2014
DOI: 10.1016/j.comcom.2014.03.025
|View full text |Cite
|
Sign up to set email alerts
|

On evaluating the performance impact of the IEEE 802.15.4 security sub-layer

Abstract: Nowadays, wireless sensor networks (WSNs) are used in a wide range of application scenarios ranging from structural monitoring to health-care, from surveillance to industrial automation. Most of these applications require forms of secure communication. On the other hand, security has a cost in terms of reduced performance. In this paper we refer to the IEEE 802.15.4 standard and investigate the impact of the 802.15.4 security sub-layer on the WSN performance. Specifically, we analyze the impact that security m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 28 publications
0
7
0
Order By: Relevance
“…The performance of the 802.15.4 MAC protocol, both in BE mode and NBE mode, have been thoroughly investigated in the past [22][23] [24][25] [26][27] [28][29] [30] [31]. As a result, a number of limitations and deficiencies have been identified:  Unbounded Delay.…”
Section: Limitations Of 802154mentioning
confidence: 99%
See 1 more Smart Citation
“…The performance of the 802.15.4 MAC protocol, both in BE mode and NBE mode, have been thoroughly investigated in the past [22][23] [24][25] [26][27] [28][29] [30] [31]. As a result, a number of limitations and deficiencies have been identified:  Unbounded Delay.…”
Section: Limitations Of 802154mentioning
confidence: 99%
“…In fact, many products compliant to this standard are available today. Many studies have investigated the IEEE 802.15.4 performance in WSANs [22][23] [24][25] [26][27] [28][29] [30] [31]. These works highlighted that IEEE 802.15.4 has a number of limitations (such as low communication reliability and no protection against interferences/fading) that make it unsuitable for applications having stringent requirements in terms of latency, reliability, scalability or operating in harsh environments [32].…”
Section: Introductionmentioning
confidence: 99%
“…IEEE 802.15.4 defines the security requirements in the data link layer [11], and supports security techniques to protect the wireless communication from possible attack. These techniques assure the confidentiality, integrity, authenticity and replay protection on a per-frame basis [12]. IEEE 802.15.4 offers two operational modes: a beacon-enabled mode, and a non-beacon enabled mode [13].…”
Section: Ieee 802154 Security Specificationmentioning
confidence: 99%
“…However, the employed key length is 128 bits. An unsecured frame consists of three fields: a MAC header with 7 to 23 bytes, data payloads with 0 to 115 bytes, and Frame Check Sequences (FCS) with 2 bytes [12]. A secured frame has one more field named Auxiliary Security Header (ASH), with 5 to 14 bytes.…”
Section: Ieee 802154 Security Specificationmentioning
confidence: 99%
“…The block cipher used in this standard is the Advanced Encryption Standard (AES). The cost of security services implementation on control network latency is significant enough even with the use of hardware cryptography as it causes overhead of approximately 1.4 ms [9]. This security overhead can't be overlooked for networks with latency requirements not more than ten milliseconds.…”
Section: Introductionmentioning
confidence: 99%