The IEEE 802.15.4 standard is widely recognized as one of the most successful enabling technologies for short range low rate wireless communications. Although it provides all the details of both MAC and PHY layers of the protocol stack, the standard also explains specific methodologies to protect MAC packets through symmetric-key cryptography techniques under several security options. However, the orchestration of available security profiles and the management of key negotiation schemes is delegated to upper layers. In support of this feature, this work describes a standard compliant security framework aimed at proposing: (i) different kind of security architectures, (ii) an efficient mechanism for initializing a secure IEEE 802.15.4 domain, and (iii) a lightweight mechanism to negotiate link keys among devices. Experimental tests have been conducted to demonstrate the behavior of the proposed solution in real environments. Obtained results clearly show that the enabling of security features in constrained nodes requires additional computational efforts, which involve a not negligible growth of communication latencies. Such findings have to be carefully considered when designing and developing enhanced applications in future and secured Internet of Things (IoT) systems

On securing ieee 802.15.4 networks through a standard compliant framework / Sciancalepore, Savio; Piro, Giuseppe; Vogli, Elvis; Boggia, Gennaro; Grieco, Luigi Alfredo. - ELETTRONICO. - (2014). (Intervento presentato al convegno Euro Med Telco Conference: From Network Infrastructures to Network Fabric: Revolution at the Edges, EMTC 2014 tenutosi a Napoli, Italy nel November 12-15, 2014) [10.1109/EMTC.2014.6996650].

On securing ieee 802.15.4 networks through a standard compliant framework

Savio Sciancalepore;Giuseppe Piro;Elvis Vogli;Gennaro Boggia;Luigi Alfredo Grieco
2014-01-01

Abstract

The IEEE 802.15.4 standard is widely recognized as one of the most successful enabling technologies for short range low rate wireless communications. Although it provides all the details of both MAC and PHY layers of the protocol stack, the standard also explains specific methodologies to protect MAC packets through symmetric-key cryptography techniques under several security options. However, the orchestration of available security profiles and the management of key negotiation schemes is delegated to upper layers. In support of this feature, this work describes a standard compliant security framework aimed at proposing: (i) different kind of security architectures, (ii) an efficient mechanism for initializing a secure IEEE 802.15.4 domain, and (iii) a lightweight mechanism to negotiate link keys among devices. Experimental tests have been conducted to demonstrate the behavior of the proposed solution in real environments. Obtained results clearly show that the enabling of security features in constrained nodes requires additional computational efforts, which involve a not negligible growth of communication latencies. Such findings have to be carefully considered when designing and developing enhanced applications in future and secured Internet of Things (IoT) systems
2014
Euro Med Telco Conference: From Network Infrastructures to Network Fabric: Revolution at the Edges, EMTC 2014
978-8-8872-3720-7
On securing ieee 802.15.4 networks through a standard compliant framework / Sciancalepore, Savio; Piro, Giuseppe; Vogli, Elvis; Boggia, Gennaro; Grieco, Luigi Alfredo. - ELETTRONICO. - (2014). (Intervento presentato al convegno Euro Med Telco Conference: From Network Infrastructures to Network Fabric: Revolution at the Edges, EMTC 2014 tenutosi a Napoli, Italy nel November 12-15, 2014) [10.1109/EMTC.2014.6996650].
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11589/16358
Citazioni
  • Scopus 10
  • ???jsp.display-item.citation.isi??? ND
social impact