The BiBa one-time signature and broadcast authentication protocol
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
A Practical Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-bit Microcomputer
PKC '98 Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
HORSE: An Extension of an r-Time Signature Scheme With Fast Signing and Verification
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Hi-index | 0.01 |
Efforts to reduce peak electrical demand has led to the introduction of demand response (DR) programs for residences. The RDS network is a strong candidate for delivering DR messages due to its low-cost nature and ubiquitous coverage. However, security concerns arise due to the wireless nature of the communication channel. We present evaluations of cryptographic methods that could be employed to offer source authentication over the RDS network. Simulations are used to determine the impact on the network performance by employing three digital signature protocols (BiBa, HORSE, and ECDSA). The simulation results show that, up to a distance of 90 km, all authentication schemes do not affect message reception by the receivers. ECDSA and HORSE outperform BiBa in terms of message reception beyond 90 km. ECDSA offers higher security than HORSE and BiBa but at the cost of increased computational complexity, in particular at the receivers. In addition, ECDSA has the highest bandwidth overhead.