On the use of one-way chain based authentication protocols in secure control systems

The use of one-way chains in authentication protocols is a technique of great importance which has many applications. Employing cryptographic techniques in the area of industrial control systems has gained significant interest in the last few years. This paper proposes the use of a one-way chain based authentication protocol in a robust control system. Some enhancements of a generic one-way chain based authentication protocol are required by the scenario of secure robust and they are intended for achieving lower authentication delays and computational costs while preserving the control robust in the presence of potential attackers. We also underline that the techniques described in this paper are not restricted to the subject of authentication in robust control systems since the presented protocols may be useful for other applications as well

[1]  Dawn Song,et al.  The TESLA Broadcast Authentication Protocol , 2002 .

[2]  Chris J. Mitchell Remote User Authentication Using Public Information , 2003, IMACC.

[3]  Markus Jakobsson,et al.  Almost Optimal Hash Sequence Traversal , 2002, Financial Cryptography.

[4]  Bogdan Groza,et al.  Using One-Way Chains to Provide Message Authentication without Shared Secrets , 2006, Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06).

[5]  B. Groza,et al.  Using the Discrete Squaring Function in the Delayed Message Authentication Protocol , 2006, International Conference on Internet Surveillance and Protection (ICISP’06).

[6]  Marc Fischlin Fast Verification of Hash Chains , 2004, CT-RSA.

[7]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[8]  Tamer Basar,et al.  Optimal control of LTI systems over unreliable communication links , 2006, Autom..

[9]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[10]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[11]  Craig Metz,et al.  A One-Time Password System , 1996, RFC.

[12]  Markus Jakobsson,et al.  Fractal hash sequence representation and traversal , 2002, Proceedings IEEE International Symposium on Information Theory,.

[13]  James D. Gilsinn,et al.  IT Security for Industrial Control Systems: Requirements Specification and Performance Testing Presented at the 2004 NDIA Homeland Security Symposium & Exhibition Hyatt Regency, Crystal City, Virginia, May 25-27, 2004 , 2004 .

[14]  Bruno Crispo,et al.  Individual Authentication in Multiparty Communications , 2002, Comput. Secur..

[15]  Thomas P. von Hoff,et al.  Security for Industrial Communication Systems , 2005, Proceedings of the IEEE.

[16]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[17]  Roland S. Burns,et al.  Advanced control engineering , 2001 .

[18]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[19]  Ran Canetti,et al.  Efficient and Secure Source Authentication for Multicast , 2001, NDSS.

[20]  Charalampos Manifavas,et al.  A new family of authentication protocols , 1998, OPSR.

[21]  Yaron Sella On The Computation-Storage Trade-Offs of Hash Chain Traversal , 2003, Financial Cryptography.

[22]  Hung-Yu Chien,et al.  Robust and Simple Authentication Protocol , 2003, Comput. J..