DocumentCode :
865736
Title :
Toward Authenticating the Master in the Modbus Protocol
Author :
Liao, Gen-Yih ; Chen, Yu-Jen ; Lu, Wen-Chung ; Cheng, Tsung-Chieh
Author_Institution :
Dept. of Inf. Manage., Chang Gung Univ., Taoyuan
Volume :
23
Issue :
4
fYear :
2008
Firstpage :
2628
Lastpage :
2629
Abstract :
The power systems relying on the Modbus protocol for distributed control render their facilities vulnerable since there is no security consideration in the protocol. An intruder, without being authenticated, may harm the system by issuing malicious commands. This letter presents a cryptographic scheme that aims to enhance the Modbus protocol with authenticity, in which it is in- feasible for an attacker to maliciously forge as the master. Applying the concept of hash chains, the proposed design bases its security on the one-way property of cryptographic hash functions. Also, one compression function is devised to reduce the storage overhead to O(l) in terms of slave storage. Therefore, authenticity is achieved at low storage cost in the proposed scheme.
Keywords :
cryptography; distributed control; power system control; protocols; Modbus protocol; compression function; cryptographic hash functions; distributed control; hash chains; malicious commands; power systems; storage overhead; Communication system control; Communication system security; Costs; Cryptographic protocols; Cryptography; Distributed control; Master-slave; Power system control; Power system security; Power systems; Authentication; communication protocol; power system security;
fLanguage :
English
Journal_Title :
Power Delivery, IEEE Transactions on
Publisher :
ieee
ISSN :
0885-8977
Type :
jour
DOI :
10.1109/TPWRD.2008.2002942
Filename :
4626352
Link To Document :
بازگشت