%0 Conference Proceedings %T Multi-channel Security Through Data Fragmentation %+ Air Force Institute of Technology %A Hayden, Micah %A Graham, Scott %A Betances, Addison %A Mills, Robert %Z Part 3: Telecommunications Systems Security %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 14th International Conference on Critical Infrastructure Protection (ICCIP) %C Arlington, VA, United States %Y Jason Staggs %Y Sujeet Shenoi %I Springer International Publishing %3 Critical Infrastructure Protection XIV %V AICT-596 %P 137-155 %8 2020-03-16 %D 2020 %R 10.1007/978-3-030-62840-6_7 %K Multi-channel communications %K security %K data fragmentation %Z Computer Science [cs]Conference papers %X This chapter presents a novel security framework developed for a multi-channel communications architecture that achieves security by distributing messages and their authentication codes across multiple channels at the bit level. This method of transmission provides protection from confidentiality and integrity attacks without relying on encryption. The two communicating parties utilize existing key exchange mechanisms to pass initialization information. The framework operates by assigning to each message bit a fragment identifier using a hardware-based stream cipher as a pseudorandom number generator, and transmitting specific message fragments across each channel. This prevents the entirety of a message from being transmitted over a single channel and spreads the authentication across the available channels, enabling the sender and receiver to identify a compromised channel even in the presence of a sophisticated man-in-the-middle attack where the adversary forces message acceptance at the destination, perhaps by altering the message error detecting code. Under some conditions, the receiver can recover the original message without retransmission. The holistic framework is attractive for critical infrastructure communications because it provides availability while defending against confidentiality and integrity attacks. %G English %Z TC 11 %Z WG 11.10 %L hal-03794644 %U https://inria.hal.science/hal-03794644 %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-ICCIP %~ IFIP-WG11-10 %~ IFIP-AICT-596