Title :
Toward Authenticating the Master in the Modbus Protocol
Author :
Liao, Gen-Yih ; Chen, Yu-Jen ; Lu, Wen-Chung ; Cheng, Tsung-Chieh
Author_Institution :
Dept. of Inf. Manage., Chang Gung Univ., Taoyuan
Abstract :
The power systems relying on the Modbus protocol for distributed control render their facilities vulnerable since there is no security consideration in the protocol. An intruder, without being authenticated, may harm the system by issuing malicious commands. This letter presents a cryptographic scheme that aims to enhance the Modbus protocol with authenticity, in which it is in- feasible for an attacker to maliciously forge as the master. Applying the concept of hash chains, the proposed design bases its security on the one-way property of cryptographic hash functions. Also, one compression function is devised to reduce the storage overhead to O(l) in terms of slave storage. Therefore, authenticity is achieved at low storage cost in the proposed scheme.
Keywords :
cryptography; distributed control; power system control; protocols; Modbus protocol; compression function; cryptographic hash functions; distributed control; hash chains; malicious commands; power systems; storage overhead; Communication system control; Communication system security; Costs; Cryptographic protocols; Cryptography; Distributed control; Master-slave; Power system control; Power system security; Power systems; Authentication; communication protocol; power system security;
Journal_Title :
Power Delivery, IEEE Transactions on
DOI :
10.1109/TPWRD.2008.2002942