DocumentCode :
187971
Title :
Security analysis of IEEE 802.15.4 MAC in the context of Internet of Things (IoT)
Author :
Sajjad, Syed Muhammad ; Yousaf, Muhammad
Author_Institution :
Riphah Inst. of Syst. Eng., Riphah Int. Univ., Islamabad, Pakistan
fYear :
2014
fDate :
12-13 June 2014
Firstpage :
9
Lastpage :
14
Abstract :
A paradigm in which household substances around us with embedded computational competences and capable of producing and distributing information is referred to as Internet of Things (IoT). IEEE 802.15.4 presents power efficient MAC layer for Internet of Things (IoT). For the preservation of privacy and security, Internet of Things (IoT) needs stern security mechanism so as to stop mischievous communication inside the IoT structure. For this purpose security weaknesses of the MAC protocol of IEEE 802.15.4 and their most important attacks have to be examined. Also security charter of IEEE 802.15.4 is to be analyzed in order to ascertain their limitations with regard to Internet of Things (IoT). Various ranges of attacks taking place in the Contention Free Period (CFP) in addition to Contention Access Period (CAP) of the super-frame structure needs to be explored and discussed. In view of the shortlisted weaknesses we would be arriving at the conclusion that the IEEE 802.15.4 security charter may be harmonized in accordance with the requirements of the Internet of Things. The missing functionalities may be incorporated in the upper layers of Internet of Things (IoT) Architecture.
Keywords :
Internet of Things; Zigbee; access protocols; computer network security; CAP; CFP; IEEE 802.15.4 MAC protocol; IEEE 802.15.4 security charter; Internet of Things; IoT; contention access period; contention free period; security mechanism; IEEE 802.15 Standards; Internet of Things; Payloads; Protocols; Radiation detectors; Security; Synchronization; IEEE 802.15.4; Internet of Things; IoT IETF Standardization; IoT Protocol Stack; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Assurance and Cyber Security (CIACS), 2014 Conference on
Conference_Location :
Rawalpindi
Print_ISBN :
978-1-4799-5851-1
Type :
conf
DOI :
10.1109/CIACS.2014.6861324
Filename :
6861324
Link To Document :
بازگشت