Toward Authenticating the Master in the Modbus Protocol
The power systems relying on the Modbus protocol for distributed control render their facilities vulnerable since there is no security consideration in the protocol. An intruder, without being authenticated, may harm the system by issuing malicious commands. This letter presents a cryptographic sche...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on power delivery 2008-10, Vol.23 (4), p.2628-2629 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 2629 |
---|---|
container_issue | 4 |
container_start_page | 2628 |
container_title | IEEE transactions on power delivery |
container_volume | 23 |
creator | LIAO, Gen-Yih CHEN, Yu-Jen LU, Wen-Chung CHENG, Tsung-Chieh |
description | The power systems relying on the Modbus protocol for distributed control render their facilities vulnerable since there is no security consideration in the protocol. An intruder, without being authenticated, may harm the system by issuing malicious commands. This letter presents a cryptographic scheme that aims to enhance the Modbus protocol with authenticity, in which it is in- feasible for an attacker to maliciously forge as the master. Applying the concept of hash chains, the proposed design bases its security on the one-way property of cryptographic hash functions. Also, one compression function is devised to reduce the storage overhead to O(l) in terms of slave storage. Therefore, authenticity is achieved at low storage cost in the proposed scheme. |
doi_str_mv | 10.1109/TPWRD.2008.2002942 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_863003323</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4626352</ieee_id><sourcerecordid>1671368034</sourcerecordid><originalsourceid>FETCH-LOGICAL-c357t-a0a319d1a538529eb11b121f3529020c4777c21c06d724f4b43b405c7565f8163</originalsourceid><addsrcrecordid>eNpdkFtLw0AQhRdRsFb_gL4EQfAldfaSvTyWeoWKRSo-LpvNRlPSbN1NEP-9qSl98GWGw3xnmDkInWOYYAzqZrl4f72dEAC5LUQxcoBGWFGRMgLyEI1AyiyVSohjdBLjCgAYKBghsfTfJhTJtGs_XdNW1rRV85H0Ink2sXUhqZpB-SLvYrIIvvXW16foqDR1dGe7PkZv93fL2WM6f3l4mk3nqaWZaFMDhmJVYJNRmRHlcoxzTHBJewEELBNCWIIt8EIQVrKc0ZxBZkXGs1JiTsfoeti7Cf6rc7HV6ypaV9emcb6LGnOBKZdAWY9e_kNXvgtNf52WnAJQSmgPkQGywccYXKk3oVqb8KMx6G2U-i9KvY1S76LsTVe7zSZaU5fBNLaKeycBrrBUWc9dDFzlnNuPGSe8_5f-Aq_xeYo</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>863003323</pqid></control><display><type>article</type><title>Toward Authenticating the Master in the Modbus Protocol</title><source>IEEE Electronic Library (IEL)</source><creator>LIAO, Gen-Yih ; CHEN, Yu-Jen ; LU, Wen-Chung ; CHENG, Tsung-Chieh</creator><creatorcontrib>LIAO, Gen-Yih ; CHEN, Yu-Jen ; LU, Wen-Chung ; CHENG, Tsung-Chieh</creatorcontrib><description>The power systems relying on the Modbus protocol for distributed control render their facilities vulnerable since there is no security consideration in the protocol. An intruder, without being authenticated, may harm the system by issuing malicious commands. This letter presents a cryptographic scheme that aims to enhance the Modbus protocol with authenticity, in which it is in- feasible for an attacker to maliciously forge as the master. Applying the concept of hash chains, the proposed design bases its security on the one-way property of cryptographic hash functions. Also, one compression function is devised to reduce the storage overhead to O(l) in terms of slave storage. Therefore, authenticity is achieved at low storage cost in the proposed scheme.</description><identifier>ISSN: 0885-8977</identifier><identifier>EISSN: 1937-4208</identifier><identifier>DOI: 10.1109/TPWRD.2008.2002942</identifier><identifier>CODEN: ITPDE5</identifier><language>eng</language><publisher>New York, NY: IEEE</publisher><subject>Applied sciences ; Authentication ; Commands ; communication protocol ; Communication system control ; Communication system security ; Compressing ; Control systems ; Costs ; Cryptographic protocols ; Cryptography ; Design engineering ; Distributed control ; Disturbances. Regulation. Protection ; Electrical engineering. Electrical power engineering ; Electrical machines ; Electrical power engineering ; Exact sciences and technology ; Forges ; Hash based algorithms ; Master-slave ; Miscellaneous ; Power