Proceedings of the 3rd ACM Workshop on Wireless Security 2004
DOI: 10.1145/1023646.1023654
|View full text |Cite
|
Sign up to set email alerts
|

Security considerations for IEEE 802.15.4 networks

Abstract: The IEEE 802.15.4 specification outlines a new class of wireless radios and protocols targeted at low power devices, personal area networks, and sensor nodes. The specification includes a number of security provisions and options. In this paper, we highlight places where application designers and radio designers should exercise care when implementing and using 802.15.4 devices. Specifically, some of the 802.15.4 optional features actually reduce security, so we urge implementors to ignore those extensions. We … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
137
0

Year Published

2005
2005
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 249 publications
(137 citation statements)
references
References 9 publications
0
137
0
Order By: Relevance
“…The first version of the 802.15.4 specification was written in 2003 and had significant security flaws that are described extensively in [Sastry and Wagner 2004]. The most significant issues identified in [Sastry and Wagner 2004] were related to the use of AES-CTR mode that allowed an adversary to perform a DoS attack to effectively prevent a node from receiving packets.…”
Section: A36 Security Concerns Related To Ieee 802154mentioning
confidence: 99%
See 1 more Smart Citation
“…The first version of the 802.15.4 specification was written in 2003 and had significant security flaws that are described extensively in [Sastry and Wagner 2004]. The most significant issues identified in [Sastry and Wagner 2004] were related to the use of AES-CTR mode that allowed an adversary to perform a DoS attack to effectively prevent a node from receiving packets.…”
Section: A36 Security Concerns Related To Ieee 802154mentioning
confidence: 99%
“…The most significant issues identified in [Sastry and Wagner 2004] were related to the use of AES-CTR mode that allowed an adversary to perform a DoS attack to effectively prevent a node from receiving packets. There were also significant issues with the access control list table that controlled how a unit performed outbound encryption and inbound decryption.…”
Section: A36 Security Concerns Related To Ieee 802154mentioning
confidence: 99%
“…Device B sends a Message requesting an address for each of the modules connected 10 it. The first four are announced as switches (so the received address will be the one of the module they should contra I) and the other four as simple appliances, which will only answer to ON, OFF and ALL UNITS OFF commands.…”
Section: Adi0d In Switch By Marmitek [7)mentioning
confidence: 99%
“…Also, sinee security is a key coneem, speeially in wireless networks where physieal aeeess is very hard to forbid, data eneryption is a must [10]. The next logical step will be to bring the same eneryption tools ZigBee uses to Hybrid networks.…”
Section: Adi0d In Switch By Marmitek [7)mentioning
confidence: 99%
“…A proof-of-concept implementation is the TinySec [4] project. Hardware-based SKE is also provided in nodes with radio chips conforming to the 802.15.4 standard [3], although not all the security suites used by the standard are actually secure [5].…”
Section: Security Primitivesmentioning
confidence: 99%