE MESSAGE ID

2 L_MESSAGE Total MESSAGE length

3 T_MASTERCLOCK Standard time

4 NID_LRTG LRTG (Last Reported Tag Group) ID

5 Q_REF Direction of the LRTG reference point with reference to LRTG

6 D_REF Distance of the LRTG reference point with reference to LRTC

7 NID_TRAIN Train ID

8 NID_WAYSIDE WATP Identity (Zone ID)

9 Q_EBRelease Emergency brake release command

10 Q_PSD Status for PSD Enable / Disable control

11 M_PSDSTATUS PSD Opening / Closing status

12 Q_DS Current station gate permission direction

13 Packet 21 Limit of movement protection

14 Packet 22 MRSP (Most Restrictive Speed Profile)

12

Page 23: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

15 Packet 23 Gradient profile

16 Packet 24 TAG linking information

17 Packet 25 Interlocking override

18 Packet 26 Train traffic direction reversal

19 Packet 27 Emergency brake set / reset

20 Packet 28 Cap change command information received from ATS

In the ATP wayside message, the attack proceeds by changing the data of packet 21 related

to the train movement distance and packet 22 related to the speed limit.

Packet 21 is information on the movement authority which is the point where the safety is

secured when the train operates, and the components are as given in Table 4.4 .

Table 4.4. Packet 21 limit of movement protection [16]Variable Length (Bit) Contents

NID_PACKET 8 Packet ID

Q_DIR 2 Vaild direction of transmitted data

L_PACKET 13 Packet length

Q_SCALE 2 Magnification value for distance value

D_LOM 15 Distance from LRTG tag 0 to the movement authority

13

Page 24: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

Packet 22 is MRSP information calculated on the ground and transmitted onboard, which

is generated considering the train line condition, etc. of the line up to the authority to move

the train, and the components are as given in Table 4.5 below.

Table 4.5. Packet 22 Most Restrictive Speed Profile (MRSP) [16]Variable Length (Bit) Contents

NID_PACKET 8 Packet ID

Q_DIR 2 Vaild direction of transmitted data

L_PACKET 13 Packet length

Q_SCALE 2 Magnification value for distance value

D_STATIC 15 Accumulated distance from LRTG tag 0 to the MRSP inflection point

V_STATIC 10 Speed to the MRSP inflection point

N_ITER 6 Number of iterations of the dataset

D_STATIC(K) 15 Accumulated distance from LRTG tag 0 to the MRSP inflection point k

V_STATIC(K) 10 Speed to the MRSP inflection point k

MRSP is created using the packets described above. MRSP is the most restrictive speed

limit that a train must obey in a given trajectory and must be recalculated if any part of the

component changes. That is, the speed of each section constituted by the train line linear

information is selected based on the following equation (1) [12].

V_MRSP = MIN(V_max, V_fix, V_temp) (1)

The factors used to compute equation (1) are V_max, which is the maximum train speed

defined by the interval, V_fix, which is the fixed speed defined by the interval, and the

temporary speed limit V_temp.

It now reflects the train length at the derived speed limit. In the case of the deceleration

section, since the front of the train already enters the deceleration section, the influence of

14

Page 25: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

the train length should be considered only in the acceleration section, not in the deceleration

section or the constant speed section. Therefore, the final MRSP considering the train

length is generated by the following algorithm.

Let length of Section #X, Length(X) then:

If V_MRSP of Section #X ≥ V_MRSP of Section #(X-1)

Length(X) = Length(X) + TL;

V_MRSP of Section #X = V_MEPT of Section #(X-1)

Else if V_MRSP of Section #X < V_MRSP of Section #(X-1)

V_MRSP of Section #X = V_MRSP of Section #X

Algorithm 1. MRSP creation [12]

As a result, in the current acceleration period, the limit speed of the section added by the

train length in the current section has the value of the previous section speed, and does not

change in the deceleration or the constant speed section. The overall calculation process

proceeds as shown Figure 4.4.

(a) Initial stage

(b) Speed limit by section

15

Page 26: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

(c) Extend speed limit as train length (TL)

(d) Final MRSP

Figure 4.4. MRSP calculation process

Once the calculated MRSP is transmitted to the train, it will create the dynamic speed

profile (DSP) needed to control train. There are various methods to calculate the DSP [13.

