Flexible multicast authentication for time-triggered embedded control network applications
- 1 June 2009
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 165-174
- https://doi.org/10.1109/dsn.2009.5270342
Abstract
Security for wired embedded networks is becoming a greater concern as connectivity to the outside world increases. Protocols used in these networks omit support for authenticating messages to prevent masquerade and replay attacks. The unique constraints of embedded control systems make incorporating existing multicast authentication schemes impractical. Our approach provides multicast authentication for time-triggered applications by validating truncated message authentication codes (MACs) across multiple packets. We extend this approach to tolerate occasional invalid MACs, analyze our approach through simulated attacks, and give an upper bound on the probability of successful attack. This approach allows a tradeoff among per-packet authentication cost, application level latency, tolerance to invalid MACs, and probability of induced failure, while satisfying typical embedded system constraints.Keywords
This publication has 17 references indexed in Scilit:
- Flexible multicast authentication for time-triggered embedded control network applicationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- Future Perspectives: The Car and Its IP-Address – A Potential Safety and Security Risk AssessmentLecture Notes in Computer Science, 2007
- Efficient secure aggregation in VANETsPublished by Association for Computing Machinery (ACM) ,2006
- Efficient multicast packet authentication using signature amortizationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- TinySecPublished by Association for Computing Machinery (ACM) ,2004
- TTP - A time-triggered protocol for fault-tolerant real-time systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Graph-based authentication of digital streamsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Efficient authentication and signing of multicast streams over lossy channelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- SPINS: Security Protocols for Sensor NetworksWireless Networks, 2002
- The BiBa one-time signature and broadcast authentication protocolPublished by Association for Computing Machinery (ACM) ,2001