Abstract
The IEEE 802.15.4 specification is a recent low data rate wireless personal area network standard. While basic security services are provided for, there is a lack of more advanced techniques which are indispensable in modern personal area network applications. In addition, performance implications of those services are not known. In this paper, we describe a secure data exchange protocol based on the Zigbee specification and built on top of 802.15.4 link layer. This protocol includes a key exchange mechanism. Then, we evaluate the overhead of this scheme under different application scenarios. Initial results show the range of network and traffic parameters wherein the proposed scheme is feasible to use.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Standard for part 15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications for low rate wireless personal area networks (WPAN). IEEE Std. 802.15.4, IEEE (2003)
Stallings, W.: Cryptography and Network Security: Principles and Practice. Prentice Hall, Upper Saddle River (2003)
ZigBee specification (ZigBee document 053474r06, version 1.0). ZigBee Alliance (2004)
Sastry, N., Wagner, D.: Security considerations for IEEE 802.15.4 networks. In: WiSe 2004: Proceedings of the 2004 ACM workshop on Wireless security, pp. 32–42 (2004)
Bellare, M., Kilian, J., Rogaway, P.: The security of the cipher block chaining message authentication code. Computer and System Sciences 61, 362–399 (2000)
Whiting, D., Housley, R., Ferguson, N.: Counter with cbc-mac (CCM) (2003), http://www.rfc-archive.org/getrfc.php?rfc=3610
Menezes, A., Oorschot, P.V., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
FIPS Pub 198, The Keyed-Hash Message Authentication Code (HMAC). Federal Information Processing Standards Publication 198, US Department of Commerce/N.I.S.T. (2002)
ANSI X9.63-2001, Public Key Cryptography for the Financial Services Industry- Key Agreement and Key Transport Using Elliptic Curve Cryptography. American Bankers Association (2001)
RSoft Design Inc.: Artifex v.4.4.2 (2003)
Shafi, S.: Performance of a beacon enabled IEEE 802.15.4-compliant network. Master’s thesis, Department of Computer Science, University of Manitoba, Winnipeg, Canada (2005)
Mišić, J., Shafi, S., Mišić, V.B.: Performance of a beacon enabled IEEE 802.15.4 cluster with downlink and uplink traffic. IEEE Transactions on Parallel and Distributed Systems 17, 1–16 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Khan, M., Amini, F., Mišić, J. (2006). Key Exchange in 802.15.4 Networks and Its Performance Implications. In: Cao, J., Stojmenovic, I., Jia, X., Das, S.K. (eds) Mobile Ad-hoc and Sensor Networks. MSN 2006. Lecture Notes in Computer Science, vol 4325. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11943952_42
Download citation
DOI: https://doi.org/10.1007/11943952_42
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-49932-9
Online ISBN: 978-3-540-49933-6
eBook Packages: Computer ScienceComputer Science (R0)