Abstract
The IEEE 802.15.4 specification is a recent low data rate wireless personal area network standard. While basic security services are provided for, there is a lack of more advanced techniques which are indispensable in modern personal area network applications. In addition, performance implications of those services are not known. In this paper, we describe a secure data exchange protocol based on the ZigBee specification and built on top of IEEE 802.15.4 link layer. This protocol includes a key exchange mechanism. We assume that all nodes are applying power management technique based on the constant event sensing reliability required by the coordinator. Power management generates random sleep times by every node which in average fairly distributes the sensing load among the nodes. Key exchange is initiated by a cluster coordinator after some given number of sensing packets have been received by the coordinator. We develop and integrate simulation model of the key exchange and power management technique into the cluster’s reliable sensing function. We evaluate the impact of security function and its periodicity on cluster performance.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Mišić J, Shafi S, Mišić V B. Performance of a beacon enabled IEEE 802.15.4 cluster with downlink and uplink traffic. IEEE Transactions on Parallel and Distributed Systems, April 2006, 17(4): 1–16.
Standard for part 15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications for low rate wireless personal area networks (WPAN). IEEE Std 802.15.4, IEEE, New York, 2003.
Stallings W. Cryptography and Network Security: Principles and Practice. Upper Saddle River: Prentice Hall, 2003.
ZigBee Specification. ZigBee Document 053474r06, Version 1.0. ZigBee Alliance. December 2004.
Sastry N, Wagner D. Security considerations for IEEE 802.15.4 networks. In Proc. the 2004 ACM Workshop on Wireless Security (WiSe’04), 2004, pp.32–42.
Bellare M, Kilian J, Rogaway P. The security of the cipher block chaining message authentication code. Computer and System Sciences, 2000, 61(3): 362–399.
Whiting D, Housley R, Ferguson N. Counter with cbc-mac (CCM). 2003, http://www.rfc-archive.org/ge-trfc.php?rfc=3610.
Menezes A J, Van Oorschot P C, Vanstone S A. Handbook of Applied Cryptography. CRC Press, 1997.
FIPS Pub 198. The keyed-hash message authentication code (HMAC). Federal Information Processing Standards Publication 198, US Department of Commerce/N.I.S.T., Springfield, Virginia, 2002.
ANSI X9.63–2001. Public key cryptography for the financial services industry-key agreement and key transport using elliptic curve cryptography. American Bankers Association, 2001.
Weichao Wang, Bharat Bhargava. Key distribution and up-date for secure inter-group multicast communication. In Proc the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN’05), New York: ACM Press, NY, USA, 2005, pp.43–52.
X Brian Zhang, Simon S Lam, Dong-Young Lee, Y Richard Yang. Protocol design for scalable and reliable group rekeying. IEEE/ACM Trans. Netw., 2003, 11(6): 908–922.
Ivan Stojmenović (ed.). Handbook of Sensor Networks: Algorithms and Architectures. New York: John Wiley & Sons, NY, 2005.
Sankarasubramaniam Yogesh. Akan Özgür B, Akyildiz Ian F. ESRT: Event-to-sink reliable transport in wireless sensor networks. In Proc. 4th ACM MobiHoc, Annapolis, MD, June 2003, pp.177–188.
RSoft Design Inc. Artifex v.4.4.2, San Jose, CA, 2003.
Shafi S. Performance of a beacon enabled IEEE 802.15.4-compliant network [Thesis]. Department of Computer Science, University of Manitoba, Winnipeg, Canada, 2005.
Author information
Authors and Affiliations
Corresponding author
Additional information
This research is supported by NSERC Strategic under Grant No. STPGP–350489–07.
About this article
Cite this article
Amini, F., Khan, M., Mišić, J. et al. Performance of IEEE 802.15.4 Clusters with Power Management and Key Exchange. J. Comput. Sci. Technol. 23, 377–388 (2008). https://doi.org/10.1007/s11390-008-9140-0
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11390-008-9140-0