Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(178.69KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Security Key Management Model for Low Rate Wireless Personal Area Networks
Anass RGHIOUI, Said BOUCHKAREN , Anass KHANNOUS, Mohammed BOUHORMA
Pages - 192 - 201     |    Revised - 10-09-2014     |    Published - 10-10-2014
Volume - 8   Issue - 5    |    Publication Date - September / October 2014  Table of Contents
MORE INFORMATION
KEYWORDS
LR-WPAN, Low Rate Wireless Personal Area Network, IEEE 802.15.4, Network Security, Key Management System.
ABSTRACT
IEEE 802.15.4-based devices networks known by the name of LR-WPAN (Low Rate Wireless Personal Area Network) are characterized by low computation, memory and storage space, and they do not possess an infrastructure. This makes them dynamic and easy to deploy, but in the other hand, this makes them very vulnerable to security issues, as they are low energy so they cant implement current security solutions, and they are deployed in non-secure environments that makes them susceptible to eavesdropping attacks. Most proposed solutions draw out the security of the bootstrapping and commissioning phases as the percentage of existing of an intruder in this time is very low. In this paper, we propose a security model for LR-WPANs based on symmetric cryptography, which takes into account securing the bootstrapping phase, with an analysis of the effectiveness of this proposal and the measures of its implementation.
CITED BY (0)  
1 Google Scholar
2 CiteSeerX
3 refSeek
4 TechRepublic
5 Scribd
6 slideshare
7 PdfSR
1 F. Chen, N. Wang, R. German, et F. Dressler, Performance Eval-uation of IEEE 802.15.4 LR- WPAN for Industrial Applications , in Fifth Annual Conference on Wireless on Demand Network Sys-tems and Services, 2008. WONS 2008, 2008, p. 89-96.
2 J. A. Gutierrez, M. Naeve, E. Callaway, M. Bourgeois, V. Mitter, et B. Heile, IEEE 802.15.4: a developing standard for low-power low-cost wireless personal area networks , IEEE Netw., vol. 15, no 5, p. 12-19, sept. 2001.
3 J. Zheng et M. J. Lee, Will IEEE 802.15.4 make ubiquitous net-working a reality?: a discussion on a potential low power, low bit rate standard , IEEE Commun. Mag., vol. 42, no 6, p. 140-146, juin 2004.
4 S. Tennina, M. Tiloca, J.-H. Hauer, M. Bouroche, M. Alves, A. Koubaa, P. Jurcik, N. Pereira, R. Severino, E. Tovar, G. Dini, and R. Daidone, Amendments to the IEEE 802.15.4 Protocol, in IEEE 802.15.4 and ZigBee as Enabling Technologies for Low-Power Wireless Systems with Quality-of-Service Constraints, Springer Berlin Heidelberg, 2013, pp. 85112.
5 T. Kennedy et R. Hunt, A Review of WPAN Security: Attacks and Prevention, in Proceedings of the International Conference on Mobile Technology, Applications, and Systems, New York, NY, USA, 2008, p. 56:156:8.
6 S. Ullah, M. Mohaisen, et M. A. Alnuem, A Review of IEEE 802.15.6 MAC, PHY, and Security Specifications , Int. J. Distrib. Sens. Netw., vol. 2013, avr. 2013.
7 Y. Wang, G. Attebury, et B. Ramamurthy, A Survey of Security Issues In Wireless Sensor Networks , CSE J. Artic., janv. 2006.
8 P. Boyle et T. Newe, Security Protocols for Use with Wireless Sensor Networks: A Survey of Security Architectures , in Third International Conference on Wireless and Mobile Communications, 2007. ICWMC 07, 2007, p. 54-54.
9 X. Chen, K. Makki, K. Yen, et N. Pissinou, Sensor network security: a survey , IEEE Commun. Surv. Tutor., vol. 11, no 2, p. 5273, Second 2009.
10 An Liu, Mihui Kim, Leonardo B. Oliveira, and Hailun Tan, Wireless Sensor Network Security, International Journal of Distribut-ed Sensor Networks, vol. 2013, Article ID 362385, 1 pages, 2013. doi:10.1155/2013/362385
11 R. Daidone, G. Dini, and G. Anastasi, On evaluating the performance impact of the IEEE 802.15.4 security sub-layer, Comput. Commun., vol. 47, pp. 6576, Jul. 2014.
12 K. Zhang, C. Wang, and C. Wang, “A secure routing protocol for cluster-based wireless sensor networks using group key management,” In Proc. 4th IEEE International conference on Wireless Communications, Networking and Mobile Computing (WiCOM’08), 2008, pp. 1– 5.
13 I. S. Gawdan, C. O. Chow, T. A. Zia, Q. I. Sarhan, “A Novel Secure Key Management for Hierarchical Wireless Sensor Networks,” In Proceeding of 2011 Third Conference on Computational Intelligence, Modeling and Simulation (CIMSiM), 2011 , pp. 312 - 316.
14 F. Kausar, A. Masood and S. Hussain. “An Authenticated Key Management Scheme for Hierarchical Wireless Sensor Networks,” In Advances in Communication Systems and Electrical Engineering, Lecture Notes in Electrical Engineering, Vol. 4, 2008, pp. 85-98.
15 Y. Cheng and D. Agrawal, “An improved key distribution mechanism for large-scale hierarchical wireless sensor networks,” Ad Hoc Networks (Elsevier), Vol. 5, No. 1, 2007, pp. 35–48.
16 T. Landstra, S. Jagannathan, and M. Zawodniok, “Energy-efficient hybrid key management protocol for wireless sensor networks," International Journal of Network Security, vol. 9, no. 2, pp. 121-134, Sep. 2009.
Mr. Anass RGHIOUI
Faculty of Science and Technology of Tangier - Morocco
anass.rghioui@gmail.com
Associate Professor Said BOUCHKAREN
Laboratory of Technology of Information and Communication - Morocco
Mr. Anass KHANNOUS
Laboratory of Informatics, Systems and Telecommunications - Morocco
Professor Mohammed BOUHORMA
Laboratory of Informatics, Systems and Telecommunications - Morocco