Integrity Assurance in Resource-bounded Systems Through Stochastic Message Authentication
Title | Integrity Assurance in Resource-bounded Systems Through Stochastic Message Authentication |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | Laszka, Aron, Vorobeychik, Yevgeniy, Koutsoukos, Xenofon |
Conference Name | Proceedings of the 2015 Symposium and Bootcamp on the Science of Security |
Publisher | ACM |
Conference Location | Urbana, Illinois |
ISBN Number | 978-1-4503-3376-4 |
Keywords | Cyber risk analysis and incentive design, economics of security, Foundations, game theory, Hierarchical Coordination and Control, message authentication, Resilient Monitoring and Control, Resilient Systems, science of security, SURE Project |
Abstract | Assuring communication integrity is a central problem in security. However, overhead costs associated with cryptographic primitives used towards this end introduce significant practical implementation challenges for resource-bounded systems, such as cyber-physical systems. For example, many control systems are built on legacy components which are computationally limited but have strict timing constraints. If integrity protection is a binary decision, it may simply be infeasible to introduce into such systems; without it, however, an adversary can forge malicious messages, which can cause signicant physical or financial harm. We propose a formal game-theoretic framework for optimal stochastic message authentication, providing provable integrity guarantees for resource-bounded systems based on an existing MAC scheme. We use our framework to investigate attacker deterrence, as well as optimal design of stochastic message authentication schemes when deterrence is impossible. Finally, we provide experimental results on the computational performance of our framework in practice. |
URL | http://doi.acm.org/10.1145/2746194.2746195 |
DOI | 10.1145/2746194.2746195 |
Citation Key | Laszka:2015:IAR:2746194.2746195 |
- Resilient Systems
- Science of Security
- Foundations
- SURE Project
- Cyber risk analysis and incentive design
- economics of security
- foundations
- game theory
- Hierarchical Coordination and Control
- message authentication
- Resilient Monitoring and Control
- Resilient Systems
- Science of Security
- Cyber risk analysis and incentive design
- Hierarchical Coordination and Control
- Resilient monitoring and control