14]. In this paper, the DSP is generated by calculating the equivalent velocity section and

the constant velocity section using the current positiond0, current time t 0, current velocity

V 0 of the given V target, and target velocity received from MRSP. Equation (2) and (3) below

are used to perform the calculation.

16

Page 27: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

Equation (2) is for obtaining the equivalent velocity section and the constant velocity

section. In this case, the first equation is obtained by using the current speed and the next

target speed to obtain a constant speed increasing section. The second equation is for

obtaining the constant velocity section, and the last equation is for obtaining the constant

deceleration section using the two target velocities

Equation (3) is for obtaining the distance corresponding to the equivalent velocity section

and the constant velocity section. In this case, the first equation obtains the distance of the

section where the velocity increases constantly, and this is done by using the current

velocity and the values obtained from the first equation of equation (2). The second

equation obtains the distance of the constant velocity section and this is done by using the

maximum movement distance and the remaining movement distance. The last equation

obtains the distance of the section where the speed decreases constantly, and this is done by

using the target velocity and the values obtained from the last equation of equation (2).

The overall process of obtaining the DSP is shown in Figure 4.5. If the MRSP is changed

by an attacker, the DSP will be changed as shown in Figure 4.6.

17

Page 28: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

(a) Received MSRP

(b) DSP for the first section

18

Page 29: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

(c) Final DSP

Figure 4.5. DSP calculation process

(a) Changed MRSP by attacker

19

Page 30: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

(b) Changed DSP

Figure 4.6. DSP changed after attack

As can be seen from Figure 4.5 and Figure 4.6 above, if the maximum limit speed and the

movement distance of the train are changed by an attack, problems such as a train collision

may occur, thus threatening the safety of the train operation. In other words, if the wrong

maximum movement distance and the maximum movement speed are transmitted to the

train, an incorrect speed profile will be created, which will cause problems in controlling

the train. The proposed cyber attack is performed by connecting to the wireless AP as

shown in Figure 4.7.

20

Page 31: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

Figure 4.7. Attack scenario

Ⅴ. EXPERIMENT RESULT

In this section, the damage caused by the cyber attack based on security vulnerability in

KRTCS analyzed in the previous session is confirmed through experiments. In particular, it

is shown through experiments that a collision between trains occurs by changing the

maximum movement distance data.

5.1 Testbed environment

In this experiment, we use a KRTCS-based simulator, SDN that manages the network,

21

Page 32: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

Raspberry Pi 3, which acts as switch and AP, and Ettercap tool, which makes an ARP

spoofing attack. The results are confirmed in the testbed constructed with the above-

mentioned device and program. [17, 18]

The KRTCS simulator used in the experiment is composed of ATS in charge of train

monitoring, WATP, which performs functions such as train position detection, safety

interval setting between trains, and train speed limitation, OATP responsible for

determining and controlling the train position and speed, and an EIE that performs route

control and interlocking functions.. The simulator is constructed as shown in Figure 5.1.

Figure 5.1. KRTCS simulator

(a) ATS screen

22

Page 33: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

(b) OATP screen

Figure 5.2. Simulator function screen

In Figure 5.2 (a), the ATS screen shows the current track information as well as the

location and status information of the train in real time. (b) The OATP screen shows that

the current speed of the train, receiving data and real-time control are displayed. The

KRTCS simulator provides almost the same function as real system. The simulator is also

based on the actual routes used in the Philippines, as shown in Figure 5.3 below. That is,

the simulator used in the experiment is similar to the actual environment.

23

Page 34: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

Figure 5.3. Philippine railway route

In the network environment, Openvswitch installed in Raspberry Pi 3 to support Openflow

1.3 version is used for four switches, and the ONOS SDN controller is used as the network

controller [19,20]. Since the KRTCS network is a mixed environment of wired and wireless

networks, we consider that one switch operates as a wireless AP. The built environment is

shown in Figure 5.4. and Figure 5.5.

24

Page 35: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

Figure 5.4. Network environment

Figure 5.5. SDN controller screen

The Ettercap used in the paper is s suitable tool for a man in the middle attack. Since this

tool has various functions such as sniffing in communication and filtering of specific data,

an attack is implemented using cyber attack based on C language, and this tool. The

following Figure 5.6 shows the tool used.

Figure 5.6. Ettercap

25

Page 36: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

5.2 Experiment results

The attack experiment conducted using the test bed described above is based on the

following situation and as shown in Figure 5.7.

