• DocumentCode
    865736
  • Title

    Toward Authenticating the Master in the Modbus Protocol

  • Author

    Liao, Gen-Yih ; Chen, Yu-Jen ; Lu, Wen-Chung ; Cheng, Tsung-Chieh

  • Author_Institution
    Dept. of Inf. Manage., Chang Gung Univ., Taoyuan
  • Volume
    23
  • Issue
    4
  • fYear
    2008
  • Firstpage
    2628
  • Lastpage
    2629
  • Abstract
    The power systems relying on the Modbus protocol for distributed control render their facilities vulnerable since there is no security consideration in the protocol. An intruder, without being authenticated, may harm the system by issuing malicious commands. This letter presents a cryptographic scheme that aims to enhance the Modbus protocol with authenticity, in which it is in- feasible for an attacker to maliciously forge as the master. Applying the concept of hash chains, the proposed design bases its security on the one-way property of cryptographic hash functions. Also, one compression function is devised to reduce the storage overhead to O(l) in terms of slave storage. Therefore, authenticity is achieved at low storage cost in the proposed scheme.
  • Keywords
    cryptography; distributed control; power system control; protocols; Modbus protocol; compression function; cryptographic hash functions; distributed control; hash chains; malicious commands; power systems; storage overhead; Communication system control; Communication system security; Costs; Cryptographic protocols; Cryptography; Distributed control; Master-slave; Power system control; Power system security; Power systems; Authentication; communication protocol; power system security;
  • fLanguage
    English
  • Journal_Title
    Power Delivery, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    0885-8977
  • Type

    jour

  • DOI
    10.1109/TPWRD.2008.2002942
  • Filename
    4626352