DocumentCode :
3570901
Title :
Investigating the feasibility of LEAP+ in ZigBee specification
Author :
Rezaeirad, Mohammad ; Mazloom, Sahar ; Iqbal, Muhammad Aamir ; Perkins, Dmitri ; Bayoumi, Magdy
fYear :
2014
Firstpage :
406
Lastpage :
412
Abstract :
The ZigBee specification is an emerging wireless technology designed to address the specific needs of low-cost, low-power wireless sensor networks and is built upon the physical and medium access control layers defined in IEEE 802.15.4 standard for wireless personal area networks (WPANs). A key component for the wide-spread success and applicability of ZigBee-based networking solutions will be its ability to provide enhanced security mechanisms that can scale to hundreds of nodes. Currently, however, an area of concern is the ZigBee key management scheme, which uses a centralized approach that introduces well-known issues of limited scalability and a single point of vulnerability. Moreover, ZigBee key management uses a public key infrastructure. Due to these limitations, we suggest replacing ZigBee key management with a better candidate scheme that is decentralized, symmetric, and scalable while addressing security requirements. In this work, we investigate the feasibility of implementing Localized Encryption and Authentication Protocol (LEAP+), a distributed symmetric based key management. LEAP+ is designed to support multiple types of keys based on the message type that is being exchanged. In this paper, we first conduct a qualitative security analysis of LEAP+ and the current ZigBee key management scheme. Using the QualNet 5.0.2 simulator, we implement LEAP+ on the ZigBee platform for the very first time. Experimental results show that a distributed key management scheme such as LEAP+ provides improved security and offers good scalability.
Keywords :
Zigbee; access protocols; cryptographic protocols; telecommunication security; wireless sensor networks; IEEE 802.15.4 standard; LEAP+; QualNet 5.0.2 simulator; WPAN; ZigBee key management; ZigBee key management scheme; ZigBee platform; ZigBee specification; ZigBee-based networking; distributed symmetric based key management; localized encryption and authentication protocol; medium access control layers; physical access control layers; public key infrastructure; qualitative security analysis; wireless personal area networks; wireless sensor networks; wireless technology; Cryptography; Delay effects; Energy consumption; Protocols; Wireless sensor networks; Zigbee;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Reuse and Integration (IRI), 2014 IEEE 15th International Conference on
Type :
conf
DOI :
10.1109/IRI.2014.7051918
Filename :
7051918
Link To Document :
بازگشت