ⅰ ). There are two trains on railway line.

). ⅱ The first train stops at the station and the next train is travelling toward the station.

In the above situation, as shown in Figure 4.7, the attacker connects a wireless connection

to send the wrong data by sniffing the existing data through ARP spoofing. The attack is to

transmit the changed maximum movement distance data to cause a collision. MRSP and

DSP are changed as shown in Figure 5.8 and Figure 5.9.

Fig. 5.7. Experiment situation

26

Page 37: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

(a) The original MRSP

(b) The changed MRSP

Figure 5.8. Change in MRSP

(a) The original DSP

27

Page 38: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

(b) The changed DSP

Figure 5.9. Change in DSP

The biggest problem that can be seen in Figure 5.8 and Figure 5.9 is that the maximum

travel distance is different, and thus the train will continue to run when it should stop.

Moreover, Figure 5.10 shows that the data received from OATP and ATS will change as an

attack occurs. That is, as the existing data is intercepted and the changed data is received,

the maximum movement distance data in the ATS and the maximum movement distance in

the OATP are changed and a collision occurs.

28

Page 39: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

(a) OATP received message

(b) ATS MA and OATP MA

Figure 5.10 Data change in ATS and OATP

From these experimental results, we can confirm that KRTCS network security is

vulnerable to a proposed cyber attack. In addition, it is expected that various attacks will be

possible as well as attacks using this problem. It is hence necessary to take measures against

these vulnerabilities

Ⅵ. CONCLUSION

We confirmed the possibility of cyber attack based on the vulnerability in the network

security of the CBTC through experiments. The main idea of the proposed attack was to use

the vulnerability to distinguish the data with only the SEQ and CRC of the data without any

special security mechanism for data validation in the train network. We experimented with

the proposed cyber attack on the KRTCS testbed and found that the attack was effective and

damage occurred.

Also, the attack is based on a message used in the actual railway network, which is

29

Page 40: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

different from the existing attacks and is expected to cause great damage in a real

environment. These results have shown that countermeasures against this problem are

necessary.

REFERENCES

[1] K.-J. Park, R. Zheng, and X. Liu, “Cyber-physical systems: Milestones and research challenges,”

Computer Communications, vol. 36, no. 1, pp. 1–7, Dec. 2012.

[2] K.-J. Park, J. Kim, H. Lim, and Y. Eun, “Robust path diversity for network quality of service in cyber-

physical systems,” IEEE Transactions on Industrial Information, vol. 10, pp. 2204-2215, 2014.

[3] Soderi, S., Hamalainen, M., and Iinatti, J. "Cybersecurity considerations for Communication Based

Train Control.", SNOW 2016, Jan. 2016.

[4] Moreno, Juan, et al. "A survey on future railway radio communications services: challenges and

opportunities." IEEE Communications Magazine, vol. 53. Issue. 10, pp. 62-68, 2015.

30

Page 41: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

[5] Lopez, I., and Aguado, M. “Cyber security analysis of the european train control system”. IEEE

Communications Magazine, vol. 53. Issue. 10, pp.110-116, 2015.

[6] Hartong, M., Goel, R., and Wijesekera, D. “Communications security concerns in communications based

train control”. WIT Transactions on The Built Environment, vol. 88, pp. 10, 2006.

[7] Chen, B., et al. "Security analysis of urban railway systems: the need for a cyber-physical

perspective." International Conference on Computer Safety, Reliability, and Security. Springer, Cham, vol

9338, pp. 277-290, 2014.

[8] Melaragno, A., et al. (2016, August). “Rail radio intrusion detection system (RRIDS) for communication

based train control (CBTC)”. In Intelligent Rail Transportation (ICIRT), 2016 IEEE International Conference

on, pp. 39-48. 2016.

[9] Andrysiak, T., Saganowski, Ł., and Mazurczyk, W. “Network anomaly detection for railway critical

infrastructure based on autoregressive fractional integrated moving average”. EURASIP Journal on Wireless

Communications and Networking, vol. 1, 2016

[10] Pascoe, R. D.,and Eichorn, T. N. (2009). “What is communication-based train control ?”. IEEE Vehicular

Technology Magazine, vol. 4, Issue. 4, Dec. 2009

[11] Y.-S. Kang, “A study on interoperability and applicability of the Korean Radio based Train Control

System(KRTCS)”, The Transactions of the Korean Institute of Electrical Engineers , vol.65, No.6, pp.

