Low cost multicast authentication via validity voting in time-triggered embedded control networks

  • Authors:
  • Chris Szilagyi;Philip Koopman

  • Affiliations:
  • Carnegie Mellon University;Carnegie Mellon University

  • Venue:
  • WESS '10 Proceedings of the 5th Workshop on Embedded Systems Security
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing multicast authentication techniques impractical. Our previous work provides multicast authentication for time-triggered applications on embedded networks by validating truncated message authentication codes across multiple packets. In this work, we improve overall bandwidth efficiency and reduce authentication latency by using unanimous voting on message value and validity amongst a group of nodes. This technique decreases the probability of successful per-packet forgery by using one extra bit per additional voter, regardless of the number of total receivers. This can permit using fewer authentication bits per receiver. We derive an upper bound on the probability of successful forgery and experimentally verify it using simulated attacks. For example, we show that with two authentication bits per receiver, adding four additional bits per message to vote amongst four nodes reduces the probability of per-packet forgery by a factor of more than 100. When integrated with our prior work on time-triggered authentication, this technique reduces the number of authentication message rounds required for this example by a factor of three. Model-checking with AVISPA confirms data integrity and data origin authenticity for this approach.