Skip to main content
Log in

Performance of IEEE 802.15.4 Clusters with Power Management and Key Exchange

  • Regular Paper
  • Published:
Journal of Computer Science and Technology Aims and scope Submit manuscript

Abstract

The IEEE 802.15.4 specification is a recent low data rate wireless personal area network standard. While basic security services are provided for, there is a lack of more advanced techniques which are indispensable in modern personal area network applications. In addition, performance implications of those services are not known. In this paper, we describe a secure data exchange protocol based on the ZigBee specification and built on top of IEEE 802.15.4 link layer. This protocol includes a key exchange mechanism. We assume that all nodes are applying power management technique based on the constant event sensing reliability required by the coordinator. Power management generates random sleep times by every node which in average fairly distributes the sensing load among the nodes. Key exchange is initiated by a cluster coordinator after some given number of sensing packets have been received by the coordinator. We develop and integrate simulation model of the key exchange and power management technique into the cluster’s reliable sensing function. We evaluate the impact of security function and its periodicity on cluster performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Mišić J, Shafi S, Mišić V B. Performance of a beacon enabled IEEE 802.15.4 cluster with downlink and uplink traffic. IEEE Transactions on Parallel and Distributed Systems, April 2006, 17(4): 1–16.

    Article  Google Scholar 

  2. Standard for part 15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications for low rate wireless personal area networks (WPAN). IEEE Std 802.15.4, IEEE, New York, 2003.

  3. Stallings W. Cryptography and Network Security: Principles and Practice. Upper Saddle River: Prentice Hall, 2003.

    Google Scholar 

  4. ZigBee Specification. ZigBee Document 053474r06, Version 1.0. ZigBee Alliance. December 2004.

  5. Sastry N, Wagner D. Security considerations for IEEE 802.15.4 networks. In Proc. the 2004 ACM Workshop on Wireless Security (WiSe’04), 2004, pp.32–42.

  6. Bellare M, Kilian J, Rogaway P. The security of the cipher block chaining message authentication code. Computer and System Sciences, 2000, 61(3): 362–399.

    Article  MATH  MathSciNet  Google Scholar 

  7. Whiting D, Housley R, Ferguson N. Counter with cbc-mac (CCM). 2003, http://www.rfc-archive.org/ge-trfc.php?rfc=3610.

  8. Menezes A J, Van Oorschot P C, Vanstone S A. Handbook of Applied Cryptography. CRC Press, 1997.

  9. FIPS Pub 198. The keyed-hash message authentication code (HMAC). Federal Information Processing Standards Publication 198, US Department of Commerce/N.I.S.T., Springfield, Virginia, 2002.

  10. ANSI X9.63–2001. Public key cryptography for the financial services industry-key agreement and key transport using elliptic curve cryptography. American Bankers Association, 2001.

  11. Weichao Wang, Bharat Bhargava. Key distribution and up-date for secure inter-group multicast communication. In Proc the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN’05), New York: ACM Press, NY, USA, 2005, pp.43–52.

  12. X Brian Zhang, Simon S Lam, Dong-Young Lee, Y Richard Yang. Protocol design for scalable and reliable group rekeying. IEEE/ACM Trans. Netw., 2003, 11(6): 908–922.

    Article  Google Scholar 

  13. Ivan Stojmenović (ed.). Handbook of Sensor Networks: Algorithms and Architectures. New York: John Wiley & Sons, NY, 2005.

    Google Scholar 

  14. Sankarasubramaniam Yogesh. Akan Özgür B, Akyildiz Ian F. ESRT: Event-to-sink reliable transport in wireless sensor networks. In Proc. 4th ACM MobiHoc, Annapolis, MD, June 2003, pp.177–188.

  15. RSoft Design Inc. Artifex v.4.4.2, San Jose, CA, 2003.

  16. Shafi S. Performance of a beacon enabled IEEE 802.15.4-compliant network [Thesis]. Department of Computer Science, University of Manitoba, Winnipeg, Canada, 2005.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fereshteh Amini.

Additional information

This research is supported by NSERC Strategic under Grant No. STPGP–350489–07.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Amini, F., Khan, M., Mišić, J. et al. Performance of IEEE 802.15.4 Clusters with Power Management and Key Exchange. J. Comput. Sci. Technol. 23, 377–388 (2008). https://doi.org/10.1007/s11390-008-9140-0

Download citation

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11390-008-9140-0

Keywords

Navigation