Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3014812.3014832acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesaus-cswConference Proceedingsconference-collections
research-article

Authenticated encryption for time-sensitive critical infrastructure

Published: 31 January 2017 Publication History

Abstract

Encryption is the primary tool for protecting information security, but cyber-physical systems that interact directly with critical infrastructure, in applications such as power, water and transport, typically use no encryption for their control messages at all. This is because computer systems that interface to physical devices are subject to strict realtime constraints and it is widely assumed that the computational overheads of encryption are too high in such situations. Indeed, some international standards for critical infrastructure systems explicitly recommend against using encryption.
Here we present experimental results proving that data encryption can be used to defend cyber-physical systems within the timing constraints imposed by international standards for data communications in electricity distribution substations, even when using conventional hardware and software. To ensure the validity of the results we created a testbed composed of industry-standard devices, and to guarantee the experiments' accuracy we measured data packet timing using specialised hardware synchronised to GPS time. Our results provide the first detailed analysis of the time taken to encrypt, transmit, and decrypt a critical infrastructure protocol using a stream cipher in a realistic physical environment.
Furthermore, in safety-critical systems data confidentiality is not the only information security concern. Data integrity must be preserved as well. We therefore show that such timing results are possible even when using an authenticated encryption algorithm, which provides both data confidentiality and integrity, thereby paving the way for deploying strong encryption technologies in cyber-physical systems.

References

[1]
Adam Langley. ChaCha20 + Polyl305 OpenSSL Implementation, 2013. https://git.openssl.org/gitweb/?p=openssl.git;a=tree;h=refs/heads/1.0.2-aead, accessed 28 August 2015.
[2]
AEMO. Australian Energy Market Operator: Market Operations, 2015. http://www.aemo.com.au/Electricity/Market-Operations, accessed 24 August 2015.
[3]
M. J. ALMashrafi. Analysis of stream cipher based authenticated encryption schemes. PhD thesis, Queensland University of Technology, 2012.
[4]
Australian Energy Market Commission. National Electricity Rules Version 73, Aug. 2015. Available via http://www.aemc.gov.au/Energy-Rules/National-electricity-rules/Current-Rules.
[5]
Benoit Michau and Stephen Groat. Cryptography for mobile network - C implementation and Python bindings, 2015. https://github.com/mitshell/CryptoMobile, accessed 31 August 2015.
[6]
M. Boesgaard, M. Vesterager, T. Pedersen, J. Christiansen, and O. Scavenius. Rabbit: A new high-performance stream cipher. In Fast Software Encryption, pages 307--329. Springer, 2003.
[7]
P. Ekdahl and T. Johansson. A new version of the stream cipher SNOW. In Selected Areas in Cryptography, pages 47--61. Springer, 2003.
[8]
Emanuele Acri. Hexlnject: The power of hex raw network access, 2010. http://hexinject.sourceforge.net/, accessed 31 August 2015.
[9]
Endace Ltd. Datasheet: Endace DAG 7.5G4 network monitoring card, 2015. http://www.emulex.com/products/network-visibility-products-and-services/endacedag-data-capture-cards/specifications/, accessed 10 July 2015.
[10]
W. Fangfang, W. Huazhong, C. Dongqing, and P. Yong. Substation communication security research based on hybrid encryption of DES and RSA. In Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pages 437--441. IEEE, 2013.
[11]
GE Digital Energy. C60 breaker protection system, 2015. https://www.gedigitalenergy.com/multilin/catalog/c60.htm, accessed 5 August 2015.
[12]
G. Hayes and K. El-Khatib. Securing Modbus transactions using hash-based message authentication codes and stream transmission control protocol. In Proceedings of the Third International Conference on Communications and Information Technology (ICCIT 2013), pages 179--184. IEEE, 2013.
[13]
IEEE. IEEE Standard for Electric Power Systems Communications---Distributed Network Protocol (DNP3), Oct. 2012. IEEE Std 1815--2012 (Revision of IEEE Std 1815--2010).
[14]
IEEE Power Engineering Society. Communication delivery time performance requirements for electric power substation automation, Feb. 2005. IEEE Standard 1646--2004.
[15]
V. Igure, S. Laughter, and R. Williams. Security issues in SCADA networks. Computers and Security, 25(7):498--506, Oct. 2006.
[16]
Interface Master Technologies Inc. Niagara 3271x-xx Family, 2015. http://www.interfacemasters.com/pdf/Niagara_3271x-xx_Family.pdf, accessed 18 August 2015.
[17]
International Electrotechnical Commission. IEC 61850: Communication networks and systems in substations, 2004.
[18]
International Electrotechnical Commission. IEC 62351: Power systems management and associated information exchange---Data and communications security, 2007.
[19]
ISO. ISO/IEC 27001 Information technology---Security techniques---Information security management systems---Requirements. ISO, Geneva, 2005.
[20]
H. Khurana, R. Bobba, T. Yardley, P. Agarwal, and E. Heine. Design principles for power grid cyber-infrastructure authentication protocols. In Proceedings of the 43rd Hawaii International Conference on System Sciences (HICSS 2010), pages 1--10. IEEE, 2010.
[21]
E. P. Leverett. Quantitatively assessing and visualising industrial system attack surfaces. Master's thesis, Darwin College, University of Cambridge, 2011.
[22]
A. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996.
[23]
Modbus Organization, Inc. MODBUS Messaging on TCP/IP Implementation Guide V1.0b, 2006. http://www.modbus.org/docs/Modbus_Messaging_Implementation_Guide_V1_0b.pdf, accessed 24 August 2015.
[24]
Modbus Organization, Inc. MODBUS Application Protocol Specification V1.1b3, 2012. http://www.modbus.org/docs/Modbus_Application_Protocol_V1_1b3.pdf, accessed 24 August 2015.
[25]
R. A. Mollin. Codes: The guide to secrecy from ancient to modern times. CRC Press, 2005.
[26]
National Institute of Standards and Technology (NIST) and United States of America. Framework for improving critical infrastructure cybersecurity, 2014.
[27]
G. Orhanou and S. El-Hajji. The new LTE cryptographic algorithms EEA3 and EIA3. Applied Mathematics and Information Sciences, 7(6):2385--2390, 2013.
[28]
A. Prasad and S. Seo. Security in Next Generation Mobile Networks: SAE/LTE and WiMAX. River Publishers' Series in Standardisation. River Publishers, 2011.
[29]
A. Raza, K. Ullah, S. Ahmed, S. Ahmed, H.-S. Jang, and H.-S. Yang. Gigabit Ethernet based substation under IEC61850 standard. In Proceedings of the Second International Conference on Computer, Control and Communication (IC4 2009), pages 1--6, Feb. 2009.
[30]
P. Robertson, C. Gordon, and S. Loo. Implementing security for critical infrastructure wide-area networks, 2013. https://www.selinc.com/WorkArea/DownloadAsset.aspx?id=21474836912, accessed 18 August 2015.
[31]
P. Rogaway, M. Bellare, and J. Black. OCB: A block-cipher mode of operation for efficient authenticated encryption. ACM Transactions on Information and System Security (TISSEC), 6(3):365--403, 2003.
[32]
Schweitzer Engineering Laboratories, Inc. SEL-421 protection, automation, and control system, 2015. https://www.selinc.com/SEL-421/, accessed 5 August 2015.
[33]
Tekron International. GNSS timing generator---TCG 01-G, 2015. http://www.tekron.com/tcg-01-g, accessed 5 August 2015.
[34]
VMWare, Inc. Best Practices for Performance Tuning of Latency-Sensitive Workloads in vSphere VMs, 2013. https://www.vmware.com/files/pdf/techpaper/VMW-Tuning-Latency-Sensitive-Workloads.pdf, accessed 28 August 2015.
[35]
D. Wagner, L. Simpson, E. Dawson, J. Kelsey, W. Millan, and B. Schneier. Cryptanalysis of ORYX. In Selected Areas in Cryptography, pages 296--305. Springer, 1999.
[36]
A. West. Securing DNP3 and Modbus with AGA12-2J. In Power and Energy Society General Meeting---Conversion and Delivery of Electrical Energy in the 21st Century, pages 1--4. IEEE, 2008.
[37]
B. Zhu, A. Joseph, and S. Sastry. A taxonomy of cyber attacks on SCADA systems. In Proceedings of the IEEE International Conference on Internet of Things and Cyber, Physical and Social Computing (iThings/CPSCom 2011), 19--22 October, China, pages 380--388. IEEE Computer Society, 2011.

