Visible to the public Integrity Assurance in Resource-bounded Systems Through Stochastic Message AuthenticationConflict Detection Enabled

TitleIntegrity Assurance in Resource-bounded Systems Through Stochastic Message Authentication
Publication TypeConference Paper
Year of Publication2015
AuthorsLaszka, Aron, Vorobeychik, Yevgeniy, Koutsoukos, Xenofon
Conference NameProceedings of the 2015 Symposium and Bootcamp on the Science of Security
PublisherACM
Conference LocationUrbana, Illinois
ISBN Number978-1-4503-3376-4
KeywordsCyber risk analysis and incentive design, economics of security, Foundations, game theory, Hierarchical Coordination and Control, message authentication, Resilient Monitoring and Control, Resilient Systems, science of security, SURE Project
Abstract

Assuring communication integrity is a central problem in security. However, overhead costs associated with cryptographic primitives used towards this end introduce significant practical implementation challenges for resource-bounded systems, such as cyber-physical systems. For example, many control systems are built on legacy components which are computationally limited but have strict timing constraints. If integrity protection is a binary decision, it may simply be infeasible to introduce into such systems; without it, however, an adversary can forge malicious messages, which can cause signicant physical or financial harm. We propose a formal game-theoretic framework for optimal stochastic message authentication, providing provable integrity guarantees for resource-bounded systems based on an existing MAC scheme. We use our framework to investigate attacker deterrence, as well as optimal design of stochastic message authentication schemes when deterrence is impossible. Finally, we provide experimental results on the computational performance of our framework in practice.

URLhttp://doi.acm.org/10.1145/2746194.2746195
DOI10.1145/2746194.2746195
Citation KeyLaszka:2015:IAR:2746194.2746195