<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="6.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Goncalo Martins</style></author><author><style face="normal" font="default" size="100%">Anirban Bhattacharjee</style></author><author><style face="normal" font="default" size="100%">Dubey, Abhishek</style></author><author><style face="normal" font="default" size="100%">Xenofon D. Koutsoukos</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Performance Evaluation of an Authentication Mechanism in Time-Triggered Networked Control Systems</style></title><secondary-title><style face="normal" font="default" size="100%">2nd International Symposium on Resilient Cyber Systems (ISRCS 2014)</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">FORCES</style></keyword><keyword><style  face="normal" font="default" size="100%">HMAC</style></keyword><keyword><style  face="normal" font="default" size="100%">Performance Evaluation</style></keyword><keyword><style  face="normal" font="default" size="100%">Secure Messages</style></keyword><keyword><style  face="normal" font="default" size="100%">Time-Trigger Architectures</style></keyword><keyword><style  face="normal" font="default" size="100%">TTEthernet</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">08/2014</style></date></pub-dates></dates><urls><related-urls><url><style face="normal" font="default" size="100%">https://archive.isis.vanderbilt.edu/sites/default/files/Performance Evaluation of an Authentication Mechanism in Time-Triggered Networked Control Systems.pdf</style></url></related-urls></urls><pub-location><style face="normal" font="default" size="100%">Denver</style></pub-location><abstract><style face="normal" font="default" size="100%">An important challenge in networked control systems is to ensure the confidentiality and integrity of the message in order to secure the communication and prevent attackers or intruders from compromising the system. However, security mechanisms may jeopardize the temporal behavior of the network data communication because of the computation and communication overhead. In this paper, we study the effect of adding Hash Based Message Authentication (HMAC) to a time-triggered networked control system. Time Triggered Architectures (TTAs) provide a deterministic and predictable timing behavior that is used to ensure safety, reliability and fault tolerance properties. The paper analyzes the computation and communication overhead of adding HMAC and the impact on the performance of the time-triggered network. Experimental validation and performance evaluation results using a TTEthernet network are also presented.</style></abstract></record></records></xml>