Analysis and Implementation of Message Authentication Code (MAC) Algorithms for GOOSE Message Security

被引:42
|
作者
Hussain, S. M. Suhail [1 ]
Farooq, Shaik Mullapathi [2 ]
Ustun, Taha Selim [1 ]
机构
[1] AIST FREA, Fukushima Renewable Energy Inst, Koriyama, Fukushima 9630215, Japan
[2] Yogi Vemana Univ, YSR Engn Coll, Dept Comp Sci & Engn, Kadapa 516360, Andhra Pradesh, India
来源
IEEE ACCESS | 2019年 / 7卷
关键词
IEC; 62351; 61850; generic object-oriented substation Events (GOOSE); cybersecurity; hash-based message authentication code (HMAC); advanced encryption standard-galois message authentication code (AES-GMAC);
D O I
10.1109/ACCESS.2019.2923728
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There is growing awareness towards cybersecurity threats in power systems. IEC 61850 standard facilitates communication between different Intelligent Electronic devices (IEDs) and eases interoperable operation with set data and message structures. An unwanted consequence of this standardized communication over ethernet is increased viability to cyber threats. The IEC 62351-6 standard stipulates the use of digital signatures for ensuring integrity in IEC 61850 message exchanges. However, the digital signatures result in higher computational times which makes it very difficult to use for Generic Object-Oriented Substation Events (GOOSE) messages. This short communication article proposes implementation of the Message Authentication Code (MAC) algorithms, such as Hash-based Message Authentication Code (HMAC) and Advanced Encryption Standard-Galois Message Authentication Code (AES-GMAC), for GOOSE message integrity. Lab tests are run to observe their timing performances and feasibility for GOOSE.
引用
收藏
页码:80980 / 80984
页数:5
相关论文
共 50 条
  • [1] An Area-Efficient Implementation of a Message Authentication Code (MAC) Algorithm for Cryptographic Systems
    Lan, Jingjing
    Zhou, Jun
    Liu, Xin
    [J]. PROCEEDINGS OF THE 2016 IEEE REGION 10 CONFERENCE (TENCON), 2016, : 1977 - 1979
  • [2] NMACA: A Novel Methodology for Message Authentication Code Algorithms
    Alghathbar, Khaled
    Hafez, Alaaeldin M.
    Bin Muhaya, Fahad
    Alla, Hanan A. Mahmoud Abd
    [J]. PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND INFORMATICS, 2009, : 206 - +
  • [3] The security of the cipher block chaining message authentication code
    Bellare, M
    Kilian, J
    Rogaway, P
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2000, 61 (03) : 362 - 399
  • [4] New message authentication code and its security proof
    Wang, Da-Yin
    Lin, Dong-Dai
    Wu, Wen-Ling
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2006, 34 (10): : 1812 - 1816
  • [5] Paillier Cryptography Based Message Authentication Code for IoMT Security
    Siamala Devi, S.
    Kuruba, Chandrakala
    Nam, Yunyoung
    Abouhawwash, Mohamed
    [J]. Computer Systems Science and Engineering, 2023, 44 (03): : 2209 - 2223
  • [6] Considering Security For ZigBee Protocol Using Message Authentication Code
    Kulkarni, Suhas
    Ghosh, Uttam
    Pasupuleti, Haribabu
    [J]. 2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [7] Fast Message Authentication Code for Multiple Messages with Provable Security
    Vosoughi, Aida
    Katti, Rajendra
    [J]. 2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [8] A parallelizable message authentication code
    State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    不详
    [J]. Ruan Jian Xue Bao, 2007, 7 (1756-1764):
  • [9] QR Code Authentication with Embedded Message Authentication Code
    Changsheng Chen
    [J]. Mobile Networks and Applications, 2017, 22 : 383 - 394
  • [10] White-Box Implementation of the KMAC Message Authentication Code
    Lu, Jiqiang
    Zhao, Zhigang
    Guo, Huaqun
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2019, 2019, 11879 : 248 - 270