• DocumentCode
    3233234
  • Title

    Trusted Group Key Management for Real-Time Critical Infrastructure Protection

  • Author

    Jenkins, J. ; Easton, S. ; Guidry, D. ; Burmester, Mike ; Xiuwen Liu ; Xin Yuan ; Lawrence, J. ; Ty, S.

  • Author_Institution
    Dept. of Comput. Sci., Florida State Univ., Tallahassee, FL, USA
  • fYear
    2013
  • fDate
    18-20 Nov. 2013
  • Firstpage
    248
  • Lastpage
    253
  • Abstract
    Most critical infrastructures can be modeled as cyber-physical systems whose cyber components control physical processes so as to optimize specific system objectives. Protecting such systems from malicious threats (including insider threats) is particularly challenging. One solution, based on Trusted Computing technologies such as the Trusted Platform Module (TPM), uses an infrastructure that ensures that only trusted programs are executed. Such technologies readily support secure unicast communication. However, many critical infrastructures employ multicast. Addressing multicast requires attention to (a) compatibility and (b) real-time compliance. In particular, sealed multicast storage for which access takes no longer than unicast. We present a trusted computing architecture for multicast communication based on an adaptation of the Kerberos authentication service along with TPM trust engines. This architecture is efficient and scalable (one session key per multicast channel). We show that, by integrating our framework with an open source IEC 61850-90-5 profile emulator for power utility automation, synchrophasor data feeds are protected in real-time (<; 4ms, the IEC61850-90-5 threshold) against strong adversaries.
  • Keywords
    critical infrastructures; multicast communication; public key cryptography; trusted computing; Kerberos authentication service; TPM trust engines; cyber components control physical process; cyber-physical systems; malicious threats; multicast communication; open source IEC 61850-90-5 profile emulator; power utility automation; real-time critical infrastructure protection; sealed multicast storage; secure unicast communication; synchrophasor data feeds; trusted computing technologies; trusted group key management; trusted platform module; Authentication; Cryptography; Databases; Protocols; Real-time systems; Servers; Group key management; IEC 61850-90-5; Kerberos; trusted multicast; trusted platform modules;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Military Communications Conference, MILCOM 2013 - 2013 IEEE
  • Conference_Location
    San Diego, CA
  • Type

    conf

  • DOI
    10.1109/MILCOM.2013.50
  • Filename
    6735630