On securing IEEE 802.15.4 networks through a standard compliant framework

The IEEE 802.15.4 standard is widely recognized as one of the most successful enabling technologies for short range low rate wireless communications. Although it provides all the details of both MAC and PHY layers of the protocol stack, the standard also explains specific methodologies to protect MAC packets through symmetric-key cryptography techniques under several security options. However, the orchestration of available security profiles and the management of key negotiation schemes is delegated to upper layers. In support of this feature, this work describes a standard compliant security framework aimed at proposing: (i) different kind of security architectures, (ii) an efficient mechanism for initializing a secure IEEE 802.15.4 domain, and (iii) a lightweight mechanism to negotiate link keys among devices. Experimental tests have been conducted to demonstrate the behavior of the proposed solution in real environments. Obtained results clearly show that the enabling of security features in constrained nodes requires additional computational efforts, which involve a not negligible growth of communication latencies. Such findings have to be carefully considered when designing and developing enhanced applications in future and secured Internet of Things (IoT) systems.

[1]  Nicola Bui,et al.  Low power link layer security for IoT: Implementation and performance analysis , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[2]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[3]  Xinfang Zhang,et al.  Implementation and Time Performance Analysis of Security Suite in LR-WPAN 802.15.4 , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[4]  Rabia Riaz,et al.  Security analysis survey and framework design for IP connected LoWPANs , 2009, 2009 International Symposium on Autonomous Decentralized Systems.

[5]  Kevin Weekly,et al.  OpenWSN: a standards‐based low‐power wireless development environment , 2012, Trans. Emerg. Telecommun. Technol..

[6]  L. A. Grieco,et al.  Performance analysis of the RPL Routing Protocol , 2011, 2011 IEEE International Conference on Mechatronics.

[7]  Thiemo Voigt,et al.  Lithe: Lightweight Secure CoAP for the Internet of Things , 2013, IEEE Sensors Journal.

[8]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[9]  Giuseppe Piro,et al.  A standard compliant security framework for IEEE 802.15.4 networks , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[10]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[11]  W. Marsden I and J , 2012 .

[12]  Garth V. Crosby,et al.  Implementing IPsec in Wireless Sensor Networks , 2014, 2014 6th International Conference on New Technologies, Mobility and Security (NTMS).

[13]  Paul C. van Oorschot,et al.  Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..

[14]  Ki-Hyung Kim,et al.  IPv6 over Low Power WPAN Security Analysis , 2011 .

[15]  Olivier Hersent,et al.  The Internet of Things: Key Applications and Protocols , 2011 .

[16]  Gennaro Boggia,et al.  ROHC+: a new header compression scheme for TCP streams in 3G wireless systems , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).

[17]  Oscar Garcia-Morchon,et al.  Security Considerations in the IP-based Internet of Things , 2013 .

[18]  Donato Di Paola,et al.  IoT-aided robotics applications: Technological implications, target domains and open issues , 2014, Comput. Commun..

[19]  Gennaro Boggia,et al.  Standardized Protocol Stack for the Internet of (Important) Things , 2013, IEEE Communications Surveys & Tutorials.

[20]  Eric Rescorla,et al.  Datagram Transport Layer Security Version 1.2 , 2012, RFC.

[21]  Giuseppe Piro,et al.  Optimal and secure protocols in the IETF 6TiSCH communication stack , 2014, 2014 IEEE 23rd International Symposium on Industrial Electronics (ISIE).

[22]  Soma Bandyopadhyay,et al.  Auth-Lite: Lightweight M2MAuthentication reinforcing DTLS for CoAP , 2014, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS).

[23]  Ivan Martinovic,et al.  Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels - Design, Implementation, and Analysis , 2010, ArXiv.

[24]  Yongsuk Park,et al.  Security Architecture for IEEE 802.15.4-based Wireless Sensor Network , 2009, 2009 4th International Symposium on Wireless Pervasive Computing.

[25]  Tharam S. Dillon,et al.  A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[26]  Luca Veltri,et al.  Batch-based group key management with shared key derivation in the Internet of Things , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[27]  Esam A. A. A. Hagras,et al.  Energy efficient key management scheme based on elliptic curve signcryption for Wireless Sensor Networks , 2011, 2011 28th National Radio Science Conference (NRSC).

[28]  Michael Richardson security architecture for 6top: requirements and structure , 2014 .

[29]  Óscar García-Morchón,et al.  End-to-End Transport Security in the IP-Based Internet of Things , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).