Adaptive Message Authentication Protocol for Performance Improvement in ZigBee Wireless Sensor Network

ZigBee is used as a low power and low rate wireless sensor network. Many applications utilize it for data transfer. It provides some security options, including message authentication, message encryption and defense against replay attack. The security algorithms used in the ZigBee are run for each packet transfer when the security mode is on. This study tested the impact of message authentication over the network performance in terms of the throughput and data packet delivery ratio. The message authentication leads to performance degradation for the network. The blocks of the message are encrypted by using Advanced Encryption Standard (AES) algorithm for authenticating in CBC-MAC algorithm. The performance of the network is improved over the original state when AES algorithm is replaced by MKP-AES algorithm and DMAC algorithm is used to parallelize the authentication. MKP-AES is tested within two and three secret keys. The network is simulated using NS-2 to measure the performance improvement.

[1]  Myung J. Lee,et al.  A Comprehensive Performance Study of IEEE 802 . 15 . 4 , 2004 .

[2]  Tat Chee Wan,et al.  Performance evaluation of IEEE 802.15.4 wireless multi-hop networks: simulation and testbed approach , 2007, Int. J. Ad Hoc Ubiquitous Comput..

[3]  Gianluca Dini,et al.  On experimentally evaluating the impact of security on IEEE 802.15.4 networks , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).

[4]  Gaëtan Leurent,et al.  An Analysis of the XSL Algorithm , 2005, ASIACRYPT.

[5]  Thomas Peyrin,et al.  Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations , 2010, FSE.

[6]  Azizol Abdullah,et al.  AES and ECC Mixed for ZigBee Wireless Sensor Security , 2011 .

[7]  Faiza Charfi,et al.  Performance evaluation of beacon enabled IEEE 802.15.4 under NS2 , 2012, ArXiv.

[8]  Alex Biryukov,et al.  Related-Key Cryptanalysis of the Full AES-192 and AES-256 , 2009, ASIACRYPT.

[9]  Andrey Bogdanov,et al.  Biclique Cryptanalysis of the Full AES , 2011, ASIACRYPT.

[10]  D. Bernstein Understanding brute force , 2005 .

[11]  Sajal K. Das,et al.  Reliability and Energy-Efficiency in IEEE 802.15.4/ZigBee Sensor Networks: An Adaptive and Cross-Layer Approach , 2011, IEEE Journal on Selected Areas in Communications.

[12]  Azizol Abdullah,et al.  Randomness Improvement of AES using MKP , 2013 .

[13]  Azizol Abdullah,et al.  Authentication Time of IEEE 802.15.4 with Multiple-key Protocol Using Distributed Message Authentication Code Algorithm , 2012 .

[14]  Vincent Rijmen Practical-Titled Attack on AES-128 Using Chosen-Text Relations , 2010, IACR Cryptol. ePrint Arch..