1095~1102, 2016.

[12] Y.-K.Yonn, et al. “Development of ATP Train Separation Control Simulator for Radio-based Train

Control System”, JOURNAL OF THE KOREAN SOCIETY FOR RAILWAY, vol. 15, No. 1, pp. 29-36, Feb

2012.

[13] S. Oh, K. Kim, M. Kim, “Preprocessing-based speed profile calculation algorithm for radio-based train

control”, Journal of the Korea Academia-Industrial cooperation Society, vol. 16, No. 9, pp. 6274-6281,2015.

[14] M. Kim, J. Kim, C.-H. Park, “A Study on the Real-time Optimization Technique for a Train Velocity

Profile” , Journal of the Korea Academia-Industrial cooperation Society, vol. 17, No. 8, pp. 344-351, 2016.

[15] Y.-U. Sung, J.-S. Beak, G. Kim, “Analysis of network attack scenarios for establishing a train control

network defense system.” The Korean Institute of Communications and Information Sciences ,vol. 2015, no.

06, pp 957-958, 2015.

31

Page 42: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

[16] ‘Korean Radio based Train Control System for urban rapid transit’, KRS SG 0069, 2015

[17] S. Sezer et al., “Are we ready for SDN? Implementation challenges for software-defined networks,”

IEEE communication Magazine, vol. 51, issue 7, pp.36-42, July 2013.

[18] Ettercap website, https://ettercap.github.io/ettercap/

[19] ONOS website, https://wiki.onosproject.org.

[20] OpenvSwitch website, openvswitch.org

[21] Hartong, M., Goel, R., and Wijesekera, D. “Security and the US rail infrastructure”. International journal

of critical infrastructure protection, vol. 1, pp. 15-28. 2008

[22] LIM, H. W., et al. “Data Integrity Threats and Countermeasures in Railway Spot Transmission Systems”

arXiv preprint arXiv:1709.05935, 2017.

[23] Wu, Y., et al. "Secure Subway Train-to-Train Communications via GSM-R Communication system”.

IEEE 83rd Vehicular Technology Conference (VTC Spring), pp. 1-5, May 2016.

요 약 문

무선통신 기반 열차제어에서의 사이버 공격에 대한 취약점 분석

최근 열차 제어 시스템이 무선통신 기반 열차 제어 시스템으로 바뀌게 되면서 안전에 대한

위험성이 증가 하고 있다. 그 중의 하나가 무선통신을 사용하게 되면서 발생하게 되는 것으로 열차

네트워크의 무선 통신을 이용하여 공격자가 네트워크에 접속을 하여 열차에서 제어 하는데 필요한

데이터를 공격하여 문제를 발생시키는 것에 대한 대책 연구가 진행이 되고 있다.

본 논문에서는 무선통신 기반 열차 제어 시스템의 종류 중 하나인 한국형 무선통신 기반

32

Page 43: csi.dgist.ac.krcsi.dgist.ac.kr/uploads/Intranet/2018_Inhee Park_source.docx · Web viewIn addition, KRTCS's interoperability between ground and onboard facilities, which are the requirements

열차제어시스템을 모델로 연구를 진행을 하였다. 기존의 연구에서 제시한 사이버 공격은 열차

시스템뿐만 아니라 다른 시스템에서 사용이 되는 것으로 열차의 특성을 제대로 고려하지 못한

공격이다. 그래서 제안한 공격은 열차 네트워크에서 데이터를 판별을 하는데 있어서 특별한

보안체계없이 데이터의 SEQ 와 CRC 만으로 판단을 한다는 열차 네트워크만에서 발생하는 취약점을

이용하는 하였다.

이러한 사이버 공격을 실제 환경과 유사하게 만들어진 테스트베드에서 실험을 통하여 공격이

유효하고 피해가 발생을 하는 것을 확인 하였다. 또한 제시한 공격은 실제 철도 네트워크에서 사용이

되는 메시지를 기반으로 한 것으로 기존의 제시한 공격들과 차별성이 있으며 실제 환경에서도 큰

피해를 줄 것으로 판단되며 이러한 결과를 통해서 이 문제에 대한 대책이 필요하다는 것을 보여

주었다.

핵심어: CBTC, KRTCS, Cyber attack, Vulnerability analysis

33