DocumentCode
1781287
Title
On securing IEEE 802.15.4 networks through a standard compliant framework
Author
Sciancalepore, Savio ; Piro, Giuseppe ; Vogli, Elvis ; Boggia, Gennaro ; Grieco, Luigi Alfredo
Author_Institution
Dept. of Electr. & Inf. Engineeering, Politec. di Bari, Bari, Italy
fYear
2014
fDate
12-15 Nov. 2014
Firstpage
1
Lastpage
6
Abstract
The IEEE 802.15.4 standard is widely recognized as one of the most successful enabling technologies for short range low rate wireless communications. Although it provides all the details of both MAC and PHY layers of the protocol stack, the standard also explains specific methodologies to protect MAC packets through symmetric-key cryptography techniques under several security options. However, the orchestration of available security profiles and the management of key negotiation schemes is delegated to upper layers. In support of this feature, this work describes a standard compliant security framework aimed at proposing: (i) different kind of security architectures, (ii) an efficient mechanism for initializing a secure IEEE 802.15.4 domain, and (iii) a lightweight mechanism to negotiate link keys among devices. Experimental tests have been conducted to demonstrate the behavior of the proposed solution in real environments. Obtained results clearly show that the enabling of security features in constrained nodes requires additional computational efforts, which involve a not negligible growth of communication latencies. Such findings have to be carefully considered when designing and developing enhanced applications in future and secured Internet of Things (IoT) systems.
Keywords
Internet of Things; access protocols; cryptographic protocols; telecommunication security; telecommunication standards; IEEE 802.15.4 networks; Internet of Things systems; MAC layers; MAC packets; PHY layers; communication latencies; key negotiation schemes; link keys; protocol stack; secure IEEE 802.15.4 domain; security architectures; security profiles; short range low rate wireless communications; standard compliant security framework; symmetric-key cryptography techniques; Authentication; Cryptography; IEEE 802.15 Standards; Lead; Message systems; Random access memory; IEEE 802.15.4; IoT; experimental evaluation; key negotiation; security;
fLanguage
English
Publisher
ieee
Conference_Titel
Euro Med Telco Conference (EMTC), 2014
Conference_Location
Naples
Print_ISBN
978-8-8872-3721-4
Type
conf
DOI
10.1109/EMTC.2014.6996650
Filename
6996650
Link To Document