Security considerations for IEEE 802.15.4 networks
Proceedings of the 3rd ACM workshop on Wireless security
Security co-existence of wireless sensor networks and RFID for pervasive computing
Computer Communications
Fragmentation and AES encryption overhead in very high-speed wireless LANs
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
IEEE Transactions on Wireless Communications
An efficient design of security accelerator for IEEE 802.15.4 wireless sensor networks
CCNC'10 Proceedings of the 7th IEEE conference on Consumer communications and networking conference
Performance analysis of HIP diet exchange for WSN security establishment
Proceedings of the 7th ACM symposium on QoS and security for wireless and mobile networks
International Journal of Sensor Networks
Fine tuning the advanced encryption standard (AES)
Proceedings of the Fifth International Conference on Security of Information and Networks
Hi-index | 0.00 |
Sensor networks have many applications. However, with limited resources such as computation capability and memory, they are vulnerable to many kinds of attacks. The IEEE 802.15.4 specification defines medium access control (MAC) layer and physical layer for wireless sensor networks. In this paper, we propose a security overhead analysis for the MAC layer in the IEEE 802.15.4 wireless sensor networks. Furthermore, we survey security mechanisms defined in the specification including security objectives, security suites, security modes, encryption, authentication, and so forth. Then, security vulnerabilities and attacks are identified. Some security enhancements are proposed to improve security and to prevent these attacks such as same-nonce attack, denial-of-service attack, reply-protection attack, ACK attack, and so forth. Our results show that, for example, with 128-bit key length and 100 MIPS, encryption overhead is 10.28 µs per block, and with 100 MIPS and 1500-byte payload, the encryption overhead is as high as 5782.5 µs.