DocumentCode
3233234
Title
Trusted Group Key Management for Real-Time Critical Infrastructure Protection
Author
Jenkins, J. ; Easton, S. ; Guidry, D. ; Burmester, Mike ; Xiuwen Liu ; Xin Yuan ; Lawrence, J. ; Ty, S.
Author_Institution
Dept. of Comput. Sci., Florida State Univ., Tallahassee, FL, USA
fYear
2013
fDate
18-20 Nov. 2013
Firstpage
248
Lastpage
253
Abstract
Most critical infrastructures can be modeled as cyber-physical systems whose cyber components control physical processes so as to optimize specific system objectives. Protecting such systems from malicious threats (including insider threats) is particularly challenging. One solution, based on Trusted Computing technologies such as the Trusted Platform Module (TPM), uses an infrastructure that ensures that only trusted programs are executed. Such technologies readily support secure unicast communication. However, many critical infrastructures employ multicast. Addressing multicast requires attention to (a) compatibility and (b) real-time compliance. In particular, sealed multicast storage for which access takes no longer than unicast. We present a trusted computing architecture for multicast communication based on an adaptation of the Kerberos authentication service along with TPM trust engines. This architecture is efficient and scalable (one session key per multicast channel). We show that, by integrating our framework with an open source IEC 61850-90-5 profile emulator for power utility automation, synchrophasor data feeds are protected in real-time (<; 4ms, the IEC61850-90-5 threshold) against strong adversaries.
Keywords
critical infrastructures; multicast communication; public key cryptography; trusted computing; Kerberos authentication service; TPM trust engines; cyber components control physical process; cyber-physical systems; malicious threats; multicast communication; open source IEC 61850-90-5 profile emulator; power utility automation; real-time critical infrastructure protection; sealed multicast storage; secure unicast communication; synchrophasor data feeds; trusted computing technologies; trusted group key management; trusted platform module; Authentication; Cryptography; Databases; Protocols; Real-time systems; Servers; Group key management; IEC 61850-90-5; Kerberos; trusted multicast; trusted platform modules;
fLanguage
English
Publisher
ieee
Conference_Titel
Military Communications Conference, MILCOM 2013 - 2013 IEEE
Conference_Location
San Diego, CA
Type
conf
DOI
10.1109/MILCOM.2013.50
Filename
6735630
Link To Document