Authenticated Lighting Control Using Named Data Networking
نویسندگان
چکیده
Introduction This report discusses the design and implementation of authenticated lighting control, as an example of actuation in Building Automation Systems (BAS) 1 , using Named Data Networking (NDN). It describes the application motivation and outlines preliminary designs for device bootstrapping, assigning permissions to applications, and authenticated control. Additionally, it reviews our testbed implementation, deployment and initial testing. The purpose of this document is to provide a brief overview of work-in-progress. The security approaches described here are treated in more detail in an upcoming paper created in collaboration with the NDN security group at UC Irvine (Burke et al., 2012).
منابع مشابه
Securing Instrumented Environments over Content-Centric Networking: the Case of Lighting Control
Instrumented environments, such as modern building automation systems (BAS), are becoming commonplace and are increasingly interconnected with (and sometimes by) enterprise networks and the Internet. Regardless of the underlying communication platform, secure control of devices in such environments is a challenging task. The current trend is to move from proprietary communication media and prot...
متن کاملAthena: A Configurable Validation Framework For NDN Applications
In Named Data Networking (NDN), data is bound with its name through its producer’s public key signature. Secure communication in NDN requires every piece of data to be authenticated. Leaving the data authentication to application developers is error-prone. It is more reasonable to ask application developer to select a pre-defined trust model, and have a security library to automatically set up ...
متن کاملReal-Time Streaming Data Delivery over Named Data Networking
Named Data Networking (NDN) is a proposed future Internet architecture that shifts the fundamental abstraction of the network from host-to-host communication to request-response for named, signed data–an information dissemination focused approach. This paper describes a general design for receiver-driven, real-time streaming data (RTSD) applications over the current NDN implementation that aims...
متن کاملPerformance evaluation of Tree and Mesh ZigBee Network Topologies used in Street Lighting Control Systems
The design of a high performance street lighting control system is an important issue. This paper focuses on an assessment of the performance of the ZigBee mesh and tree network topologies which, can be implemented in different street lighting control network configurations. The paper also presents the performance evaluation of three configurations in order to select the best candidate that can...
متن کاملAn improved authentication protocol for session initiation protocol using smart card
The authenticated key agreement protocol is an important security protocol for the session initiation protocol, which allows the and the server to authenticate each other and generate a shared session key for privacy, integrity, and non-repudiation in their communications. Recently, Zhang et al. proposed a new authenticated key agreement protocol for the session initiation protocol using smart ...
متن کامل