Authenticated Lighting Control Using Named Data Networking

  title={Authenticated Lighting Control Using Named Data Networking},
  author={Jeff Burke and Alex Horn and Alessandro Marianantoni},
Introduction This report discusses the design and implementation of authenticated lighting control, as an example of actuation in Building Automation Systems (BAS) 1 , using Named Data Networking (NDN). It describes the application motivation and outlines preliminary designs for device bootstrapping, assigning permissions to applications, and authenticated control. Additionally, it reviews our testbed implementation, deployment and initial testing. The purpose of this document is to provide a… CONTINUE READING
Highly Cited
This paper has 43 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 24 extracted citations

Security evaluation of a control system using Named Data Networking

2013 21st IEEE International Conference on Network Protocols (ICNP) • 2013
View 5 Excerpts
Highly Influenced

Data authentication for NDN using hash chains

2015 IEEE Symposium on Computers and Communication (ISCC) • 2015
View 1 Excerpt


Publications referenced by this paper.
Showing 1-5 of 5 references

Securing instrumented environments over content-centric networking: the case of lighting control and NDN

2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) • 2013
View 3 Excerpts

Oritz, A System for Managing Physical Data in Buildings

D. Culler
Technical Report No. UCB/EECS-2010-128, EECS Department, • 2010

SDSI - A Simple Distributed Security Infrastructure

R. L. Rivest, B. Lampson
Technical report, • 1996

Similar Papers

Loading similar papers…