DocumentCode :
1781287
Title :
On securing IEEE 802.15.4 networks through a standard compliant framework
Author :
Sciancalepore, Savio ; Piro, Giuseppe ; Vogli, Elvis ; Boggia, Gennaro ; Grieco, Luigi Alfredo
Author_Institution :
Dept. of Electr. & Inf. Engineeering, Politec. di Bari, Bari, Italy
fYear :
2014
fDate :
12-15 Nov. 2014
Firstpage :
1
Lastpage :
6
Abstract :
The IEEE 802.15.4 standard is widely recognized as one of the most successful enabling technologies for short range low rate wireless communications. Although it provides all the details of both MAC and PHY layers of the protocol stack, the standard also explains specific methodologies to protect MAC packets through symmetric-key cryptography techniques under several security options. However, the orchestration of available security profiles and the management of key negotiation schemes is delegated to upper layers. In support of this feature, this work describes a standard compliant security framework aimed at proposing: (i) different kind of security architectures, (ii) an efficient mechanism for initializing a secure IEEE 802.15.4 domain, and (iii) a lightweight mechanism to negotiate link keys among devices. Experimental tests have been conducted to demonstrate the behavior of the proposed solution in real environments. Obtained results clearly show that the enabling of security features in constrained nodes requires additional computational efforts, which involve a not negligible growth of communication latencies. Such findings have to be carefully considered when designing and developing enhanced applications in future and secured Internet of Things (IoT) systems.
Keywords :
Internet of Things; access protocols; cryptographic protocols; telecommunication security; telecommunication standards; IEEE 802.15.4 networks; Internet of Things systems; MAC layers; MAC packets; PHY layers; communication latencies; key negotiation schemes; link keys; protocol stack; secure IEEE 802.15.4 domain; security architectures; security profiles; short range low rate wireless communications; standard compliant security framework; symmetric-key cryptography techniques; Authentication; Cryptography; IEEE 802.15 Standards; Lead; Message systems; Random access memory; IEEE 802.15.4; IoT; experimental evaluation; key negotiation; security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Euro Med Telco Conference (EMTC), 2014
Conference_Location :
Naples
Print_ISBN :
978-8-8872-3721-4
Type :
conf
DOI :
10.1109/EMTC.2014.6996650
Filename :
6996650
Link To Document :
بازگشت