Resilient End-to-End Message Protection for Large-scale Cyber-Physical System Communications

被引:0
|
作者
Kim, Young-Jin [1 ]
Kolesnikov, Vladimir [1 ]
Thottan, Marina [1 ]
机构
[1] Alcatel Lucent, Bell Labs, Murray Hill, NJ 07094 USA
来源
2012 IEEE THIRD INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM) | 2012年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Essential features of cyber-physical systems such as Smart Grid are real-time analysis of high-resolution data, which a massive number of embedded devices periodically generate, and the effective and timely response to specific analytic results obtained from the data. Therefore, mission-critical data and control messages exchanged among machines in the cyber-physical systems must be strongly protected to prevent the infrastructures from becoming vulnerable. Specifically, the protection mechanism used must be scalable, secured from an end-to-end perspective, and key exposure resilient. Moreover, there may be privacy protection required among devices that generate data, e. g., smart metering. In this paper, we show that, for large-scale cyber-physical system communications, most well-known point-to-point security schemes such as IPsec [I], TLS [2], or SRTP [3] cannot meet the scalability, extensibility, and thinness requirements. By contrast conventional group security schemes which address the limitations of the point-to-point schemes have other limitations on aspects of privacy, key exposure resiliency, and key refreshment. To address the security requirements for cyber-physical systems, we design a resilient end-to-end message protection framework, REMP, exploiting the notion of the long-term key that is given on per node basis. This long term key is assigned during the node authentication phase and is subsequently used to derive encryption keys from a random number per-message sent. Compared with conventional schemes, REMP improves privacy, message authentication, and key exposure, and without compromising scalability and end-to-end security. The tradeoff is a slight increase in computation time for message decryption and message authentication.
引用
收藏
页码:193 / 198
页数:6
相关论文
共 50 条
  • [31] Evaluating Secrecy Outage of Physical Layer Security in Large-Scale MIMO Wireless Communications for Cyber-Physical Systems
    Rawat, Danda B.
    White, Taylor
    Parwez, Md Salik
    Bajracharya, Chandra
    Song, Min
    IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (06): : 1987 - 1993
  • [32] CPSSim: Simulation Framework for Large-Scale Cyber-Physical Systems
    Chu, Chia-Tse
    Shih, Chi-Sheng
    2013 IEEE 1ST INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS, NETWORKS, AND APPLICATIONS (CPSNA), 2013, : 44 - 51
  • [33] Cyber-Physical Battlefield Platform for Large-Scale Cybersecurity Exercises
    Kim, Joonsoo
    Kim, Kyeongho
    Jang, Moonsu
    2019 11TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON): SILENT BATTLE, 2019, : 439 - 457
  • [34] A large-scale, passive analysis of end-to-end TCP performance over GPRS
    Benko, P
    Malicsko, G
    Veres, A
    IEEE INFOCOM 2004: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, : 1882 - 1892
  • [35] End-to-end Learning of Driving Models from Large-scale Video Datasets
    Xu, Huazhe
    Gao, Yang
    Yu, Fisher
    Darrell, Trevor
    30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017), 2017, : 3530 - 3538
  • [36] Vigil: Effective End-to-end Monitoring for Large-scale Recommender Systems at Glance
    Saxena, Priyansh
    Manisha, R.
    PROCEEDINGS OF THE 32ND ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2023, 2023, : 5249 - 5250
  • [37] FusedNet: End-to-End Mobile Robot Relocalization in Dynamic Large-Scale Scene
    Chen, Fang-xing
    Tang, Yifan
    Tai, Cong
    Liu, Xue-ping
    Wu, Xiang
    Zhang, Tao
    Zeng, Long
    IEEE ROBOTICS AND AUTOMATION LETTERS, 2024, 9 (05) : 4099 - 4105
  • [38] End-to-End Large-Scale Image Retrieval Network with Convolution and Vision Transformers
    Zhang, Qing
    Bao, Feilong
    Su, Xiangdong
    Wang, Weihua
    Gao, Guanglai
    ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING - ICANN 2022, PT IV, 2022, 13532 : 620 - 632
  • [39] Towards Optimizing Large-Scale Data Transfers with End-to-End Integrity Verification
    Liu, Si
    Jung, Eun-Sung
    Kettimuthu, Rajkumar
    Sun, Xian-He
    Papka, Michael
    2016 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2016, : 3002 - 3007
  • [40] Resistance Strategy of Power Cyber-Physical System under Large-Scale and Complex Faults
    Wang, Bo
    Zhang, Zhixiong
    Wang, Jingyi
    Guo, Chuangxin
    Hao, Jie
    2022 6TH INTERNATIONAL CONFERENCE ON GREEN ENERGY AND APPLICATIONS (ICGEA 2022), 2022, : 254 - 258