Integration of Integrity Enforcing Technologies Into Embedded Control Devices: Experiences and Evaluation

Tobias Rauter, Andrea Holler, Johannes Iber, Michael Krisper, Christian Kreiner

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Security is a vital property of SCADA systems, especially in critical infrastructure. An important aspect is maintaining (sub-)system integrity in networks of embedded control devices. One technology that is used to achieve this is remote attestation. It is used to prove the integrity of one system (prover) to another (challenger). However, due to the complexity of the maintenance of reference measurement, it is seen as impractical in such constrained distributed systems. In this work, we show how recent advances such as privilege-based attestation enable an architecture that is more feasible to use. Based on real control systems used for hydro-electric power plants, we evaluate the impact of the proposed infrastructure on the device performance and discuss our experiences with the consequences of using such technologies for the production and development processes of such systems.
Original languageEnglish
Title of host publicationProceedings - 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing, PRDC 2017
PublisherIEEE Computer Society
Pages155-164
Number of pages10
ISBN (Electronic)9781509056514
ISBN (Print)978-1-5090-5653-8
DOIs
Publication statusPublished - 8 May 2017
Event22nd IEEE Pacific Rim International Symposium on Dependable Computing: PRDC 2017 - Christchurch, New Zealand
Duration: 22 Jan 201725 Jan 2017
Conference number: 22
http://prdc.dependability.org/PRDC2017/

Conference

Conference22nd IEEE Pacific Rim International Symposium on Dependable Computing
Abbreviated titlePRDC 2017
CountryNew Zealand
CityChristchurch
Period22/01/1725/01/17
Internet address

Keywords

  • Security
  • Remote Attestation
  • Embedded Control Systems
  • Trusted Computing Architecture
  • Overhead Evaluation

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Computer Science Applications
  • Hardware and Architecture
  • Software

Fields of Expertise

  • Information, Communication & Computing

Fingerprint Dive into the research topics of 'Integration of Integrity Enforcing Technologies Into Embedded Control Devices: Experiences and Evaluation'. Together they form a unique fingerprint.

Cite this