{"title":"Security Architecture Technical investigation for IEEE 802.15.4 Low-Rate Wirelesspersonal Area Networks","authors":"V. Melnyk","doi":"10.23939/acps2018.02.092","DOIUrl":null,"url":null,"abstract":"The paper aims at providing the technical investigation on implementation options for the security subsystem architecture in the IEEE 802.15.4 compatible devices. Since the security procedures typically consume most processing capacity of IEEE 802.15.4 device, efficient implementation of the security subsystem is essential. A brief functional overview of the security procedures has been provided. General investigations on security procedures implementation have been performed. Three general approaches for security subsystem implementation have been considered: a) software implementation; b) hardware implementation; and c) hardware-software implementation. The aim is to determine optimum implementation approach corresponding to low-cost and low-power consumption requirements. A hardwaresoftware approach has been selected for the security subsystem implementation, and an expediency of the security procedures of hardware and software implementation has been estimated.","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Advances in Cyber-Physical Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23939/acps2018.02.092","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The paper aims at providing the technical investigation on implementation options for the security subsystem architecture in the IEEE 802.15.4 compatible devices. Since the security procedures typically consume most processing capacity of IEEE 802.15.4 device, efficient implementation of the security subsystem is essential. A brief functional overview of the security procedures has been provided. General investigations on security procedures implementation have been performed. Three general approaches for security subsystem implementation have been considered: a) software implementation; b) hardware implementation; and c) hardware-software implementation. The aim is to determine optimum implementation approach corresponding to low-cost and low-power consumption requirements. A hardwaresoftware approach has been selected for the security subsystem implementation, and an expediency of the security procedures of hardware and software implementation has been estimated.