Implementation Options of Key Retrieval Procedures for the IEEE 802.15.4 Wireless Personal Area Networks Security Subsystem

2019;
: pp. 42 - 54
Authors:
1
Lviv Polytechnic National University, Department of Information Technology Security

The paper aims at providing the technical investigation on implementation options for the key retrieval security procedures and consequent security subsystem architecture in the IEEE 802.15.4 compatible devices. Since the security procedures typically consume most processing capacity of IEEE 802.15.4 device, an efficient implementation of the security subsystem is essential. A brief functional overview of the key retrieval procedures has been provided. General investigations on key retrieval procedures implementation have been performed. Three general approaches for implementation of key retrieval procedures in the security subsystem have been considered: a) software implementation; b) hardware implementation; and c) hardware-software implementation. The aim is to determine optimum implementation approach corresponding to low-cost and low-power consumption requirements. An expediency of hardware and software implementation of the key retrieval procedures has been estimated.

[1] Melnyk A. Cyber-Physical Systems Multilayer Platform and Research Framework // Advances in cyber-physical systems. - 2016. - Vol. 1, Num. 1. - С. 1-6.
https://doi.org/10.23939/acps2016.01.001

[2] IEEE 802.11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. (2016 revision). IEEE-SA. 14 December 2016. doi:10.1109/IEEESTD.2016.7786995. ISBN 978-1-5044-3645-8.
https://doi.org/10.1109/IEEESTD.2016.7786995

[3] IEEE Std 802.15.4TM, IEEE Standard for Information technology-Telecommunications and information exchange between systems-Local and metropolitan area networks- Specific requirements-Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs). Second edition, September 2006.

[4] IEEE Std 802.15.4TM 2011, IEEE Standard for Local and metropolitan area networks-Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs). Revision of IEEE Std 802.15.4-2006, Approved 14 August 2012 by American National Standards Institute.

[5] Gascón, David (February 5, 2009). "Security in 802.15.4 and ZigBee networks". [Online]. Available: http://www.libelium.com/security-802-15-4-zigbee/ [Accessed: Nov. 25, 2018].

[6] "ISA100 Committee Home Page": https://www.isa.org/isa100/ [Accessed: Nov. 25, 2018]

[7] Federal Information Processing Standards (FIPS) Publication 197. Announcing the ADVANCED ENCRYPTION STANDARD (AES). November 26, 2001. Available at http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf [Accessed: Nov. 25, 2018]

[8] NIST Special Publication 800-38C. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. May 2004.

[9] Viktor Melnyk. Security Architecture Technical Investigation for IEEE 802.15.4 Low-Rate Wireless Personal Area Networks. Scientific-Technical Journal «Advances in Cyber-Physical Systems». Vol. 1, No. 2, 2018. - pp. 103 - 118
https://doi.org/10.23939/acps2018.02.092

[10] Sastry, N., and Wagner, D., "Security considerations for IEEE 802.15.4 networks", Proceedings of the 2004 ACM workshop on Wireless security. Philadelphia, PA, USA Pages: 32 - 42: 2004. Available at www.cs.berkeley.edu/~kwright/nest_papers/15.4-wise04.pdf [Accessed: Nov. 25, 2018]
https://doi.org/10.1145/1023646.1023654

[11] Security requirements for cryptographic modules. Federal information proceedings standard publication 140-2, 1999. - 50 p.