Skip to main content

Key Exchange in 802.15.4 Networks and Its Performance Implications

  • Conference paper
Mobile Ad-hoc and Sensor Networks (MSN 2006)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4325))

Included in the following conference series:

Abstract

The IEEE 802.15.4 specification is a recent low data rate wireless personal area network standard. While basic security services are provided for, there is a lack of more advanced techniques which are indispensable in modern personal area network applications. In addition, performance implications of those services are not known. In this paper, we describe a secure data exchange protocol based on the Zigbee specification and built on top of 802.15.4 link layer. This protocol includes a key exchange mechanism. Then, we evaluate the overhead of this scheme under different application scenarios. Initial results show the range of network and traffic parameters wherein the proposed scheme is feasible to use.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Standard for part 15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications for low rate wireless personal area networks (WPAN). IEEE Std. 802.15.4, IEEE (2003)

    Google Scholar 

  2. Stallings, W.: Cryptography and Network Security: Principles and Practice. Prentice Hall, Upper Saddle River (2003)

    Google Scholar 

  3. ZigBee specification (ZigBee document 053474r06, version 1.0). ZigBee Alliance (2004)

    Google Scholar 

  4. Sastry, N., Wagner, D.: Security considerations for IEEE 802.15.4 networks. In: WiSe 2004: Proceedings of the 2004 ACM workshop on Wireless security, pp. 32–42 (2004)

    Google Scholar 

  5. Bellare, M., Kilian, J., Rogaway, P.: The security of the cipher block chaining message authentication code. Computer and System Sciences 61, 362–399 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  6. Whiting, D., Housley, R., Ferguson, N.: Counter with cbc-mac (CCM) (2003), http://www.rfc-archive.org/getrfc.php?rfc=3610

  7. Menezes, A., Oorschot, P.V., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)

    MATH  Google Scholar 

  8. FIPS Pub 198, The Keyed-Hash Message Authentication Code (HMAC). Federal Information Processing Standards Publication 198, US Department of Commerce/N.I.S.T. (2002)

    Google Scholar 

  9. ANSI X9.63-2001, Public Key Cryptography for the Financial Services Industry- Key Agreement and Key Transport Using Elliptic Curve Cryptography. American Bankers Association (2001)

    Google Scholar 

  10. RSoft Design Inc.: Artifex v.4.4.2 (2003)

    Google Scholar 

  11. Shafi, S.: Performance of a beacon enabled IEEE 802.15.4-compliant network. Master’s thesis, Department of Computer Science, University of Manitoba, Winnipeg, Canada (2005)

    Google Scholar 

  12. Mišić, J., Shafi, S., Mišić, V.B.: Performance of a beacon enabled IEEE 802.15.4 cluster with downlink and uplink traffic. IEEE Transactions on Parallel and Distributed Systems 17, 1–16 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Khan, M., Amini, F., Mišić, J. (2006). Key Exchange in 802.15.4 Networks and Its Performance Implications. In: Cao, J., Stojmenovic, I., Jia, X., Das, S.K. (eds) Mobile Ad-hoc and Sensor Networks. MSN 2006. Lecture Notes in Computer Science, vol 4325. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11943952_42

Download citation

  • DOI: https://doi.org/10.1007/11943952_42

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-49932-9

  • Online ISBN: 978-3-540-49933-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics