Title :
Trusted Group Key Management for Real-Time Critical Infrastructure Protection
Author :
Jenkins, J. ; Easton, S. ; Guidry, D. ; Burmester, Mike ; Xiuwen Liu ; Xin Yuan ; Lawrence, J. ; Ty, S.
Author_Institution :
Dept. of Comput. Sci., Florida State Univ., Tallahassee, FL, USA
Abstract :
Most critical infrastructures can be modeled as cyber-physical systems whose cyber components control physical processes so as to optimize specific system objectives. Protecting such systems from malicious threats (including insider threats) is particularly challenging. One solution, based on Trusted Computing technologies such as the Trusted Platform Module (TPM), uses an infrastructure that ensures that only trusted programs are executed. Such technologies readily support secure unicast communication. However, many critical infrastructures employ multicast. Addressing multicast requires attention to (a) compatibility and (b) real-time compliance. In particular, sealed multicast storage for which access takes no longer than unicast. We present a trusted computing architecture for multicast communication based on an adaptation of the Kerberos authentication service along with TPM trust engines. This architecture is efficient and scalable (one session key per multicast channel). We show that, by integrating our framework with an open source IEC 61850-90-5 profile emulator for power utility automation, synchrophasor data feeds are protected in real-time (<; 4ms, the IEC61850-90-5 threshold) against strong adversaries.
Keywords :
critical infrastructures; multicast communication; public key cryptography; trusted computing; Kerberos authentication service; TPM trust engines; cyber components control physical process; cyber-physical systems; malicious threats; multicast communication; open source IEC 61850-90-5 profile emulator; power utility automation; real-time critical infrastructure protection; sealed multicast storage; secure unicast communication; synchrophasor data feeds; trusted computing technologies; trusted group key management; trusted platform module; Authentication; Cryptography; Databases; Protocols; Real-time systems; Servers; Group key management; IEC 61850-90-5; Kerberos; trusted multicast; trusted platform modules;
Conference_Titel :
Military Communications Conference, MILCOM 2013 - 2013 IEEE
Conference_Location :
San Diego, CA
DOI :
10.1109/MILCOM.2013.50