Visible to the public Performance evaluation of an authentication mechanism in time-triggered networked control systemsConflict Detection Enabled

TitlePerformance evaluation of an authentication mechanism in time-triggered networked control systems
Publication TypeConference Paper
Year of Publication2014
AuthorsGoncalo Martins, Anirban Bhattacharjee, Abhishek Dubey, Xenofon Koutsoukos
Conference Name7th International Symposium on Resilient Control Systems (ISRCS)
Date PublishedAug
Conference LocationDenver, CO
Keywordsauthentication mechanism, authorisation, communication overhead, computation overhead, computer network security, cryptography, fault tolerance property, hash based message authentication, HMAC, Local area networks, message authentication, message confidentiality, message integrity, network data communication, networked control systems, performance evaluation, Receivers, reliability property, safety property, Secure Messages, security mechanisms, Switches, Synchronization, System-security co-design, time triggered architectures, Time-Trigger Architectures, time-triggered networked control systems, timing behavior, TTEthernet, TTEthernet network, Vanderbilt

An important challenge in networked control systems is to ensure the confidentiality and integrity of the message in order to secure the communication and prevent attackers or intruders from compromising the system. However, security mechanisms may jeopardize the temporal behavior of the network data communication because of the computation and communication overhead. In this paper, we study the effect of adding Hash Based Message Authentication (HMAC) to a time-triggered networked control system. Time Triggered Architectures (TTAs) provide a deterministic and predictable timing behavior that is used to ensure safety, reliability and fault tolerance properties. The paper analyzes the computation and communication overhead of adding HMAC and the impact on the performance of the time-triggered network. Experimental validation and performance evaluation results using a TTEthernet network are also presented.

Citation Key6900098