Critical Message Integrity Over A Shared Network
نویسندگان
چکیده
Cost and efficiency concerns can force distributed embedded systems to use a single network for both critical and non-critical messages. Such designs must protect against masquerading faults caused by defects in and failures of non-critical network processes. Cyclic Redundancy Codes (CRCs) offer protection against random bit errors caused by environmental interference and some hardware faults, but typically do not defend against most design defects. A way to protect against such arbitrary, non-malicious faults is to make critical messages cryptographically secure. An alternative to expensive, full-strength cryptographic security is the use of lightweight digital signatures based on CRCs for critical processes. Both symmetric and asymmetric key digital signatures based on CRCs form parts of the cost/performance tradeoff space to improve critical message integrity. cause one node or process to send a message that is incorrectly attributed to another node or process. A software defect masquerade fault occurs when a software defect causes one node or process to masquerade as another (Morris and Koopman, 2003). One example is a software defect that causes one process to send a message with the header identification field of a different process. Another example is a software defect that causes one node to send a message in another node’s time slot on a TDMA network. A software defect masquerade fault is not caused by transient anomalies such as random bit flips, but rather is the result of design defects (e.g., the software sends the message with the incorrect header x instead of the correct header y). Fault tolerance methods designed to catch random bit flips may not sufficiently detect software defect masquerade faults. This paper describes six successively more expensive levels of protection that can be used to guard against masquerade faults. Rather than limiting the analysis to malicious faults, the gradations presented recognize that many embedded systems have reasonable physical security. Therefore it is useful to have design options available that present tradeoff points between the strength of assurance against masquerading faults and the cost of providing that assurance.
منابع مشابه
An Improved Token-Based and Starvation Free Distributed Mutual Exclusion Algorithm
Distributed mutual exclusion is a fundamental problem of distributed systems that coordinates the access to critical shared resources. It concerns with how the various distributed processes access to the shared resources in a mutually exclusive manner. This paper presents fully distributed improved token based mutual exclusion algorithm for distributed system. In this algorithm, a process which...
متن کاملMass Media vs. the Mass of Media: A Study on the Human Nodes in a Social Network and their Chosen Messages
In Internet-based social networks, the nodes have the most pivotal role in the processes and outcomes of the networks. Whether they pay attention to a message in the network or ignore it defines the fate of the message. One message is shared and re-shared by millions of users and another is left forgotten. The current study tries to shed light on one aspect of the role of the users in a social ...
متن کاملA Fault Tolerance Analysis of Safety-Critical Embedded Systems
................................................................................................................................................................ 4 1. Software Defect Masquerade Faults in Distributed Embedded Systems ................................................... 5 1.1. What is Software Defect Masquerading? .......................................................................
متن کاملWEP Security Analysis and Enhancement Techniques
Wired Equivalent Privacy (WEP) is an IEEE 802.11 standard implemented to provide security to data transmitted on wireless networks. In this paper we enhance the WEP security by improving the authenticity, integrity and confidentiality mechanisms. WEP uses static 40 bit as pre-shared secret key for pseudo noise sequence generation. Our method uses dynamic key which keeps changing time to time de...
متن کاملIntegrtation of Encryption and Hash Function for Improved Message Authenticity
Hash function is an important tool for implementing data and information integrity. Presently there are many integrity techniques, that support hashing, but almost every technique faces one or other attack or any other security or performance related issue. The main problem is the possibility of creating forged hash value by intruder, which may be transferred with the changed message, and being...
متن کامل