Cited By

View all
  • (2024)Examining the Suitability of Stream Ciphers for Modbus-TCP Encryption on Resource Constrained DevicesProceedings of the 17th European Workshop on Systems Security10.1145/3642974.3652287(51-57)Online publication date: 22-Apr-2024
  • (2021)Security risks in cyber physical systems—A systematic mapping studyJournal of Software: Evolution and Process10.1002/smr.2346Online publication date: 12-Apr-2021
  • (2017)Using Sports Plays to Configure Honeypots Environments to form a Virtual Security ShieldComputer and Network Security Essentials10.1007/978-3-319-58424-9_11(189-204)Online publication date: 13-Aug-2017

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ACSW '17: Proceedings of the Australasian Computer Science Week Multiconference
January 2017
615 pages
ISBN:9781450347686
DOI:10.1145/3014812
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 31 January 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. authenticated encryption
  2. control systems
  3. critical infrastructure
  4. encryption
  5. stream ciphers

Qualifiers

  • Research-article

Conference

ACSW 2017
ACSW 2017: Australasian Computer Science Week 2017
January 30 - February 3, 2017
Geelong, Australia

Acceptance Rates

ACSW '17 Paper Acceptance Rate 78 of 156 submissions, 50%;
Overall Acceptance Rate 204 of 424 submissions, 48%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)14
  • Downloads (Last 6 weeks)0
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Examining the Suitability of Stream Ciphers for Modbus-TCP Encryption on Resource Constrained DevicesProceedings of the 17th European Workshop on Systems Security10.1145/3642974.3652287(51-57)Online publication date: 22-Apr-2024
  • (2021)Security risks in cyber physical systems—A systematic mapping studyJournal of Software: Evolution and Process10.1002/smr.2346Online publication date: 12-Apr-2021
  • (2017)Using Sports Plays to Configure Honeypots Environments to form a Virtual Security ShieldComputer and Network Security Essentials10.1007/978-3-319-58424-9_11(189-204)Online publication date: 13-Aug-2017

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media