Assessment simulation model for uncoupled message authentication

Today's trend of an increasing number of networked embedded devices pervades many areas. Ranging from home automation, industrial or automotive applications with a large number of different protocols, low resources and often high demands on real-time make it difficult to secure the communication of such systems. A concept of an uncoupled MAC which is able to ensure the authenticity and integrity of communication flows between two network parties can be used. This is in particular of advance for outdated legacy components still participating in the network. In this paper a assessment simulation model of the mechanism behind this technology is described. It outlines the probability of detecting an attack depending on the message authentication overhead. The model considers all control variables and performs measurements based on random data traffic. The results of the statistical analysis state that a high attack detection rate can be obtained even with a small communication overhead.

[1]  Ennio Gambi,et al.  Selective encryption for efficient and secure transmission of compressed space images , 2009, 2009 International Workshop on Satellite and Space Communications.

[2]  Ajay Kushwaha,et al.  A Novel Selective Encryption Method for Securing Text Over Mobile Ad Hoc Network , 2016 .

[3]  Martin Nilsson,et al.  Real-Time Measurement of End-to-End Available Bandwidth using Kalman Filtering , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.

[4]  Mythili Vutukuru,et al.  Trace based application layer modeling in ns-3 , 2016, 2016 Twenty Second National Conference on Communication (NCC).

[5]  Ezzat G. Bakhoum,et al.  Intrusion detection model based on selective packet sampling , 2011, EURASIP J. Inf. Secur..

[6]  Martin Schramm,et al.  Embedded plug-in devices to secure industrial network communications , 2016, 2016 International Conference on Applied Electronics (AE).

[7]  Soroush Haeri,et al.  Virtual Network Embedding via Monte Carlo Tree Search , 2018, IEEE Transactions on Cybernetics.