does not share any secret information with the tags,
and is only given a one-time authenticator. The reader
should not be able trace tagged objects of pallets
that where not inspected (privacy). For applications
with pallets having no more than 100 tagged items
this is possible by using RS erasure codes. Larger
pallets require a different approach, since for these
the memory-erasure tradeoff is excessive for passive
RFID tags.
The second application involves IEC 61850 com-
pliant industrial systems: we considered the GE Mul-
tilin HardFiber system. In this case resiliency can
only be established if the components of the system
function as intended. In particular, they should not
be compromised. To establish this, ICS testbeds are
used. Hardware testbeds are costly and risk being
damaged if the memory of tested components is cor-
rupted. Also, they cannot be used for onsite malware
analysis. On the other hand software testbeds can
only emulate small networks. For high-end metro-
scale applications a software based approach is pro-
posed (a proof of concept) that integrates simulated
physics and embedded virtualization.
ACKNOWLEDGEMENTS
This material is based in part upon work supported
by: (a) the National Science Foundation under Grant
Numbers CNS 1347113, DUE 1241525, 1027217and
DGE 1538850, (b) the NSA/DHS under grant BAA-
003-15 and (c) Spanish MINECO and FEDER under
project TEC2014-54110-R.
REFERENCES
Abadi, M., Budiu, M., Erlingsson,
´
U., and Ligatti, J.
(2009). Control-flow integrity principles, implemen-
tations, and applications. ACM Transactions on Infor-
mation and System Security (TISSEC), 13(1):4.
Redwood, W.O., Reynolds, J., and Burmester, M. (2016).
Soft ICS Testbeds: A Simulated Physics and Em-
bedded Virtualization Integration (SPAEVI) Method-
ology. In Rice, M. and Shenoi, S. editors, Critical
Infrastructure protection X, Springer.
Burmester, M. and Munilla, J. (2016). An Anonymous
RFID Grouping-Proof with Missing Tag Identifica-
tion. 10th IEEE International Conference on Radio-
Frequency Identification, 3-5 May, Orlando. U.S.A.
Beaver, D. (1989). Multiparty protocols tolerating half
faulty processors. In Brassard, G., editor, Advances
in Cryptology - CRYPTO ’89, 9th Annual Interna-
tional Cryptology Conference, Santa Barbara, Cali-
fornia, USA, August 20-24, 1989, Proceedings, vol-
ume 435 of Lecture Notes in Computer Science, pages
560–572. Springer.
Ben Mabrouk, N. and Couderc, P. (2015). EraRFID: Re-
liable RFID systems using erasure coding. In RFID,
2015 IEEE International Conference, pages 121–128.
Burmester, M., de Medeiros, B., and Motta, R. (2008).
Provably Secure Grouping-Proofs for RFID Tags. In
Grimaud, G. and Standaert, F.-X., editors, CARDIS,
volume 5189 of Lecture Notes in Computer Science,
pages 176–190. Springer.
Burmester, M., Magkos, E., and Chrissikopoulos, V. (2012).
Modeling Security in Cyber-Physical Systems. Inter-
national Journal of Critical Infrastructure Protection
(IJCIP), 5(3-4):118–126.
Burmester, M. and Munilla, J. (2013). Security and
Trends in Wireless Identification and Sensing Plat-
form Tags: Advancements in RFID, chapter RFID
Grouping-Proofs. IGI Global.
Canetti, R. (2001). Universally composable security: a
new paradigm for cryptographic protocols. Proceed-
ings, 42nd IEEE Symposium on In Foundations of
Computer Science, Foundations of Computer Science,
pages 136–145.
Chien, H.-Y., Yang, C.-C., Wu, T.-C., and Lee, C.-F. (2009).
Two rfid-based solutions to enhance inpatient medica-
tion safety. Journal of Medical Systems.
EPC-Global (2015). Radio-Frequency Identity Protocols,
Generation-2.V2. UHF RFID. Technical report.
Guidry, D., Burmester, M., Yuan, X., Liu, X., Jenkins, J.,
and Easton, S. (2012). Techniques for securing sub-
station automation systems. In 7th Int. Workshop on
Crit. Inform. Infrastr. Secur.(CRITIS).
Huang, H.-H. and Ku, C.-Y. (2008). A RFIDgrouping proof
protocol for medication safety of inpatient. Journal of
Medical Systems.
ICS-CERT (2015). Cyber Threat Source Descriptions. In-
dustrial Control Systems, Cyber Emergency Response
Team.
IEC61850 (2007). Parts 1-10, Power Utility Automation.
http://www.iec.ch/smartgrid/standards/.
IEC62351 (2015). Parts 1-8, Information Security for
Power System Control Operations. http://www.iec.ch/
smartgrid/standards/.
Juels, A. (2004). “Yoking-proofs” for RFID tags. In PER-
COMW ’04: Proceedings of the Second IEEE Annual
Conference on Pervasive Computing and Communi-
cations Workshops, pages 138–142, Washington, DC,
USA. IEEE Computer Society.
Juels, A. (2006). Generalized “yoking-proofs” for a group
of RFID tags. In MOBIQUITOUS 2006.
Kapoor, G. and Piramuthu, S. (2012). Single RFID Tag
Ownership Transfer Protocols. IEEE Transactions on
Systems, Man, and Cybernetics, Part C, 42(2):164–
173.
Langer, R. (2011). Cracking Stuxnet, a 21st-century cyber
weapon. Entertainment and Design.
Liu, H., Ning, H., Zhang, Y., He, D., Xiong, Q., and Yang,
L. T. (2013). Grouping-proofs-based authentication
protocol for distributed RFID systems. IEEE Trans.
Parallel Distrib. Syst., 24(7):1321–1330.