The security of the cipher block chaining message authentication code
Journal of Computer and System Sciences
Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Wireless sensor networks for habitat monitoring
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
CARDIS '98 Proceedings of the The International Conference on Smart Card Research and Applications
A Concrete Security Treatment of Symmetric Encryption
FOCS '97 Proceedings of the 38th Annual Symposium on Foundations of Computer Science
Problem areas for the IP security protocols
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Toward Secure Low Rate Wireless Personal Area Networks
IEEE Transactions on Mobile Computing
IEEE Transactions on Mobile Computing
AMSecure: secure link-layer communication in TinyOS for IEEE 802.15.4-based wireless sensor networks
Proceedings of the 4th international conference on Embedded networked sensor systems
MAC security and security overhead analysis in the IEEE 802.15.4 wireless sensor networks
EURASIP Journal on Wireless Communications and Networking
Mobile Networks and Applications
International Journal of Sensor Networks
A lightweight encryption and authentication scheme for wireless sensor networks
International Journal of Security and Networks
IP is dead, long live IP for wireless sensor networks
Proceedings of the 6th ACM conference on Embedded network sensor systems
Asynchronous group key distribution on top of the cc2420 security mechanisms for sensor networks
Proceedings of the second ACM conference on Wireless network security
Towards Security Issues in ZigBee Architecture
Proceedings of the Symposium on Human Interface 2009 on ConferenceUniversal Access in Human-Computer Interaction. Part I: Held as Part of HCI International 2009
Two-factor user authentication in wireless sensor networks
IEEE Transactions on Wireless Communications
Security architecture for IEEE 802.15.4-based wireless sensor network
ISWPC'09 Proceedings of the 4th international conference on Wireless pervasive computing
Practical Broadcast Authentication Using Short-Lived Signatures in WSNs
Information Security Applications
Security assessments of IEEE 802.15.4 standard based on X.805 framework
International Journal of Security and Networks
Security and packets delivery trade-off for WSN
CCNC'10 Proceedings of the 7th IEEE conference on Consumer communications and networking conference
A secure and robust connectivity architecture for smart devices and applications
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
An identity authentication protocol for acknowledgment in IEEE 802.15.4 network
NPC'05 Proceedings of the 2005 IFIP international conference on Network and Parallel Computing
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
On the security of wireless sensor networks
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
Security and Communication Networks
A novel secure key paring protocol for RF4CE ubiquitous smart home systems
Personal and Ubiquitous Computing
Hi-index | 0.00 |
The IEEE 802.15.4 specification outlines a new class of wireless radios and protocols targeted at low power devices, personal area networks, and sensor nodes. The specification includes a number of security provisions and options. In this paper, we highlight places where application designers and radio designers should exercise care when implementing and using 802.15.4 devices. Specifically, some of the 802.15.4 optional features actually reduce security, so we urge implementors to ignore those extensions. We highlight difficulties in safely using the security API and provide recommendations on how to change the specification to make it less likely that people will deploy devices with poor security configurations.