Wireless Personal Area Networks

Implementation Options of Key Retrieval Procedures for the IEEE 802.15.4 Wireless Personal Area Networks Security Subsystem

The paper aims at providing the technical investigation on implementation options for the key retrieval security procedures and consequent security subsystem architecture in the IEEE 802.15.4 compatible devices. Since the security procedures typically consume most processing capacity of IEEE 802.15.4 device, an efficient implementation of the security subsystem is essential. A brief functional overview of the key retrieval procedures has been provided. General investigations on key retrieval procedures implementation have been performed.

Security Architecture Technical investigation for IEEE 802.15.4 Low-Rate Wirelesspersonal Area Networks

The paper aims at providing the technical investigation on implementation options for the security subsystem architecture in the IEEE 802.15.4 compatible devices. Since the security procedures typically consume most processing capacity of IEEE 802.15.4 device, efficient implementation of the security subsystem is essential. A brief functional overview of the security procedures has been provided. General investigations on security procedures implementation have been performed.