Optimizing Proof of Aliveness in Cyber-Physical Systems

被引:0
作者
Yang, Zheng [1 ]
Jin, Chenglu [2 ]
Cao, Xuelian [1 ]
van Dijk, Marten [2 ,3 ]
Zhou, Jianying [4 ]
机构
[1] Southwest Univ, Chongqing 400715, Peoples R China
[2] Ctr Wiskunde & Informat, NL-1098 XG Amsterdam, Netherlands
[3] Univ Connecticut, Storrs, CT 06269 USA
[4] Singapore Univ Technol & Design, iTrust, Singapore 487372, Singapore
基金
新加坡国家研究基金会;
关键词
Authentication; Protocols; Passwords; Tail; Cryptography; Electronic mail; Generators; auto replenishment; CPS security; cyber-physical systems; one-time passwords; one-way functions; proof of aliveness; SECURITY;
D O I
10.1109/TDSC.2023.3335188
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
At ACSAC 2019, we introduced a new cryptographic primitive called proof of aliveness (PoA), allowing us to remotely and automatically track the running status (aliveness) of devices in the fields in cyber-physical systems. We proposed to use a one-way function (OWF) chain structure to build an efficient proof of aliveness, such that the prover sends every node on the OWF chain in a reverse order periodically. However, the finite nodes in OWF chains limited its practicality. We enhance our first PoA construction by linking multiple OWF chains together using a pseudo-random generator chain in our second PoA scheme. This enhancement allows us to integrate one-time signature (OTS) schemes into the structure of the second construction to realize the auto-replenishment of the aliveness proofs for continuous use without interruption for reinitialization. In this work, our primary motivation is to further improve our secondary PoA and auto-replenishment schemes. Instead of storing the tail nodes of multiple OWF chains on the verifier side, we use a Bloom Filter to compress them, reducing the storage cost by 4.7x. Moreover, the OTS-based auto-replenishment solution cannot be applied to our first scheme, and it is not so efficient despite its standard model security. To overcome these limitations, we design a new auto-replenishment scheme from a hash-based commitment under the random oracle model in this work, which is much faster and can be used by both PoA schemes. Considering the implementation on a storage/memory-constrained device, we particularly study the strategies for efficiently generating proofs.
引用
收藏
页码:3610 / 3628
页数:19
相关论文
共 62 条
[1]   Scanning the Cycle: Timing-based Authentication on PLCs [J].
Ahmed, Chuadhry Mujeeb ;
Ochoa, Martin ;
Zhou, Jianying ;
Mathur, Aditya .
ASIA CCS'21: PROCEEDINGS OF THE 2021 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, :886-900
[2]   Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS [J].
Ahmed, Chuadhry Mujeeb ;
Zhou, Jianying ;
Mathur, Aditya P. .
34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, :566-581
[3]  
[Anonymous], 2017, Attackers Deploy New ICS Attack Framework "TRITON"and Cause Operational Disruption to Critical Infrastructure
[4]  
[Anonymous], 2018, Miracl cryptographic library
[5]  
[Anonymous], 2018, Trisis has the security world spooked, stumped and searching for answers
[6]  
[Anonymous], 2007, Man pleads guilty in caliso computer attack
[7]  
[Anonymous], 2004, IACR Cryptol. ePrint Arch.
[8]  
Barker E. B., 2007, Tech. Rep. 800 90A Rev 1
[9]  
Bellare M, 2006, LECT NOTES COMPUT SC, V4004, P409
[10]   SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS [J].
BLOOM, BH .
COMMUNICATIONS OF THE ACM, 1970, 13 (07) :422-&