Skip to main content

KEDS: Decentralised Network Security for the Smart Home Environment

  • Conference paper
  • First Online:
  • 1265 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8448))

Abstract

The increasingly wide deployment of smart grid technologies in the home has resulted in home automation networks becoming multi-stakeholder, with the number of stakeholders increasing over time.

However, the technologies underpinning these networks universally feature a heavily centralised security model, with policy data held on privileged machines that are both security- and availability-critical. On a multi-stakeholder network, no single stakeholder can be trusted with the authority to operate such privileged machines.

This paper presents a novel network architecture for multi-stakeholder networking. It also proposes a set of modifications to ZigBee, an emerging industry standard in the smart grid domain, that would cause it to conform to this architecture. These are used as the basis for an example application: the smart home.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Paverd, A.: Trustworthy remote entities in the smart grid. In: Proceedings of the ACM Symposium On Applied Computing (SAC) Student Research Competition, pp. 9–10 (2013)

    Google Scholar 

  2. National Institute of Standards and Technology (NIST). NIST special publication 1108R2: NIST framework and roadmap for smart grid interoperability standards, release 2.0. Technical report (2012)

    Google Scholar 

  3. IEEE: Standard for Local and metropolitan area networks, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Std 802.11-2012

    Google Scholar 

  4. Alliance, Z.: ZigBee Specification (2008)

    Google Scholar 

  5. Gregori, E., Improta, A., Lenzini, L., Rossi, L., Sani, L.: BGP and inter-AS economic relationships. In: Domingo-Pascual, J., Manzoni, P., Palazzo, S., Pont, A., Scoglio, C. (eds.) NETWORKING 2011, Part II. LNCS, vol. 6641, pp. 54–67. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  6. Butler, K., Farley, T., McDaniel, P., Rexford, J.: A survey of BGP security issues and solutions. Proc. IEEE 98(1), 100–122 (2010)

    Article  Google Scholar 

  7. Gohari, A.A., Pakbaz, R., Melliar-Smith, P.M., Moser, L.E., Rodoplu, V.: RMR: reliability map routing for tactical mobile ad hoc networks. IEEE J. Sel. Areas Commun. 29(10), 1935–1947 (2011)

    Article  Google Scholar 

  8. Gibson, T.: An architecture for flexible multi-security domain networks. In: Proceedings of the Network and Distributed Systems Security Symposium, San Diego, February 2001

    Google Scholar 

  9. Schumacher, H.J.J., Ghosh, S., Lee, T.S.: Top secret traffic and the public ATM network infrastructure. Inf. Syst. Secur. 7(4), 27–45 (1999)

    Article  Google Scholar 

  10. Mason, A.R.: Exploring of wireless technology to provide information sharing among military, United Nations and civilian organizations during complex humanitarian emergencies and peacekeeping operations. Master’s thesis, Naval Postgraduate School, March 2003

    Google Scholar 

  11. Hughes, B., Sharpe, T.: NATO Tacoms. In: MILCOM, IEEE, pp. 1–7 (2006)

    Google Scholar 

  12. Wentz, L.: An ICT primer: Information and communication technologies for civil-military coordination in disaster relief and stabilization and reconstruction. Technical report, National Defense University Center for Technology and National Security Policy, Washington, DC, USA (2006)

    Google Scholar 

  13. IEEE: Standard for Local and metropolitan area networks, Part 15.4: Low-Rate Wireless Personal Area Networks. IEEE Std 802.15.4-2011

    Google Scholar 

  14. Alliance, Z.: ZigBee Smart Energy Profile Specification (2011)

    Google Scholar 

  15. Gupta, V., Millard, M., Fung, S., Gura, N., Eberle, H.: Sizzle: a standards-based end-to-end security architecture for the embedded Internet. In: IEEE International Conference on Pervasive Computing and Communications, pp. 247–256 (2005)

    Google Scholar 

  16. Perrig, A., Song, D., Canetti, R., Tygar, J.D., Briscoe, B.: Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction. RFC 4082 (Informational), June 2005

    Google Scholar 

  17. Welch, V., Foster, I., Kesselman, C., Mulmo, O., Pearlman, L., Gawor, J., Meder, S., Siebenlist, F.: X.509 proxy certificates for dynamic delegation. In: Proceedings of the 3rd Annual PKI R&D Workshop (2004)

    Google Scholar 

  18. Lee, J., Leung, V., Wong, K., Chan, H.: Key management issues in wireless sensor networks: current proposals and future developments. IEEE Wirel. Commun. Mag. 14(5), 76–84 (2007)

    Article  Google Scholar 

  19. Hartenstein, H., Laberteaux, K.: A tutorial survey on vehicular ad hoc networks. IEEE Commun. Mag. 46(6), 164–171 (2008)

    Article  Google Scholar 

  20. Li, F., Mittal, P., Caesar, M., Borisov, N.: SybilControl. In: Proceedings of the 7th ACM Workshop on Scalable Trusted Computing, pp. 67–78, October 2012

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Justin King-Lacroix .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

King-Lacroix, J., Martin, A. (2014). KEDS: Decentralised Network Security for the Smart Home Environment. In: Cuellar, J. (eds) Smart Grid Security. SmartGridSec 2014. Lecture Notes in Computer Science(), vol 8448. Springer, Cham. https://doi.org/10.1007/978-3-319-10329-7_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-10329-7_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-10328-0

  • Online ISBN: 978-3-319-10329-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics