Toward Authenticating the Master in the Modbus Protocol

The power systems relying on the Modbus protocol for distributed control render their facilities vulnerable since there is no security consideration in the protocol. An intruder, without being authenticated, may harm the system by issuing malicious commands. This letter presents a cryptographic sche...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on power delivery 2008-10, Vol.23 (4), p.2628-2629
Hauptverfasser: LIAO, Gen-Yih, CHEN, Yu-Jen, LU, Wen-Chung, CHENG, Tsung-Chieh
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 2629
container_issue 4
container_start_page 2628
container_title IEEE transactions on power delivery
container_volume 23
creator LIAO, Gen-Yih
CHEN, Yu-Jen
LU, Wen-Chung
CHENG, Tsung-Chieh
description The power systems relying on the Modbus protocol for distributed control render their facilities vulnerable since there is no security consideration in the protocol. An intruder, without being authenticated, may harm the system by issuing malicious commands. This letter presents a cryptographic scheme that aims to enhance the Modbus protocol with authenticity, in which it is in- feasible for an attacker to maliciously forge as the master. Applying the concept of hash chains, the proposed design bases its security on the one-way property of cryptographic hash functions. Also, one compression function is devised to reduce the storage overhead to O(l) in terms of slave storage. Therefore, authenticity is achieved at low storage cost in the proposed scheme.
doi_str_mv 10.1109/TPWRD.2008.2002942
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_863003323</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4626352</ieee_id><sourcerecordid>1671368034</sourcerecordid><originalsourceid>FETCH-LOGICAL-c357t-a0a319d1a538529eb11b121f3529020c4777c21c06d724f4b43b405c7565f8163</originalsourceid><addsrcrecordid>eNpdkFtLw0AQhRdRsFb_gL4EQfAldfaSvTyWeoWKRSo-LpvNRlPSbN1NEP-9qSl98GWGw3xnmDkInWOYYAzqZrl4f72dEAC5LUQxcoBGWFGRMgLyEI1AyiyVSohjdBLjCgAYKBghsfTfJhTJtGs_XdNW1rRV85H0Ink2sXUhqZpB-SLvYrIIvvXW16foqDR1dGe7PkZv93fL2WM6f3l4mk3nqaWZaFMDhmJVYJNRmRHlcoxzTHBJewEELBNCWIIt8EIQVrKc0ZxBZkXGs1JiTsfoeti7Cf6rc7HV6ypaV9emcb6LGnOBKZdAWY9e_kNXvgtNf52WnAJQSmgPkQGywccYXKk3oVqb8KMx6G2U-i9KvY1S76LsTVe7zSZaU5fBNLaKeycBrrBUWc9dDFzlnNuPGSe8_5f-Aq_xeYo</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>863003323</pqid></control><display><type>article</type><title>Toward Authenticating the Master in the Modbus Protocol</title><source>IEEE Electronic Library (IEL)</source><creator>LIAO, Gen-Yih ; CHEN, Yu-Jen ; LU, Wen-Chung ; CHENG, Tsung-Chieh</creator><creatorcontrib>LIAO, Gen-Yih ; CHEN, Yu-Jen ; LU, Wen-Chung ; CHENG, Tsung-Chieh</creatorcontrib><description>The power systems relying on the Modbus protocol for distributed control render their facilities vulnerable since there is no security consideration in the protocol. An intruder, without being authenticated, may harm the system by issuing malicious commands. This letter presents a cryptographic scheme that aims to enhance the Modbus protocol with authenticity, in which it is in- feasible for an attacker to maliciously forge as the master. Applying the concept of hash chains, the proposed design bases its security on the one-way property of cryptographic hash functions. Also, one compression function is devised to reduce the storage overhead to O(l) in terms of slave storage. Therefore, authenticity is achieved at low storage cost in the proposed scheme.</description><identifier>ISSN: 0885-8977</identifier><identifier>EISSN: 1937-4208</identifier><identifier>DOI: 10.1109/TPWRD.2008.2002942</identifier><identifier>CODEN: ITPDE5</identifier><language>eng</language><publisher>New York, NY: IEEE</publisher><subject>Applied sciences ; Authentication ; Commands ; communication protocol ; Communication system control ; Communication system security ; Compressing ; Control systems ; Costs ; Cryptographic protocols ; Cryptography ; Design engineering ; Distributed control ; Disturbances. Regulation. Protection ; Electrical engineering. Electrical power engineering ; Electrical machines ; Electrical power engineering ; Exact sciences and technology ; Forges ; Hash based algorithms ; Master-slave ; Miscellaneous ; Power networks and lines ; Power system control ; Power system security ; Power systems ; Regulation and control ; Security</subject><ispartof>IEEE transactions on power delivery, 2008-10, Vol.23 (4), p.2628-2629</ispartof><rights>2008 INIST-CNRS</rights><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2008</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c357t-a0a319d1a538529eb11b121f3529020c4777c21c06d724f4b43b405c7565f8163</citedby><cites>FETCH-LOGICAL-c357t-a0a319d1a538529eb11b121f3529020c4777c21c06d724f4b43b405c7565f8163</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4626352$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4626352$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=20691895$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>LIAO, Gen-Yih</creatorcontrib><creatorcontrib>CHEN, Yu-Jen</creatorcontrib><creatorcontrib>LU, Wen-Chung</creatorcontrib><creatorcontrib>CHENG, Tsung-Chieh</creatorcontrib><title>Toward Authenticating the Master in the Modbus Protocol</title><title>IEEE transactions on power delivery</title><addtitle>TPWRD</addtitle><description>The power systems relying on the Modbus protocol for distributed control render their facilities vulnerable since there is no security consideration in the protocol. An intruder, without being authenticated, may harm the system by issuing malicious commands. This letter presents a cryptographic scheme that aims to enhance the Modbus protocol with authenticity, in which it is in- feasible for an attacker to maliciously forge as the master. Applying the concept of hash chains, the proposed design bases its security on the one-way property of cryptographic hash functions. Also, one compression function is devised to reduce the storage overhead to O(l) in terms of slave storage. Therefore, authenticity is achieved at low storage cost in the proposed scheme.</description><subject>Applied sciences</subject><subject>Authentication</subject><subject>Commands</subject><subject>communication protocol</subject><subject>Communication system control</subject><subject>Communication system security</subject><subject>Compressing</subject><subject>Control systems</subject><subject>Costs</subject><subject>Cryptographic protocols</subject><subject>Cryptography</subject><subject>Design engineering</subject><subject>Distributed control</subject><subject>Disturbances. Regulation. Protection</subject><subject>Electrical engineering. Electrical power engineering</subject><subject>Electrical machines</subject><subject>Electrical power engineering</subject><subject>Exact sciences and technology</subject><subject>Forges</subject><subject>Hash based algorithms</subject><subject>Master-slave</subject><subject>Miscellaneous</subject><subject>Power networks and lines</subject><subject>Power system control</subject><subject>Power system security</subject><subject>Power systems</subject><subject>Regulation and control</subject><subject>Security</subject><issn>0885-8977</issn><issn>1937-4208</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2008</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkFtLw0AQhRdRsFb_gL4EQfAldfaSvTyWeoWKRSo-LpvNRlPSbN1NEP-9qSl98GWGw3xnmDkInWOYYAzqZrl4f72dEAC5LUQxcoBGWFGRMgLyEI1AyiyVSohjdBLjCgAYKBghsfTfJhTJtGs_XdNW1rRV85H0Ink2sXUhqZpB-SLvYrIIvvXW16foqDR1dGe7PkZv93fL2WM6f3l4mk3nqaWZaFMDhmJVYJNRmRHlcoxzTHBJewEELBNCWIIt8EIQVrKc0ZxBZkXGs1JiTsfoeti7Cf6rc7HV6ypaV9emcb6LGnOBKZdAWY9e_kNXvgtNf52WnAJQSmgPkQGywccYXKk3oVqb8KMx6G2U-i9KvY1S76LsTVe7zSZaU5fBNLaKeycBrrBUWc9dDFzlnNuPGSe8_5f-Aq_xeYo</recordid><startdate>20081001</startdate><enddate>20081001</enddate><creator>LIAO, Gen-Yih</creator><creator>CHEN, Yu-Jen</creator><creator>LU, Wen-Chung</creator><creator>CHENG, Tsung-Chieh</creator><general>IEEE</general><general>Institute of Electrical and Electronics Engineers</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>KR7</scope><scope>L7M</scope><scope>F28</scope></search><sort><creationdate>20081001</creationdate><title>Toward Authenticating the Master in the Modbus Protocol</title><author>LIAO, Gen-Yih ; CHEN, Yu-Jen ; LU, Wen-Chung ; CHENG, Tsung-Chieh</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c357t-a0a319d1a538529eb11b121f3529020c4777c21c06d724f4b43b405c7565f8163</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Applied