The BiBa one-time signature and broadcast authentication protocol
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
A Practical Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-bit Microcomputer
PKC '98 Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
HORSE: An Extension of an r-Time Signature Scheme With Fast Signing and Verification
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Security analysis of a cryptographically-enabled RFID device
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
RF Fingerprints for Secure Authentication in Single-Hop WSN
WIMOB '08 Proceedings of the 2008 IEEE International Conference on Wireless & Mobile Computing, Networking & Communication
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Efforts to reduce peak electrical demand have led to the introduction of demand response (DR) programmes for residences. DR programmes allow customers to reduce or shift consumption to off-peak periods in response to price signals. The RDS network is a strong candidate for delivering DR messages due to its low-cost nature and ubiquitous coverage. However, security concerns arise due to the wireless nature of the communication channel. We present evaluations of three candidate cryptographic methods that could be employed to offer source authentication over the RDS network: BiBa, HORSE and elliptic curve digital signature algorithm (ECDSA). We compare the security offered by the protocols, the bandwidth overhead, computational costs and message reception probability. Simulation results show that, up to a distance of 90 km, all authentication schemes do not affect message reception by the receivers. Beyond that, all the schemes have an effect on message reception due to increased message sizes and receiver bootstrapping for BiBa and HORSE. ECDSA and HORSE outperform BiBa in terms of message reception beyond 90 km. ECDSA, however, offers higher security than HORSE and BiBa but at the cost of increased computational complexity, in particular, at the receivers. In addition, has the highest bandwidth overhead.