Analysis and Implementation of Message Authentication Code (MAC) Algorithms for GOOSE Message Security

被引:45
|
作者
Hussain, S. M. Suhail [1 ]
Farooq, Shaik Mullapathi [2 ]
Ustun, Taha Selim [1 ]
机构
[1] AIST FREA, Fukushima Renewable Energy Inst, Koriyama, Fukushima 9630215, Japan
[2] Yogi Vemana Univ, YSR Engn Coll, Dept Comp Sci & Engn, Kadapa 516360, Andhra Pradesh, India
来源
IEEE ACCESS | 2019年 / 7卷
关键词
IEC; 62351; 61850; generic object-oriented substation Events (GOOSE); cybersecurity; hash-based message authentication code (HMAC); advanced encryption standard-galois message authentication code (AES-GMAC);
D O I
10.1109/ACCESS.2019.2923728
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There is growing awareness towards cybersecurity threats in power systems. IEC 61850 standard facilitates communication between different Intelligent Electronic devices (IEDs) and eases interoperable operation with set data and message structures. An unwanted consequence of this standardized communication over ethernet is increased viability to cyber threats. The IEC 62351-6 standard stipulates the use of digital signatures for ensuring integrity in IEC 61850 message exchanges. However, the digital signatures result in higher computational times which makes it very difficult to use for Generic Object-Oriented Substation Events (GOOSE) messages. This short communication article proposes implementation of the Message Authentication Code (MAC) algorithms, such as Hash-based Message Authentication Code (HMAC) and Advanced Encryption Standard-Galois Message Authentication Code (AES-GMAC), for GOOSE message integrity. Lab tests are run to observe their timing performances and feasibility for GOOSE.
引用
收藏
页码:80980 / 80984
页数:5
相关论文
共 50 条
  • [31] A message authentication code based on unimodular matrix groups
    Cary, M
    Venkatesan, R
    ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 500 - 512
  • [32] Vectorization of Poly1305 Message Authentication Code
    Goll, Martin
    Gueron, Shay
    2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 145 - 150
  • [33] Cryptanalysis of a message authentication code due to Cary and Venkatesan
    Blackburn, SR
    Paterson, KG
    FAST SOFTWARE ENCRYPTION, 2004, 3017 : 446 - 453
  • [34] Benchmarking Message Authentication Code Functions for Mobile Computing
    Rashwan, A. M.
    Taha, A-E M.
    Hassanein, H. S.
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012,
  • [35] Message authentication code algorithm for IP-SEC
    Praba, V. Lakshmi
    Arumugam, G.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2010, 25 (05): : 335 - 341
  • [36] iMAC: Implicit Message Authentication Code for IoT Devices
    Ullah, Ikram
    Meratnia, Nirvana
    Havinga, Paul J. M.
    2020 IEEE 6TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2020,
  • [37] FPGA Implementation of Rapid PN Code Acquisition Using Iterative Message Passing Algorithms
    Wang, Wei
    Wang, Zhihua
    IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2014, 29 (06) : 13 - 23
  • [38] Novel hardware implementation for generating message authentication codes
    Michail, H.E.
    Kakarountas, A.P.
    Fotopoulou, E.
    Goutis, C.E.
    WSEAS Transactions on Communications, 2005, 4 (11): : 1276 - 1283
  • [39] The Poly1305-AES message-authentication code
    Bernstein, DJ
    FAST SOFTWARE ENCRYPTION, 2005, 3557 : 32 - 49
  • [40] The MARVIN message authentication code and the LETTERSOUP authenticated encryption scheme
    Simplicio, Marcos A., Jr.
    Barbuda, Pedro d'Aquino F. F. S.
    Barreto, Paulo S. L. M.
    Carvalho, Tereza C. M. B.
    Margi, Cintia B.
    SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (02) : 165 - 180