Implementation options of key retrieval procedures for the IEEE 802.15.4 Wireless Personal Area Networks security subsystem
Lviv Politechnic Publishing House
The paper aims at providing the technical investigation on implementation options for the key retrieval security procedures and consequent security subsystem architecture in the IEEE 802.15.4 compatible devices. Since the security procedures typically consume most processing capacity of IEEE 802.15.4 device, an efficient implementation of the security subsystem is essential. A brief functional overview of the key retrieval procedures has been provided. General investigations on key retrieval procedures implementation have been performed. Three general approaches for implementation of key retrieval procedures in the security subsystem have been considered: a) software implementation; b) hardware implementation; and c) hardware-software implementation. The aim is to determine optimum implementation approach corresponding to low-cost and low-power consumption requirements. An expediency of hardware and software implementation of the key retrieval procedures has been estimated.
Wireless Personal Area Networks, IEEE 802.15.4, key retrieval, wireless security
Melnyk V. Implementation options of key retrieval procedures for the IEEE 802.15.4 Wireless Personal Area Networks security subsystem / Viktor Melnyk // Advances in Cyber-Physical Systems : scientific journal. — Львів : Lviv Politechnic Publishing House, 2019. — Vol 4. — No 1. — P. 42–54.