networks and lines ; Power system control ; Power system security ; Power systems ; Regulation and control ; Security</subject><ispartof>IEEE transactions on power delivery, 2008-10, Vol.23 (4), p.2628-2629</ispartof><rights>2008 INIST-CNRS</rights><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2008</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c357t-a0a319d1a538529eb11b121f3529020c4777c21c06d724f4b43b405c7565f8163</citedby><cites>FETCH-LOGICAL-c357t-a0a319d1a538529eb11b121f3529020c4777c21c06d724f4b43b405c7565f8163</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4626352$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4626352$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=20691895$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>LIAO, Gen-Yih</creatorcontrib><creatorcontrib>CHEN, Yu-Jen</creatorcontrib><creatorcontrib>LU, Wen-Chung</creatorcontrib><creatorcontrib>CHENG, Tsung-Chieh</creatorcontrib><title>Toward Authenticating the Master in the Modbus Protocol</title><title>IEEE transactions on power delivery</title><addtitle>TPWRD</addtitle><description>The power systems relying on the Modbus protocol for distributed control render their facilities vulnerable since there is no security consideration in the protocol. An intruder, without being authenticated, may harm the system by issuing malicious commands. This letter presents a cryptographic scheme that aims to enhance the Modbus protocol with authenticity, in which it is in- feasible for an attacker to maliciously forge as the master. Applying the concept of hash chains, the proposed design bases its security on the one-way property of cryptographic hash functions. Also, one compression function is devised to reduce the storage overhead to O(l) in terms of slave storage. Therefore, authenticity is achieved at low storage cost in the proposed scheme.</description><subject>Applied sciences</subject><subject>Authentication</subject><subject>Commands</subject><subject>communication protocol</subject><subject>Communication system control</subject><subject>Communication system security</subject><subject>Compressing</subject><subject>Control systems</subject><subject>Costs</subject><subject>Cryptographic protocols</subject><subject>Cryptography</subject><subject>Design engineering</subject><subject>Distributed control</subject><subject>Disturbances. Regulation. Protection</subject><subject>Electrical engineering. Electrical power engineering</subject><subject>Electrical machines</subject><subject>Electrical power engineering</subject><subject>Exact sciences and technology</subject><subject>Forges</subject><subject>Hash based algorithms</subject><subject>Master-slave</subject><subject>Miscellaneous</subject><subject>Power networks and lines</subject><subject>Power system control</subject><subject>Power system security</subject><subject>Power systems</subject><subject>Regulation and control</subject><subject>Security</subject><issn>0885-8977</issn><issn>1937-4208</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2008</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkFtLw0AQhRdRsFb_gL4EQfAldfaSvTyWeoWKRSo-LpvNRlPSbN1NEP-9qSl98GWGw3xnmDkInWOYYAzqZrl4f72dEAC5LUQxcoBGWFGRMgLyEI1AyiyVSohjdBLjCgAYKBghsfTfJhTJtGs_XdNW1rRV85H0Ink2sXUhqZpB-SLvYrIIvvXW16foqDR1dGe7PkZv93fL2WM6f3l4mk3nqaWZaFMDhmJVYJNRmRHlcoxzTHBJewEELBNCWIIt8EIQVrKc0ZxBZkXGs1JiTsfoeti7Cf6rc7HV6ypaV9emcb6LGnOBKZdAWY9e_kNXvgtNf52WnAJQSmgPkQGywccYXKk3oVqb8KMx6G2U-i9KvY1S76LsTVe7zSZaU5fBNLaKeycBrrBUWc9dDFzlnNuPGSe8_5f-Aq_xeYo</recordid><startdate>20081001</startdate><enddate>20081001</enddate><creator>LIAO, Gen-Yih</creator><creator>CHEN, Yu-Jen</creator><creator>LU, Wen-Chung</creator><creator>CHENG, Tsung-Chieh</creator><general>IEEE</general><general>Institute of Electrical and Electronics Engineers</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>KR7</scope><scope>L7M</scope><scope>F28</scope></search><sort><creationdate>20081001</creationdate><title>Toward Authenticating the Master in the Modbus Protocol</title><author>LIAO, Gen-Yih ; CHEN, Yu-Jen ; LU, Wen-Chung ; CHENG, Tsung-Chieh</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c357t-a0a319d1a538529eb11b121f3529020c4777c21c06d724f4b43b405c7565f8163</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Applied