Network Security Architecture for Demand Response/Sensor Networks

Author(s): Subrahmanyam, P. A.; Wagner, David; Mulligan, Deirdre; Jones, Erin; Shankar, Umesh; Lerner, Jack | Abstract: To explore the privacy and security concerns that arise in the context of advanced metering and demand response infrastructures and propose general options for addressing them.

[1]  David A. Wagner,et al.  Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.

[2]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[3]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[4]  J Quittner,et al.  Invasion of privacy. , 1997, Time.

[5]  Dawn Song,et al.  Key distribution techniques for sensor networks , 2004 .

[6]  J. Mitola,et al.  Cognitive radio for flexible mobile multimedia communications , 1999, 1999 IEEE International Workshop on Mobile Multimedia Communications (MoMuC'99) (Cat. No.99EX384).

[7]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[8]  David A. Wagner,et al.  Resilient aggregation in sensor networks , 2004, SASN '04.

[9]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[10]  Yuliang Zheng,et al.  Cryptographically resilient functions , 1997, IEEE Trans. Inf. Theory.

[11]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[12]  Mihir Bellare,et al.  Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..

[13]  Yih-Chun Hu Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .

[14]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[15]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[16]  Martina Zitterbart,et al.  Efficient Implementation of Elliptic Curve Cryptography for Wireless Sensor Networks , 2005 .

[17]  Silvio Micali,et al.  Probabilistic Encryption , 1984, J. Comput. Syst. Sci..