Abstract
During last years, IEEE 802.15.4 has been asserting itself as one of the most promising standards for Wireless Sensor Network. It includes a security sublayer, which provides a number of operations and procedures aimed at securing network communications. But providing security features and power consumption together face a trade-off. In spite of so many research works discussing IEEE 802.15.4 security service, so far not so many focus on their implementation and performance. This paper discusses some security aspects of IEEE 802.15.4, and presents a practical approach to secure point to point link between wireless sensor nodes in details, supporting all the security suites of the standard. The results demonstrated that our approach achieved significantly lower power consumption and higher performance in security.
Publisher
Trans Tech Publications, Ltd.
Reference10 articles.
1. IEEE 802. 15. 4-2006 standard on http: /standards. ieee. org.
2. G. Panic, T. Basmer, S. Henry, S. Peter, F. Vater, and K. Tittelbach-Helmrich: SOC Conference (SOCC), 2012 IEEE International, 2012, pp.213-217.
3. Y. Xiao, H. -H. Chen, B. Sun, R. Wang, and S. Sethi: EURASIP Journal on Wireless Communications and Networking, vol. 2006, (2006).
4. A. Dandalis, V. K. Prasanna, and J. D. Rolim: Cryptographic Hardware and Embedded Systems—CHES 2000, 2000, pp.125-140.
5. T. Ichikawa, T. Kasuya, and M. Matsui: AES Candidate Conference, 2000, pp.279-285.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Security architectures in wireless sensor network;International Journal of Information Technology;2018-02-12