Computation and Communication Evaluation of an Authentication Mechanism for Time-Triggered Networked Control Systems
Goncalo Martins, Arul Moondra, Abhishek Dubey, Xenofon Koutsoukos

Citation
Goncalo Martins, Arul Moondra, Abhishek Dubey, Xenofon Koutsoukos. "Computation and Communication Evaluation of an Authentication Mechanism for Time-Triggered Networked Control Systems". Sensors, 16(8), 2016; (Special Issue on Real-Time and Cyber-Physical Systems).

Abstract
In modern networked control applications, confidentiality and integrity are important features to address in order to prevent against attacks. Moreover, network control systems are a fundamental part of the communication components of current cyber-physical systems (e.g., automotive communications). Many networked control systems employ Time-Triggered (TT) architectures that provide mechanisms enabling the exchange of precise and synchronous messages. TT systems have computation and communication constraints, and with the aim to enable secure communications in the network, it is important to evaluate the computational and communication overhead of implementing secure communication mechanisms. This paper presents a comprehensive analysis and evaluation of the effects of adding a Hash-based Message Authentication (HMAC) to TT networked control systems. The contributions of the paper include (1) the analysis and experimental validation of the communication overhead, as well as a scalability analysis that utilizes the experimental result for both wired and wireless platforms and (2) an experimental evaluation of the computational overhead of HMAC based on a kernel-level Linux implementation. An automotive application is used as an example, and the results show that it is feasible to implement a secure communication mechanism without interfering with the existing automotive controller execution times. The methods and results of the paper can be used for evaluating the performance impact of security mechanisms and, thus, for the design of secure wired and wireless TT networked control systems.

Electronic downloads

Citation formats  
  • HTML
    Goncalo Martins, Arul Moondra, Abhishek Dubey, Xenofon
    Koutsoukos. <a
    href="http://www.cps-forces.org/pubs/236.html"
    >Computation and Communication Evaluation of an
    Authentication Mechanism for Time-Triggered Networked
    Control Systems</a>, <i>Sensors</i>,
    16(8),  2016; (Special Issue on Real-Time and Cyber-Physical
    Systems).
  • Plain text
    Goncalo Martins, Arul Moondra, Abhishek Dubey, Xenofon
    Koutsoukos. "Computation and Communication Evaluation
    of an Authentication Mechanism for Time-Triggered Networked
    Control Systems". <i>Sensors</i>, 16(8), 
    2016; (Special Issue on Real-Time and Cyber-Physical
    Systems).
  • BibTeX
    @article{MartinsMoondraDubeyKoutsoukos16_ComputationCommunicationEvaluationOfAuthenticationMechanism,
        author = {Goncalo Martins and Arul Moondra and Abhishek
                  Dubey and Xenofon Koutsoukos},
        title = {Computation and Communication Evaluation of an
                  Authentication Mechanism for Time-Triggered
                  Networked Control Systems},
        journal = {Sensors},
        volume = {16},
        number = {8},
        year = {2016},
        note = {(Special Issue on Real-Time and Cyber-Physical
                  Systems)},
        abstract = {In modern networked control applications,
                  confidentiality and integrity are important
                  features to address in order to prevent against
                  attacks. Moreover, network control systems are a
                  fundamental part of the communication components
                  of current cyber-physical systems (e.g.,
                  automotive communications). Many networked control
                  systems employ Time-Triggered (TT) architectures
                  that provide mechanisms enabling the exchange of
                  precise and synchronous messages. TT systems have
                  computation and communication constraints, and
                  with the aim to enable secure communications in
                  the network, it is important to evaluate the
                  computational and communication overhead of
                  implementing secure communication mechanisms. This
                  paper presents a comprehensive analysis and
                  evaluation of the effects of adding a Hash-based
                  Message Authentication (HMAC) to TT networked
                  control systems. The contributions of the paper
                  include (1) the analysis and experimental
                  validation of the communication overhead, as well
                  as a scalability analysis that utilizes the
                  experimental result for both wired and wireless
                  platforms and (2) an experimental evaluation of
                  the computational overhead of HMAC based on a
                  kernel-level Linux implementation. An automotive
                  application is used as an example, and the results
                  show that it is feasible to implement a secure
                  communication mechanism without interfering with
                  the existing automotive controller execution
                  times. The methods and results of the paper can be
                  used for evaluating the performance impact of
                  security mechanisms and, thus, for the design of
                  secure wired and wireless TT networked control
                  systems.},
        URL = {http://cps-forces.org/pubs/236.html}
    }
    

Posted by Waseem Abbas on 2 Mar 2017.
Groups: forces
For additional information, see the Publications FAQ or contact webmaster at cps-forces org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.