The security of the cipher block chaining message authentication code
Journal of Computer and System Sciences
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Protocol design for scalable and reliable group rekeying
IEEE/ACM Transactions on Networking (TON)
Security considerations for IEEE 802.15.4 networks
Proceedings of the 3rd ACM workshop on Wireless security
A Minimum Cost Heterogeneous Sensor Network with a Lifetime Constraint
IEEE Transactions on Mobile Computing
Key distribution and update for secure inter-group multicast communication
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Performance of a Beacon Enabled IEEE 802.15.4 Cluster with Downlink and Uplink Traffic
IEEE Transactions on Parallel and Distributed Systems
SUTC '06 Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing - Vol 2 - Workshops - Volume 02
A survey of communication/networking in Smart Grids
Future Generation Computer Systems
Hi-index | 0.00 |
In this paper, we describe and evaluate a secure data exchange protocol based on the Zigbee specification and built on top of 802.15.4 beacon enabled link layer. This protocol includes a key exchange mechanism and addition of Message Authenication Code to each packet. We have simulated key exchange protocol over physical and data link layers in IEEE 802.15.4 beacon enabled cluster. Since key distribution protocol requires downlink data transmissions which have complex implementation, its communication cost is high. Our results indicate that even for small cluster size, frequent key exchanges impose a serious performance burden on the data traffic. Therefore, the period for key exchanges (i.e. the degree of security protection) has to be traded for the cluster size and throughput.