Tightening Up Security In Low Power Deterministic Networks

The unprecedented pervasiveness of IoT systems is pushing this technology into increasingly stringent domains. Such application scenarios become even more challenging due to the demand for encompassing the interplay between safety and security. The IEEE 802.15.4 DSME MAC behavior aims at addressing such systems by providing additional deterministic, synchronous multi-channel access support. However, despite the several improvements over the previous versions of the protocol, the standard lacks a complete solution to secure communications. In this front, we propose the integration of TAKS, an hybrid cryptography scheme, over a standard DSME network. In this paper, we describe the system architecture for integrating TAKS into DSME with minimum impact to the standard, and we venture into analysing the overhead of having such security solution over application delay and throughput. After a performance analysis, we learn that it is possible to achieve a minor impact of 1% to 14% on top of the expected network delay, depending on the platform used, while still guaranteeing strong security support over the DSME network.

[1]  Fortunato Santucci,et al.  Pair-wise network topology authenticated hybrid cryptographic keys for Wireless Sensor Networks using vector algebra , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[2]  Gianluca Dini,et al.  On experimentally evaluating the impact of security on IEEE 802.15.4 networks , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).

[3]  Eduardo Tovar,et al.  IEEE 802.15.4e in a Nutshell: Survey and Performance Evaluation , 2018, IEEE Communications Surveys & Tutorials.

[4]  Thiemo Voigt,et al.  Lightweight IKEv2: A Key Management Solution for both Compressed IPsec and IEEE 802.15.4 Security , 2012 .

[5]  Ditdit Nugeraha Utama,et al.  Hybrid Cryptography on Wireless Sensor Network: A Systematic Literature Review , 2018, 2018 International Conference on Information Management and Technology (ICIMTech).

[6]  Eduardo Tovar,et al.  Worst-case bound analysis for the time-critical MAC behaviors of IEEE 802.15.4e , 2017, 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS).

[7]  Paulo S. L. M. Barreto,et al.  A survey on key management mechanisms for distributed Wireless Sensor Networks , 2010, Comput. Networks.

[8]  Yuanqing Xia,et al.  TDMA-Based IEEE 802.15.4 for Low-Latency Deterministic Control Applications , 2016, IEEE Transactions on Industrial Informatics.

[9]  Volker Turau,et al.  Towards an Open Source Implementation of the IEEE 802 . 15 . 4 DSME Link Layer , 2016 .

[10]  Eduardo Tovar,et al.  Symphony: routing aware scheduling for DSME networks , 2020, SIGBED.

[11]  Fortunato Santucci,et al.  WINSOME: A middleware platform for the provision of secure monitoring services over Wireless Sensor Networks , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[12]  Yang Xiao,et al.  Security services and enhancements in the IEEE 802.15.4 wireless sensor networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..