Integrity Assurance in Resource-Bounded Systems through Stochastic Message Authentication
Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos

Citation
Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos. "Integrity Assurance in Resource-Bounded Systems through Stochastic Message Authentication". 2nd Annual Symposium and Bootcamp on the Science of Security (HotSoS), April, 2015.

Abstract
Assuring communication integrity is a central problem in security. However, overhead costs associated with cryptographic primitives used towards this end introduce significant practical implementation challenges for resource-bounded systems, such as cyber-physical systems. For example , many control systems are built on legacy components which are computationally limited but have strict timing constraints. If integrity protection is a binary decision, it may simply be infeasible to introduce into such systems; without it, however, an adversary can forge malicious messages , which can cause significant physical or financial harm. We propose a formal game-theoretic framework for optimal stochastic message authentication, providing provable integrity guarantees for resource-bounded systems based on an existing MAC scheme. We use our framework to investigate attacker deterrence, as well as optimal design of stochastic message authentication schemes when deterrence is impossible. Finally, we provide experimental results on the computational performance of our framework in practice.

Electronic downloads


Internal. This publication has been marked by the author for FORCES-only distribution, so electronic downloads are not available without logging in.
Citation formats  
  • HTML
    Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos. <a
    href="http://www.cps-forces.org/pubs/123.html"
    >Integrity Assurance in Resource-Bounded Systems through
    Stochastic Message Authentication</a>, 2nd Annual
    Symposium and Bootcamp on the Science of Security (HotSoS),
    April, 2015.
  • Plain text
    Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos.
    "Integrity Assurance in Resource-Bounded Systems
    through Stochastic Message Authentication". 2nd Annual
    Symposium and Bootcamp on the Science of Security (HotSoS),
    April, 2015.
  • BibTeX
    @inproceedings{LaszkaVorobeychikKoutsoukos15_IntegrityAssuranceInResourceBoundedSystemsThroughStochastic,
        author = {Aron Laszka and Yevgeniy Vorobeychik and Xenofon
                  Koutsoukos},
        title = {Integrity Assurance in Resource-Bounded Systems
                  through Stochastic Message Authentication},
        booktitle = {2nd Annual Symposium and Bootcamp on the Science
                  of Security (HotSoS)},
        month = {April},
        year = {2015},
        abstract = {Assuring communication integrity is a central
                  problem in security. However, overhead costs
                  associated with cryptographic primitives used
                  towards this end introduce significant practical
                  implementation challenges for resource-bounded
                  systems, such as cyber-physical systems. For
                  example , many control systems are built on legacy
                  components which are computationally limited but
                  have strict timing constraints. If integrity
                  protection is a binary decision, it may simply be
                  infeasible to introduce into such systems; without
                  it, however, an adversary can forge malicious
                  messages , which can cause significant physical or
                  financial harm. We propose a formal game-theoretic
                  framework for optimal stochastic message
                  authentication, providing provable integrity
                  guarantees for resource-bounded systems based on
                  an existing MAC scheme. We use our framework to
                  investigate attacker deterrence, as well as
                  optimal design of stochastic message
                  authentication schemes when deterrence is
                  impossible. Finally, we provide experimental
                  results on the computational performance of our
                  framework in practice.},
        URL = {http://cps-forces.org/pubs/123.html}
    }
    

Posted by Aron Laszka on 15 Mar 2016.
For additional information, see the Publications FAQ or contact webmaster at cps-forces org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.