• DocumentCode
    1781287
  • Title

    On securing IEEE 802.15.4 networks through a standard compliant framework

  • Author

    Sciancalepore, Savio ; Piro, Giuseppe ; Vogli, Elvis ; Boggia, Gennaro ; Grieco, Luigi Alfredo

  • Author_Institution
    Dept. of Electr. & Inf. Engineeering, Politec. di Bari, Bari, Italy
  • fYear
    2014
  • fDate
    12-15 Nov. 2014
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    The IEEE 802.15.4 standard is widely recognized as one of the most successful enabling technologies for short range low rate wireless communications. Although it provides all the details of both MAC and PHY layers of the protocol stack, the standard also explains specific methodologies to protect MAC packets through symmetric-key cryptography techniques under several security options. However, the orchestration of available security profiles and the management of key negotiation schemes is delegated to upper layers. In support of this feature, this work describes a standard compliant security framework aimed at proposing: (i) different kind of security architectures, (ii) an efficient mechanism for initializing a secure IEEE 802.15.4 domain, and (iii) a lightweight mechanism to negotiate link keys among devices. Experimental tests have been conducted to demonstrate the behavior of the proposed solution in real environments. Obtained results clearly show that the enabling of security features in constrained nodes requires additional computational efforts, which involve a not negligible growth of communication latencies. Such findings have to be carefully considered when designing and developing enhanced applications in future and secured Internet of Things (IoT) systems.
  • Keywords
    Internet of Things; access protocols; cryptographic protocols; telecommunication security; telecommunication standards; IEEE 802.15.4 networks; Internet of Things systems; MAC layers; MAC packets; PHY layers; communication latencies; key negotiation schemes; link keys; protocol stack; secure IEEE 802.15.4 domain; security architectures; security profiles; short range low rate wireless communications; standard compliant security framework; symmetric-key cryptography techniques; Authentication; Cryptography; IEEE 802.15 Standards; Lead; Message systems; Random access memory; IEEE 802.15.4; IoT; experimental evaluation; key negotiation; security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Euro Med Telco Conference (EMTC), 2014
  • Conference_Location
    Naples
  • Print_ISBN
    978-8-8872-3721-4
  • Type

    conf

  • DOI
    10.1109/EMTC.2014.6996650
  • Filename
    6996650