Melnyk, Viktor2020-02-182020-02-182019-02-262019-02-26Melnyk V. Implementation options of key retrieval procedures for the IEEE 802.15.4 Wireless Personal Area Networks security subsystem / Viktor Melnyk // Advances in Cyber-Physical Systems : scientific journal. — Львів : Lviv Politechnic Publishing House, 2019. — Vol 4. — No 1. — P. 42–54.https://ena.lpnu.ua/handle/ntb/45650The paper aims at providing the technical investigation on implementation options for the key retrieval security procedures and consequent security subsystem architecture in the IEEE 802.15.4 compatible devices. Since the security procedures typically consume most processing capacity of IEEE 802.15.4 device, an efficient implementation of the security subsystem is essential. A brief functional overview of the key retrieval procedures has been provided. General investigations on key retrieval procedures implementation have been performed. Three general approaches for implementation of key retrieval procedures in the security subsystem have been considered: a) software implementation; b) hardware implementation; and c) hardware-software implementation. The aim is to determine optimum implementation approach corresponding to low-cost and low-power consumption requirements. An expediency of hardware and software implementation of the key retrieval procedures has been estimated.42-54enWireless Personal Area NetworksIEEE 802.15.4key retrievalwireless securityImplementation options of key retrieval procedures for the IEEE 802.15.4 Wireless Personal Area Networks security subsystemArticle© Національний університет “Львівська політехніка”, 2019© Melnyk V., 201913Melnyk V. Implementation options of key retrieval procedures for the IEEE 802.15.4 Wireless Personal Area Networks security subsystem / Viktor Melnyk // Advances in Cyber-Physical Systems : scientific journal. — Lviv Politechnic Publishing House, 2019. — Vol 4. — No 1. — P. 42–54.