Key Exchange in 802.15.4 Networks and Its Performance Implications

  • Moazzam Khan
  • Fereshteh Amini
  • Jelena Mišić
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4325)


The IEEE 802.15.4 specification is a recent low data rate wireless personal area network standard. While basic security services are provided for, there is a lack of more advanced techniques which are indispensable in modern personal area network applications. In addition, performance implications of those services are not known. In this paper, we describe a secure data exchange protocol based on the Zigbee specification and built on top of 802.15.4 link layer. This protocol includes a key exchange mechanism. Then, we evaluate the overhead of this scheme under different application scenarios. Initial results show the range of network and traffic parameters wherein the proposed scheme is feasible to use.


Wireless Sensor Network Data Packet Message Authentication Code Access Probability Wireless Personal Area Network 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Standard for part 15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications for low rate wireless personal area networks (WPAN). IEEE Std. 802.15.4, IEEE (2003)Google Scholar
  2. 2.
    Stallings, W.: Cryptography and Network Security: Principles and Practice. Prentice Hall, Upper Saddle River (2003)Google Scholar
  3. 3.
    ZigBee specification (ZigBee document 053474r06, version 1.0). ZigBee Alliance (2004)Google Scholar
  4. 4.
    Sastry, N., Wagner, D.: Security considerations for IEEE 802.15.4 networks. In: WiSe 2004: Proceedings of the 2004 ACM workshop on Wireless security, pp. 32–42 (2004)Google Scholar
  5. 5.
    Bellare, M., Kilian, J., Rogaway, P.: The security of the cipher block chaining message authentication code. Computer and System Sciences 61, 362–399 (2000)MATHCrossRefMathSciNetGoogle Scholar
  6. 6.
    Whiting, D., Housley, R., Ferguson, N.: Counter with cbc-mac (CCM) (2003),
  7. 7.
    Menezes, A., Oorschot, P.V., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)MATHGoogle Scholar
  8. 8.
    FIPS Pub 198, The Keyed-Hash Message Authentication Code (HMAC). Federal Information Processing Standards Publication 198, US Department of Commerce/N.I.S.T. (2002)Google Scholar
  9. 9.
    ANSI X9.63-2001, Public Key Cryptography for the Financial Services Industry- Key Agreement and Key Transport Using Elliptic Curve Cryptography. American Bankers Association (2001)Google Scholar
  10. 10.
    RSoft Design Inc.: Artifex v.4.4.2 (2003)Google Scholar
  11. 11.
    Shafi, S.: Performance of a beacon enabled IEEE 802.15.4-compliant network. Master’s thesis, Department of Computer Science, University of Manitoba, Winnipeg, Canada (2005)Google Scholar
  12. 12.
    Mišić, J., Shafi, S., Mišić, V.B.: Performance of a beacon enabled IEEE 802.15.4 cluster with downlink and uplink traffic. IEEE Transactions on Parallel and Distributed Systems 17, 1–16 (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Moazzam Khan
    • 1
  • Fereshteh Amini
    • 1
  • Jelena Mišić
    • 1
  1. 1.Department of Computer ScienceUniversity of ManitobaWinnipegCanada

Personalised recommendations