Computation and Communication Evaluation of an Authentication Mechanism for Time-Triggered Networked Control Systems

In modern networked control applications, confidentiality and integrity are important features to address in order to prevent against attacks. Moreover, network control systems are a fundamental part of the communication components of current cyber-physical systems (e.g., automotive communications)....

Full description

Bibliographic Details
Main Authors: Goncalo Martins, Arul Moondra, Abhishek Dubey, Anirban Bhattacharjee, Xenofon D. Koutsoukos
Format: Article
Language:English
Published: MDPI AG 2016-07-01
Series:Sensors
Subjects:
Online Access:http://www.mdpi.com/1424-8220/16/8/1166
id doaj-b93c1f8437f14013b8ecabcd8374b72e
record_format Article
spelling doaj-b93c1f8437f14013b8ecabcd8374b72e2020-11-24T21:11:29ZengMDPI AGSensors1424-82202016-07-01168116610.3390/s16081166s16081166Computation and Communication Evaluation of an Authentication Mechanism for Time-Triggered Networked Control SystemsGoncalo Martins0Arul Moondra1Abhishek Dubey2Anirban Bhattacharjee3Xenofon D. Koutsoukos4Department of Electrical and Computer Engineering, University of Denver, Denver, CO 80208, USAInstitute for Software Integrated Systems (ISIS), Department of Electrical Engineering and Computer Science, Vanderbilt University, Nashville, TN 37212, USAInstitute for Software Integrated Systems (ISIS), Department of Electrical Engineering and Computer Science, Vanderbilt University, Nashville, TN 37212, USAInstitute for Software Integrated Systems (ISIS), Department of Electrical Engineering and Computer Science, Vanderbilt University, Nashville, TN 37212, USAInstitute for Software Integrated Systems (ISIS), Department of Electrical Engineering and Computer Science, Vanderbilt University, Nashville, TN 37212, USAIn modern networked control applications, confidentiality and integrity are important features to address in order to prevent against attacks. Moreover, network control systems are a fundamental part of the communication components of current cyber-physical systems (e.g., automotive communications). Many networked control systems employ Time-Triggered (TT) architectures that provide mechanisms enabling the exchange of precise and synchronous messages. TT systems have computation and communication constraints, and with the aim to enable secure communications in the network, it is important to evaluate the computational and communication overhead of implementing secure communication mechanisms. This paper presents a comprehensive analysis and evaluation of the effects of adding a Hash-based Message Authentication (HMAC) to TT networked control systems. The contributions of the paper include (1) the analysis and experimental validation of the communication overhead, as well as a scalability analysis that utilizes the experimental result for both wired and wireless platforms and (2) an experimental evaluation of the computational overhead of HMAC based on a kernel-level Linux implementation. An automotive application is used as an example, and the results show that it is feasible to implement a secure communication mechanism without interfering with the existing automotive controller execution times. The methods and results of the paper can be used for evaluating the performance impact of security mechanisms and, thus, for the design of secure wired and wireless TT networked control systems.http://www.mdpi.com/1424-8220/16/8/1166time-trigger architectureswireless TTAsecure messagescyber-physical systemstiming and performance analysisHMAC
collection DOAJ
language English
format Article
sources DOAJ
author Goncalo Martins
Arul Moondra
Abhishek Dubey
Anirban Bhattacharjee
Xenofon D. Koutsoukos
spellingShingle Goncalo Martins
Arul Moondra
Abhishek Dubey
Anirban Bhattacharjee
Xenofon D. Koutsoukos
Computation and Communication Evaluation of an Authentication Mechanism for Time-Triggered Networked Control Systems
Sensors
time-trigger architectures
wireless TTA
secure messages
cyber-physical systems
timing and performance analysis
HMAC
author_facet Goncalo Martins
Arul Moondra
Abhishek Dubey
Anirban Bhattacharjee
Xenofon D. Koutsoukos
author_sort Goncalo Martins
title Computation and Communication Evaluation of an Authentication Mechanism for Time-Triggered Networked Control Systems
title_short Computation and Communication Evaluation of an Authentication Mechanism for Time-Triggered Networked Control Systems
title_full Computation and Communication Evaluation of an Authentication Mechanism for Time-Triggered Networked Control Systems
title_fullStr Computation and Communication Evaluation of an Authentication Mechanism for Time-Triggered Networked Control Systems
title_full_unstemmed Computation and Communication Evaluation of an Authentication Mechanism for Time-Triggered Networked Control Systems
title_sort computation and communication evaluation of an authentication mechanism for time-triggered networked control systems
publisher MDPI AG
series Sensors
issn 1424-8220
publishDate 2016-07-01
description In modern networked control applications, confidentiality and integrity are important features to address in order to prevent against attacks. Moreover, network control systems are a fundamental part of the communication components of current cyber-physical systems (e.g., automotive communications). Many networked control systems employ Time-Triggered (TT) architectures that provide mechanisms enabling the exchange of precise and synchronous messages. TT systems have computation and communication constraints, and with the aim to enable secure communications in the network, it is important to evaluate the computational and communication overhead of implementing secure communication mechanisms. This paper presents a comprehensive analysis and evaluation of the effects of adding a Hash-based Message Authentication (HMAC) to TT networked control systems. The contributions of the paper include (1) the analysis and experimental validation of the communication overhead, as well as a scalability analysis that utilizes the experimental result for both wired and wireless platforms and (2) an experimental evaluation of the computational overhead of HMAC based on a kernel-level Linux implementation. An automotive application is used as an example, and the results show that it is feasible to implement a secure communication mechanism without interfering with the existing automotive controller execution times. The methods and results of the paper can be used for evaluating the performance impact of security mechanisms and, thus, for the design of secure wired and wireless TT networked control systems.
topic time-trigger architectures
wireless TTA
secure messages
cyber-physical systems
timing and performance analysis
HMAC
url http://www.mdpi.com/1424-8220/16/8/1166
work_keys_str_mv AT goncalomartins computationandcommunicationevaluationofanauthenticationmechanismfortimetriggerednetworkedcontrolsystems
AT arulmoondra computationandcommunicationevaluationofanauthenticationmechanismfortimetriggerednetworkedcontrolsystems
AT abhishekdubey computationandcommunicationevaluationofanauthenticationmechanismfortimetriggerednetworkedcontrolsystems
AT anirbanbhattacharjee computationandcommunicationevaluationofanauthenticationmechanismfortimetriggerednetworkedcontrolsystems
AT xenofondkoutsoukos computationandcommunicationevaluationofanauthenticationmechanismfortimetriggerednetworkedcontrolsystems
_version_ 1716753216419397632