Implementation options of key retrieval procedures for the IEEE 802.15.4 Wireless Personal Area Networks security subsystem
Date
2019-02-26
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Lviv Politechnic Publishing House
Abstract
The paper aims at providing the technical
investigation on implementation options for the key retrieval
security procedures and consequent security subsystem
architecture in the IEEE 802.15.4 compatible devices. Since
the security procedures typically consume most processing
capacity of IEEE 802.15.4 device, an efficient implementation
of the security subsystem is essential. A brief functional
overview of the key retrieval procedures has been provided.
General investigations on key retrieval procedures
implementation have been performed. Three general
approaches for implementation of key retrieval procedures in
the security subsystem have been considered: a) software
implementation; b) hardware implementation; and c)
hardware-software implementation. The aim is to determine
optimum implementation approach corresponding to low-cost
and low-power consumption requirements. An expediency of
hardware and software implementation of the key retrieval procedures has been estimated.
Description
Keywords
Wireless Personal Area Networks, IEEE 802.15.4, key retrieval, wireless security
Citation
Melnyk V. Implementation options of key retrieval procedures for the IEEE 802.15.4 Wireless Personal Area Networks security subsystem / Viktor Melnyk // Advances in Cyber-Physical Systems : scientific journal. — Львів : Lviv Politechnic Publishing House, 2019. — Vol 4. — No 1. — P. 42–54.