Flexible Multicast Authentication for Time-Triggered Embedded Control Network Applications

被引:31
作者
Szilagyi, Christopher [1 ]
Koopman, Philip [1 ]
机构
[1] Carnegie Mellon Univ, ECE Dept, Pittsburgh, PA 15213 USA
来源
2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009) | 2009年
关键词
D O I
10.1109/DSN.2009.5270342
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security for wired embedded networks is becoming a greater concern as connectivity to the outside world increases. Protocols used in these networks omit support for authenticating messages to prevent masquerade and replay attacks. The unique constraints of embedded control systems make incorporating existing multicast authentication schemes impractical. Our approach provides multicast authentication for time-triggered applications by validating truncated message authentication codes (MACs) across multiple packets. We extend this approach to tolerate occasional invalid MACS, analyze our approach through simulated attacks, and give an upper bound on the probability of successful attack. This approach allows a tradeoff among per packet authentication cost, application level latency, tolerance to invalid MACs, and probability of induced failure, while satisfying typical embedded system constraints.
引用
收藏
页码:165 / 174
页数:10
相关论文
共 30 条
[1]  
[Anonymous], 2002, RSA CryptoBytes
[2]  
[Anonymous], 2004, P 2 INT C EMB NETW S, DOI DOI 10.1145/1031495.1031515
[3]   Evaluation of the adsorptive capacity of peanut hull pellets for heavy metals in solution [J].
Brown, P ;
Jefcoat, IA ;
Parrish, D ;
Gill, S ;
Graham, E .
ADVANCES IN ENVIRONMENTAL RESEARCH, 2000, 4 (01) :19-29
[4]   Multicast security: A taxonomy and some efficient constructions [J].
Canetti, R ;
Garay, J ;
Itkis, G ;
Micciancio, D ;
Naor, M ;
Pinkas, B .
IEEE INFOCOM '99 - THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS: THE FUTURE IS NOW, 1999, :708-716
[5]  
CHAVEZ M, 2005, CONIELECOMP 05, P166
[6]   Junior must pay: pricing the implicit put in privatizing Social Security [J].
Constantinides, George M. ;
Donaldson, John B. ;
Mehra, Rajnish .
ANNALS OF FINANCE, 2005, 1 (01) :1-34
[7]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[8]  
Even Shimon., 1989, P CRYPTO 9 ANN INT C, V435, P263
[9]  
*FREESC SEM, S12XD PROD SUMM
[10]  
GANERIWAL S, 2005, WISE 05, P97