sciences</topic><topic>Authentication</topic><topic>Commands</topic><topic>communication protocol</topic><topic>Communication system control</topic><topic>Communication system security</topic><topic>Compressing</topic><topic>Control systems</topic><topic>Costs</topic><topic>Cryptographic protocols</topic><topic>Cryptography</topic><topic>Design engineering</topic><topic>Distributed control</topic><topic>Disturbances. Regulation. Protection</topic><topic>Electrical engineering. Electrical power engineering</topic><topic>Electrical machines</topic><topic>Electrical power engineering</topic><topic>Exact sciences and technology</topic><topic>Forges</topic><topic>Hash based algorithms</topic><topic>Master-slave</topic><topic>Miscellaneous</topic><topic>Power networks and lines</topic><topic>Power system control</topic><topic>Power system security</topic><topic>Power systems</topic><topic>Regulation and control</topic><topic>Security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>LIAO, Gen-Yih</creatorcontrib><creatorcontrib>CHEN, Yu-Jen</creatorcontrib><creatorcontrib>LU, Wen-Chung</creatorcontrib><creatorcontrib>CHENG, Tsung-Chieh</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><jtitle>IEEE transactions on power delivery</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>LIAO, Gen-Yih</au><au>CHEN, Yu-Jen</au><au>LU, Wen-Chung</au><au>CHENG, Tsung-Chieh</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Toward Authenticating the Master in the Modbus Protocol</atitle><jtitle>IEEE transactions on power delivery</jtitle><stitle>TPWRD</stitle><date>2008-10-01</date><risdate>2008</risdate><volume>23</volume><issue>4</issue><spage>2628</spage><epage>2629</epage><pages>2628-2629</pages><issn>0885-8977</issn><eissn>1937-4208</eissn><coden>ITPDE5</coden><abstract>The power systems relying on the Modbus protocol for distributed control render their facilities vulnerable since there is no security consideration in the protocol. An intruder, without being authenticated, may harm the system by issuing malicious commands. This letter presents a cryptographic scheme that aims to enhance the Modbus protocol with authenticity, in which it is in- feasible for an attacker to maliciously forge as the master. Applying the concept of hash chains, the proposed design bases its security on the one-way property of cryptographic hash functions. Also, one compression function is devised to reduce the storage overhead to O(l) in terms of slave storage. Therefore, authenticity is achieved at low storage cost in the proposed scheme.</abstract><cop>New York, NY</cop><pub>IEEE</pub><doi>10.1109/TPWRD.2008.2002942</doi><tpages>2</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 0885-8977
ispartof IEEE transactions on power delivery, 2008-10, Vol.23 (4), p.2628-2629
issn 0885-8977
1937-4208
language eng
recordid cdi_proquest_journals_863003323
source IEEE Electronic Library (IEL)
subjects Applied sciences
Authentication
Commands
communication protocol
Communication system control
Communication system security
Compressing
Control systems
Costs
Cryptographic protocols
Cryptography
Design engineering
Distributed control
Disturbances. Regulation. Protection
Electrical engineering. Electrical power engineering
Electrical machines
Electrical power engineering
Exact sciences and technology
Forges
Hash based algorithms
Master-slave
Miscellaneous
Power networks and lines
Power system control
Power system security
Power systems
Regulation and control
Security
title Toward Authenticating the Master in the Modbus Protocol
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T14%3A13%3A39IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Toward%20Authenticating%20the%20Master%20in%20the%20Modbus%20Protocol&rft.jtitle=IEEE%20transactions%20on%20power%20delivery&rft.au=LIAO,%20Gen-Yih&rft.date=2008-10-01&rft.volume=23&rft.issue=4&rft.spage=2628&rft.epage=2629&rft.pages=2628-2629&rft.issn=0885-8977&rft.eissn=1937-4208&rft.coden=ITPDE5&rft_id=info:doi/10.1109/TPWRD.2008.2002942&rft_dat=%3Cproquest_RIE%3E1671368034%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=863003323&rft_id=info:pmid/&rft_ieee_id=4626352&rfr_iscdi=true