Skip to main content
Erschienen in: EURASIP Journal on Wireless Communications and Networking 1/2006

Open Access 01.12.2006 | Research Article

MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks

verfasst von: Yang Xiao, Hsiao-Hwa Chen, Bo Sun, Ruhai Wang, Sakshi Sethi

Erschienen in: EURASIP Journal on Wireless Communications and Networking | Ausgabe 1/2006

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
download
DOWNLOAD
print
DRUCKEN
insite
SUCHEN
loading …

Abstract

Sensor networks have many applications. However, with limited resources such as computation capability and memory, they are vulnerable to many kinds of attacks. The IEEE 802.15.4 specification defines medium access control (MAC) layer and physical layer for wireless sensor networks. In this paper, we propose a security overhead analysis for the MAC layer in the IEEE 802.15.4 wireless sensor networks. Furthermore, we survey security mechanisms defined in the specification including security objectives, security suites, security modes, encryption, authentication, and so forth. Then, security vulnerabilities and attacks are identified. Some security enhancements are proposed to improve security and to prevent these attacks such as same-nonce attack, denial-of-service attack, reply-protection attack, ACK attack, and so forth. Our results show that, for example, with 128-bit key length and 100 MIPS, encryption overhead is 10.28 https://static-content.springer.com/image/art%3A10.1155%2FWCN%2F2006%2F93830/MediaObjects/13638_2005_Article_1288_IEq1_HTML.gif s per block, and with 100 MIPS and 1500-byte payload, the encryption overhead is as high as 5782.5 https://static-content.springer.com/image/art%3A10.1155%2FWCN%2F2006%2F93830/MediaObjects/13638_2005_Article_1288_IEq2_HTML.gif s.
Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License ( https://​creativecommons.​org/​licenses/​by/​2.​0 ), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
download
DOWNLOAD
print
DRUCKEN
Literatur
1.
Zurück zum Zitat IEEE 802.15.4 : Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs). May 2003. IEEE 802.15.4 : Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs). May 2003.
3.
Zurück zum Zitat Howitt I, Gutierrez JA: IEEE 802.15.4 low rate—Wireless personal area network coexistence issues. Proceedings of IEEE Wireless Communications and Networking (WCNC '03), March 2003, New Orleans, La, USA 3: 1481-1486. Howitt I, Gutierrez JA: IEEE 802.15.4 low rate—Wireless personal area network coexistence issues. Proceedings of IEEE Wireless Communications and Networking (WCNC '03), March 2003, New Orleans, La, USA 3: 1481-1486.
4.
Zurück zum Zitat FIPS Publication 197 : Advanced Encryption Standard. U.S. DoC/NIST, 2001 FIPS Publication 197 : Advanced Encryption Standard. U.S. DoC/NIST, 2001
5.
Zurück zum Zitat FIPS Publication 46-3 : Data Encryption Standard (DES). U.S. DoC/NIST, October 1999 FIPS Publication 46-3 : Data Encryption Standard (DES). U.S. DoC/NIST, October 1999
6.
Zurück zum Zitat FIPS Publication 800-38C : Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. N U.S. DoC/NIST, May 2004 FIPS Publication 800-38C : Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. N U.S. DoC/NIST, May 2004
7.
Zurück zum Zitat Struik R: Security Resolutions 802.15.4. Doc. #: IEEE 802.15-04-0540-08. 2004 Struik R: Security Resolutions 802.15.4. Doc. #: IEEE 802.15-04-0540-08. 2004
8.
Zurück zum Zitat Sastry N, Wagner D: Security considerations for IEEE 802.15.4 networks. Proceedings of the ACM Workshop on Wireless Security (WiSe '04), October 2004, Philadelphia, Pa, USA 32-42. Sastry N, Wagner D: Security considerations for IEEE 802.15.4 networks. Proceedings of the ACM Workshop on Wireless Security (WiSe '04), October 2004, Philadelphia, Pa, USA 32-42.
9.
Zurück zum Zitat Xiao Y, Sethi S, Chen H-H, Sun B: Security services and enhancements in the IEEE 802.15.4 wireless sensor networks. Proceedings of IEEE Global Telecommunications Conference (GLOBECOM '05), November-December 2005, St. Louis, Mo, USA 3: Xiao Y, Sethi S, Chen H-H, Sun B: Security services and enhancements in the IEEE 802.15.4 wireless sensor networks. Proceedings of IEEE Global Telecommunications Conference (GLOBECOM '05), November-December 2005, St. Louis, Mo, USA 3:
10.
Zurück zum Zitat Struik R:Formal Specification of the CCM Mode of Operation. Doc. #: IEEE 15-04-0537-00-004b Struik R:Formal Specification of the CCM https://static-content.springer.com/image/art%3A10.1155%2FWCN%2F2006%2F93830/MediaObjects/13638_2005_Article_1288_IEq3_HTML.gif Mode of Operation. Doc. #: IEEE 15-04-0537-00-004b
11.
Zurück zum Zitat Granelli F, Boato G: A novel methodology for analysis of the computational complexity of block ciphers: Rijndael, Camellia and Shacal-2 compared. Proceedings of 3rd Conference one Security and Network Architectures (SAR '04), June 2004, La Londe, France Granelli F, Boato G: A novel methodology for analysis of the computational complexity of block ciphers: Rijndael, Camellia and Shacal-2 compared. Proceedings of 3rd Conference one Security and Network Architectures (SAR '04), June 2004, La Londe, France
Metadaten
Titel
MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks
verfasst von
Yang Xiao
Hsiao-Hwa Chen
Bo Sun
Ruhai Wang
Sakshi Sethi
Publikationsdatum
01.12.2006
Verlag
Springer International Publishing
DOI
https://doi.org/10.1155/WCN/2006/93830

Weitere Artikel der Ausgabe 1/2006

EURASIP Journal on Wireless Communications and Networking 1/2006 Zur Ausgabe

Premium Partner