sciences</topic><topic>Authentication</topic><topic>Commands</topic><topic>communication protocol</topic><topic>Communication system control</topic><topic>Communication system security</topic><topic>Compressing</topic><topic>Control systems</topic><topic>Costs</topic><topic>Cryptographic protocols</topic><topic>Cryptography</topic><topic>Design engineering</topic><topic>Distributed control</topic><topic>Disturbances. Regulation. Protection</topic><topic>Electrical engineering. Electrical power engineering</topic><topic>Electrical machines</topic><topic>Electrical power engineering</topic><topic>Exact sciences and technology</topic><topic>Forges</topic><topic>Hash based algorithms</topic><topic>Master-slave</topic><topic>Miscellaneous</topic><topic>Power networks and lines</topic><topic>Power system control</topic><topic>Power system security</topic><topic>Power systems</topic><topic>Regulation and control</topic><topic>Security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>LIAO, Gen-Yih</creatorcontrib><creatorcontrib>CHEN, Yu-Jen</creatorcontrib><creatorcontrib>LU, Wen-Chung</creatorcontrib><creatorcontrib>CHENG, Tsung-Chieh</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><jtitle>IEEE transactions on power delivery</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>LIAO, Gen-Yih</au><au>CHEN, Yu-Jen</au><au>LU, Wen-Chung</au><au>CHENG, Tsung-Chieh</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Toward Authenticating the Master in the Modbus Protocol</atitle><jtitle>IEEE transactions on power delivery</jtitle><stitle>TPWRD</stitle><date>2008-10-01</date><risdate>2008</risdate><volume>23</volume><issue>4</issue><spage>2628</spage><epage>2629</epage><pages>2628-2629</pages><issn>0885-8977</issn><eissn>1937-4208</eissn><coden>ITPDE5</coden><abstract>The power systems relying on the Modbus protocol for distributed control render their facilities vulnerable since there is no security consideration in the protocol. An intruder, without being authenticated, may harm the system by issuing malicious commands. This letter presents a cryptographic scheme that aims to enhance the Modbus protocol with authenticity, in which it is in- feasible for an attacker to maliciously forge as the master. Applying the concept of hash chains, the proposed design bases its security on the one-way property of cryptographic hash functions. Also, one compression function is devised to reduce the storage overhead to O(l) in terms of slave storage. Therefore, authenticity is achieved at low storage cost in the proposed scheme.</abstract><cop>New York, NY</cop><pub>IEEE</pub><doi>10.1109/TPWRD.2008.2002942</doi><tpages>2</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 0885-8977 |
ispartof | IEEE transactions on power delivery, 2008-10, Vol.23 (4), p.2628-2629 |
issn | 0885-8977 1937-4208 |
language | eng |
recordid | cdi_proquest_journals_863003323 |
source | IEEE Electronic Library (IEL) |
subjects | Applied sciences Authentication Commands communication protocol Communication system control Communication system security Compressing Control systems Costs Cryptographic protocols Cryptography Design engineering Distributed control Disturbances. Regulation. Protection Electrical engineering. Electrical power engineering Electrical machines Electrical power engineering Exact sciences and technology Forges Hash based algorithms Master-slave Miscellaneous Power networks and lines Power system control Power system security Power systems Regulation and control Security |
title | Toward Authenticating the Master in the Modbus Protocol |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T14%3A13%3A39IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Toward%20Authenticating%20the%20Master%20in%20the%20Modbus%20Protocol&rft.jtitle=IEEE%20transactions%20on%20power%20delivery&rft.au=LIAO,%20Gen-Yih&rft.date=2008-10-01&rft.volume=23&rft.issue=4&rft.spage=2628&rft.epage=2629&rft.pages=2628-2629&rft.issn=0885-8977&rft.eissn=1937-4208&rft.coden=ITPDE5&rft_id=info:doi/10.1109/TPWRD.2008.2002942&rft_dat=%3Cproquest_RIE%3E1671368034%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=863003323&rft_id=info:pmid/&rft_ieee_id=4626352&rfr_iscdi=true |