ABSTRACT
The IEEE 802.15.4 specification outlines a new class of wireless radios and protocols targeted at low power devices, personal area networks, and sensor nodes. The specification includes a number of security provisions and options. In this paper, we highlight places where application designers and radio designers should exercise care when implementing and using 802.15.4 devices. Specifically, some of the 802.15.4 optional features actually reduce security, so we urge implementors to ignore those extensions. We highlight difficulties in safely using the security API and provide recommendations on how to change the specification to make it less likely that people will deploy devices with poor security configurations.
- Zigbee alliance. http://www.zigbee.org.]]Google Scholar
- Weak crc allows packet injection into ssh sessions encrypted with block ciphers. Computer Emergency Response Team (CERT), June 1998. VU 13877.]]Google Scholar
- Smart buildings admit their faults. Lab Notes: Research from the College of Engineering, UC Berkeley, http://www.coe.berkeley.edu/labnotes/1101smartbuildings.html, November 2001.]]Google Scholar
- Weak crc allows last block of idea-encrypted ssh packet to be changed without notice. Computer Emergency Response Team (CERT), January 2001. VU 315308.]]Google Scholar
- Weak crc allows rc4 encrypted ssh1 packets to be modified without notice. Computer Emergency Response Team (CERT), January 2001. VU 25309.]]Google Scholar
- Wireless medium access control and physical layer specifications for low-rate wireless personal area networks. IEEE Standard, 802.15.4-2003, May 2003. ISBN 0-7381-3677-5.]]Google Scholar
- Atmel at86rf210 z-link transceiver data sheet. http://www.atmel.com/dyn/resources/prod_documents/doc5033.pdf, 2004.]]Google Scholar
- Chipcon cc2420 data sheet. http://www.chipcon.com/files/CC2420_Data_Sheet_1_1.pdf, 2004.]]Google Scholar
- Motorola mc13192 datasheet. http://e-www.motorola.com/files/rf_if/doc/data_sheet/MC13192DS.pdf, 2004.]]Google Scholar
- M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation. In Proceedings of 38th Annual Symposium on Foundations of Computer Science (FOCS 97), 1997.]] Google ScholarDigital Library
- Mihir Bellare, Joe Kilian, and Phillip Rogaway. The Security of the Cipher Block Chaining Message Authentication Code. Journal of Computer and System Sciences, 61(3):362--399, December 2000.]] Google ScholarDigital Library
- Steven M. Bellovin. Problem areas for the IP security protocols. In Proceedings of the Sixth Usenix UNIX Security Symposium, 1996.]] Google ScholarDigital Library
- Nikita Borisov, Ian Goldberg, and David Wagner. Intercepting mobile communications: The insecurity of 802.11. In MOBICOM, 2001.]] Google ScholarDigital Library
- G.L. Duckworth, D.C. Gilbert, and J.E. Barger. Acoustic counter-sniper system. In SPIE International Symposium on Enabling Technologies for Law Enforcement and Security.]]Google Scholar
- V. Rijmen J. Daemen. The Block Cipher Rijndael. In J.-J. Quisquater and B. Schneier, editors, Smart Card Research and Applications, LNCS 1820, pages 288--296. Springer-Verlag, 2000.]] Google ScholarDigital Library
- Alan Mainwaring, Joseph Polastre, Robert Szewczyk, and David Culler. Wireless sensor networks for habitat monitoring. In First ACM International Workshop on Wireless Sensor Networks and Applications, 2002.]] Google ScholarDigital Library
- Robert Szewczyk, Joseph Polastre, Alan Mainwaring, and David Culler. Lessons from a sensor network expedition. In First European Workshop on Wireless Sensor Networks (EWSN '04), January 2004.]]Google ScholarCross Ref
- Matt Welsh, Dan Myung, Mark Gaynor, and Steve Moulton. Resuscitation monitoring with a wireless sensor network. Supplement to Circulation: Journal of the American Heart Association, October 2003.]]Google Scholar
- D. Whiting, R. Housley, and N. Ferguson. Counter with cbc-mac (ccm). RFC 3610, September 2003.]] Google ScholarDigital Library
Index Terms
- Security considerations for IEEE 802.15.4 networks
Recommendations
Adaptive GTS allocation in IEEE 802.15.4 for real-time wireless sensor networks
The IEEE 802.15.4 standard is able to achieve low-power transmissions in low-rate and short-distance Wireless Personal Area Networks (WPANs). It supports a Guaranteed Time Slots (GTSs) allocation mechanism for time-critical and delay-sensitive data ...
A Simple Time Shift Scheme for Beacon Broadcasting Based on Cluster-Tree IEEE 802.15.4 Low-Rate WPANs
Wireless sensor networks based on the IEEE 802.15.4 standard is able to carry out short-distance transmissions in low-rate and low-power wireless personal area networks. To access the channel, it uses the slotted carrier sense multiple access with ...
Modeling IEEE 802.15.4 based wireless sensor network with packet retry limits
PE-WASUN '08: Proceedings of the 5th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networksIn this paper, an analytical model for the beacon-enabled slotted CSMA-CA mechanism of IEEE 802.15.4 wireless sensor network is designed. The current mechanism of IEEE 802.15.4 CSMA-CA is extended to include the retransmission limit of the nodes with ...
Comments