skip to main content
10.1145/1023646.1023654acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

Security considerations for IEEE 802.15.4 networks

Published:01 October 2004Publication History

ABSTRACT

The IEEE 802.15.4 specification outlines a new class of wireless radios and protocols targeted at low power devices, personal area networks, and sensor nodes. The specification includes a number of security provisions and options. In this paper, we highlight places where application designers and radio designers should exercise care when implementing and using 802.15.4 devices. Specifically, some of the 802.15.4 optional features actually reduce security, so we urge implementors to ignore those extensions. We highlight difficulties in safely using the security API and provide recommendations on how to change the specification to make it less likely that people will deploy devices with poor security configurations.

References

  1. Zigbee alliance. http://www.zigbee.org.]]Google ScholarGoogle Scholar
  2. Weak crc allows packet injection into ssh sessions encrypted with block ciphers. Computer Emergency Response Team (CERT), June 1998. VU 13877.]]Google ScholarGoogle Scholar
  3. Smart buildings admit their faults. Lab Notes: Research from the College of Engineering, UC Berkeley, http://www.coe.berkeley.edu/labnotes/1101smartbuildings.html, November 2001.]]Google ScholarGoogle Scholar
  4. Weak crc allows last block of idea-encrypted ssh packet to be changed without notice. Computer Emergency Response Team (CERT), January 2001. VU 315308.]]Google ScholarGoogle Scholar
  5. Weak crc allows rc4 encrypted ssh1 packets to be modified without notice. Computer Emergency Response Team (CERT), January 2001. VU 25309.]]Google ScholarGoogle Scholar
  6. Wireless medium access control and physical layer specifications for low-rate wireless personal area networks. IEEE Standard, 802.15.4-2003, May 2003. ISBN 0-7381-3677-5.]]Google ScholarGoogle Scholar
  7. Atmel at86rf210 z-link transceiver data sheet. http://www.atmel.com/dyn/resources/prod_documents/doc5033.pdf, 2004.]]Google ScholarGoogle Scholar
  8. Chipcon cc2420 data sheet. http://www.chipcon.com/files/CC2420_Data_Sheet_1_1.pdf, 2004.]]Google ScholarGoogle Scholar
  9. Motorola mc13192 datasheet. http://e-www.motorola.com/files/rf_if/doc/data_sheet/MC13192DS.pdf, 2004.]]Google ScholarGoogle Scholar
  10. M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation. In Proceedings of 38th Annual Symposium on Foundations of Computer Science (FOCS 97), 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Mihir Bellare, Joe Kilian, and Phillip Rogaway. The Security of the Cipher Block Chaining Message Authentication Code. Journal of Computer and System Sciences, 61(3):362--399, December 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Steven M. Bellovin. Problem areas for the IP security protocols. In Proceedings of the Sixth Usenix UNIX Security Symposium, 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Nikita Borisov, Ian Goldberg, and David Wagner. Intercepting mobile communications: The insecurity of 802.11. In MOBICOM, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. G.L. Duckworth, D.C. Gilbert, and J.E. Barger. Acoustic counter-sniper system. In SPIE International Symposium on Enabling Technologies for Law Enforcement and Security.]]Google ScholarGoogle Scholar
  15. V. Rijmen J. Daemen. The Block Cipher Rijndael. In J.-J. Quisquater and B. Schneier, editors, Smart Card Research and Applications, LNCS 1820, pages 288--296. Springer-Verlag, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Alan Mainwaring, Joseph Polastre, Robert Szewczyk, and David Culler. Wireless sensor networks for habitat monitoring. In First ACM International Workshop on Wireless Sensor Networks and Applications, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Robert Szewczyk, Joseph Polastre, Alan Mainwaring, and David Culler. Lessons from a sensor network expedition. In First European Workshop on Wireless Sensor Networks (EWSN '04), January 2004.]]Google ScholarGoogle ScholarCross RefCross Ref
  18. Matt Welsh, Dan Myung, Mark Gaynor, and Steve Moulton. Resuscitation monitoring with a wireless sensor network. Supplement to Circulation: Journal of the American Heart Association, October 2003.]]Google ScholarGoogle Scholar
  19. D. Whiting, R. Housley, and N. Ferguson. Counter with cbc-mac (ccm). RFC 3610, September 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Security considerations for IEEE 802.15.4 networks

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          WiSe '04: Proceedings of the 3rd ACM workshop on Wireless security
          October 2004
          104 pages
          ISBN:158113925X
          DOI:10.1145/1023646

          Copyright © 2004 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 October 2004

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate10of41submissions,24%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader