IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2022
DOI: 10.1109/infocom48880.2022.9796767
|View full text |Cite
|
Sign up to set email alerts
|

Caching-based Multicast Message Authentication in Time-critical Industrial Control Systems

Abstract: Attacks against industrial control systems (ICSs) often exploit the insufficiency of authentication mechanisms. Verifying whether the received messages are intact and issued by legitimate sources can prevent malicious data/command injection by illegitimate or compromised devices. However, the key challenge is to introduce message authentication for various ICS communication models, including multicast or broadcast, with a messaging rate that can be as high as thousands of messages per second, within very strin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 31 publications
0
3
0
Order By: Relevance
“…IEC 62351 recommends different authentication and encryption algorithms to secure the channels between publisher and subscriber of GOOSE and SV messages [11]. For instance, references [12][13][14][15] provide IT-based solutions for securing GOOSE and SV messages. In [12,13], light weight message authentication code (MAC) algorithms are proposed to secure the GOOSE messages, whereas [14,15] introduce caching-based MAC and Less-online/More-offline MAC signatures with reduced computational complexities to secure GOOSE and SV messages.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…IEC 62351 recommends different authentication and encryption algorithms to secure the channels between publisher and subscriber of GOOSE and SV messages [11]. For instance, references [12][13][14][15] provide IT-based solutions for securing GOOSE and SV messages. In [12,13], light weight message authentication code (MAC) algorithms are proposed to secure the GOOSE messages, whereas [14,15] introduce caching-based MAC and Less-online/More-offline MAC signatures with reduced computational complexities to secure GOOSE and SV messages.…”
Section: Introductionmentioning
confidence: 99%
“…For instance, references [12][13][14][15] provide IT-based solutions for securing GOOSE and SV messages. In [12,13], light weight message authentication code (MAC) algorithms are proposed to secure the GOOSE messages, whereas [14,15] introduce caching-based MAC and Less-online/More-offline MAC signatures with reduced computational complexities to secure GOOSE and SV messages. These cyber security algorithms do not however deal with the case of an attack on the end device itself (i.e., when the end devise is compromised).…”
Section: Introductionmentioning
confidence: 99%
“…However, in 8,10 it was proved that the digital signatures result in high computational delays and hence not suitable for time critical GOOSE messages with stringent 3 ms timing requirements. Recently published IEC 62351-6 standard proposed light weight message authentication code (MAC) algorithms to secure the GOOSE messages [11][12][13] . Authors in 14 introduced cachingbased MAC and less-online/more-offline MAC signatures which further reduces computational delays.…”
mentioning
confidence: 99%