A Practical Approach to Provide Security in IEEE 802.15.4 Wireless Sensor Network

Article Preview

Abstract:

During last years, IEEE 802.15.4 has been asserting itself as one of the most promising standards for Wireless Sensor Network. It includes a security sublayer, which provides a number of operations and procedures aimed at securing network communications. But providing security features and power consumption together face a trade-off. In spite of so many research works discussing IEEE 802.15.4 security service, so far not so many focus on their implementation and performance. This paper discusses some security aspects of IEEE 802.15.4, and presents a practical approach to secure point to point link between wireless sensor nodes in details, supporting all the security suites of the standard. The results demonstrated that our approach achieved significantly lower power consumption and higher performance in security.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

503-507

Citation:

Online since:

June 2014

Authors:

Export:

Price:

[1] IEEE 802. 15. 4-2006 standard on http: /standards. ieee. org.

Google Scholar

[2] G. Panic, T. Basmer, S. Henry, S. Peter, F. Vater, and K. Tittelbach-Helmrich: SOC Conference (SOCC), 2012 IEEE International, 2012, pp.213-217.

DOI: 10.1109/socc.2012.6398350

Google Scholar

[3] Y. Xiao, H. -H. Chen, B. Sun, R. Wang, and S. Sethi: EURASIP Journal on Wireless Communications and Networking, vol. 2006, (2006).

Google Scholar

[4] A. Dandalis, V. K. Prasanna, and J. D. Rolim: Cryptographic Hardware and Embedded Systems—CHES 2000, 2000, pp.125-140.

DOI: 10.1007/3-540-44499-8_9

Google Scholar

[5] T. Ichikawa, T. Kasuya, and M. Matsui: AES Candidate Conference, 2000, pp.279-285.

Google Scholar

[6] M. McLoone and J. V. McCanny: Cryptographic Hardware and Embedded Systems—CHES 2001, 2001, pp.65-76.

DOI: 10.1007/3-540-44709-1_7

Google Scholar

[7] M. McLoone and J. V. McCanny: Journal of VLSI signal processing systems for signal, image and video technology, vol. 34, pp.261-275, (2003).

DOI: 10.1023/a:1023252403567

Google Scholar

[8] P. Hamalainen, M. Hannikainen, and T. D. Hamalainen: Circuits and Systems, 2005. 48th Midwest Symposium on, 2005, pp.484-487 Vol. 1.

DOI: 10.1109/mwscas.2005.1594143

Google Scholar

[9] CC2520 Data Sheet on http: /www. ti. com.

Google Scholar

[10] AES proposal: Rijndael on http: /ftp. csci. csusb. edu/ykarant/courses/w2005/csci531/papers/ Rijndael. pdf.

Google Scholar