Cargando…

Computation and Communication Evaluation of an Authentication Mechanism for Time-Triggered Networked Control Systems

In modern networked control applications, confidentiality and integrity are important features to address in order to prevent against attacks. Moreover, network control systems are a fundamental part of the communication components of current cyber-physical systems (e.g., automotive communications)....

Descripción completa

Detalles Bibliográficos
Autores principales: Martins, Goncalo, Moondra, Arul, Dubey, Abhishek, Bhattacharjee, Anirban, Koutsoukos, Xenofon D.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2016
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5017332/
https://www.ncbi.nlm.nih.gov/pubmed/27463718
http://dx.doi.org/10.3390/s16081166
_version_ 1782452723657998336
author Martins, Goncalo
Moondra, Arul
Dubey, Abhishek
Bhattacharjee, Anirban
Koutsoukos, Xenofon D.
author_facet Martins, Goncalo
Moondra, Arul
Dubey, Abhishek
Bhattacharjee, Anirban
Koutsoukos, Xenofon D.
author_sort Martins, Goncalo
collection PubMed
description In modern networked control applications, confidentiality and integrity are important features to address in order to prevent against attacks. Moreover, network control systems are a fundamental part of the communication components of current cyber-physical systems (e.g., automotive communications). Many networked control systems employ Time-Triggered (TT) architectures that provide mechanisms enabling the exchange of precise and synchronous messages. TT systems have computation and communication constraints, and with the aim to enable secure communications in the network, it is important to evaluate the computational and communication overhead of implementing secure communication mechanisms. This paper presents a comprehensive analysis and evaluation of the effects of adding a Hash-based Message Authentication (HMAC) to TT networked control systems. The contributions of the paper include (1) the analysis and experimental validation of the communication overhead, as well as a scalability analysis that utilizes the experimental result for both wired and wireless platforms and (2) an experimental evaluation of the computational overhead of HMAC based on a kernel-level Linux implementation. An automotive application is used as an example, and the results show that it is feasible to implement a secure communication mechanism without interfering with the existing automotive controller execution times. The methods and results of the paper can be used for evaluating the performance impact of security mechanisms and, thus, for the design of secure wired and wireless TT networked control systems.
format Online
Article
Text
id pubmed-5017332
institution National Center for Biotechnology Information
language English
publishDate 2016
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-50173322016-09-22 Computation and Communication Evaluation of an Authentication Mechanism for Time-Triggered Networked Control Systems Martins, Goncalo Moondra, Arul Dubey, Abhishek Bhattacharjee, Anirban Koutsoukos, Xenofon D. Sensors (Basel) Article In modern networked control applications, confidentiality and integrity are important features to address in order to prevent against attacks. Moreover, network control systems are a fundamental part of the communication components of current cyber-physical systems (e.g., automotive communications). Many networked control systems employ Time-Triggered (TT) architectures that provide mechanisms enabling the exchange of precise and synchronous messages. TT systems have computation and communication constraints, and with the aim to enable secure communications in the network, it is important to evaluate the computational and communication overhead of implementing secure communication mechanisms. This paper presents a comprehensive analysis and evaluation of the effects of adding a Hash-based Message Authentication (HMAC) to TT networked control systems. The contributions of the paper include (1) the analysis and experimental validation of the communication overhead, as well as a scalability analysis that utilizes the experimental result for both wired and wireless platforms and (2) an experimental evaluation of the computational overhead of HMAC based on a kernel-level Linux implementation. An automotive application is used as an example, and the results show that it is feasible to implement a secure communication mechanism without interfering with the existing automotive controller execution times. The methods and results of the paper can be used for evaluating the performance impact of security mechanisms and, thus, for the design of secure wired and wireless TT networked control systems. MDPI 2016-07-25 /pmc/articles/PMC5017332/ /pubmed/27463718 http://dx.doi.org/10.3390/s16081166 Text en © 2016 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC-BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Martins, Goncalo
Moondra, Arul
Dubey, Abhishek
Bhattacharjee, Anirban
Koutsoukos, Xenofon D.
Computation and Communication Evaluation of an Authentication Mechanism for Time-Triggered Networked Control Systems
title Computation and Communication Evaluation of an Authentication Mechanism for Time-Triggered Networked Control Systems
title_full Computation and Communication Evaluation of an Authentication Mechanism for Time-Triggered Networked Control Systems
title_fullStr Computation and Communication Evaluation of an Authentication Mechanism for Time-Triggered Networked Control Systems
title_full_unstemmed Computation and Communication Evaluation of an Authentication Mechanism for Time-Triggered Networked Control Systems
title_short Computation and Communication Evaluation of an Authentication Mechanism for Time-Triggered Networked Control Systems
title_sort computation and communication evaluation of an authentication mechanism for time-triggered networked control systems
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5017332/
https://www.ncbi.nlm.nih.gov/pubmed/27463718
http://dx.doi.org/10.3390/s16081166
work_keys_str_mv AT martinsgoncalo computationandcommunicationevaluationofanauthenticationmechanismfortimetriggerednetworkedcontrolsystems
AT moondraarul computationandcommunicationevaluationofanauthenticationmechanismfortimetriggerednetworkedcontrolsystems
AT dubeyabhishek computationandcommunicationevaluationofanauthenticationmechanismfortimetriggerednetworkedcontrolsystems
AT bhattacharjeeanirban computationandcommunicationevaluationofanauthenticationmechanismfortimetriggerednetworkedcontrolsystems
AT koutsoukosxenofond computationandcommunicationevaluationofanauthenticationmechanismfortimetriggerednetworkedcontrolsystems