TY - JOUR
T1 - Harvesting and Threat Aware Security Configuration Strategy for IEEE 802.15.4 Based IoT Networks
AU - Mao, Bomin
AU - Kawamoto, Yuichi
AU - Liu, Jiajia
AU - Kato, Nei
N1 - Funding Information:
The research results have been achieved by "Research and Development on Intellectual ICT System for Disaster Response and Recovery", the Commissioned Research of National Institute of Information and Communication Technology (NICT), Japan.
Publisher Copyright:
© 1997-2012 IEEE.
PY - 2019/11
Y1 - 2019/11
N2 - IEEE 802.15.4 protocol defines multiple security specifications to provide different levels of safety protection in the link layer. How to choose the security level for harvesting enabled Internet of Things (IoT) nodes is an important problem as it decides the security protection and also impacts on network performance. Considering the dynamics of network threats and harvesting performance, in this letter, a harvesting and threat aware security configuration strategy is proposed. Simulation results illustrate that the proposal can choose the suitable security configuration according to the network security threats, service requirements, and the variable harvested energy. Comparison with conventional methods, the proposed strategy can extend the working time, resulting in improved network performance. Moreover, the proposed security configuration method can also meet the diversified service requirements.
AB - IEEE 802.15.4 protocol defines multiple security specifications to provide different levels of safety protection in the link layer. How to choose the security level for harvesting enabled Internet of Things (IoT) nodes is an important problem as it decides the security protection and also impacts on network performance. Considering the dynamics of network threats and harvesting performance, in this letter, a harvesting and threat aware security configuration strategy is proposed. Simulation results illustrate that the proposal can choose the suitable security configuration according to the network security threats, service requirements, and the variable harvested energy. Comparison with conventional methods, the proposed strategy can extend the working time, resulting in improved network performance. Moreover, the proposed security configuration method can also meet the diversified service requirements.
KW - energy harvesting
KW - Internet of Things (IoT)
KW - security
UR - http://www.scopus.com/inward/record.url?scp=85077771620&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85077771620&partnerID=8YFLogxK
U2 - 10.1109/LCOMM.2019.2932988
DO - 10.1109/LCOMM.2019.2932988
M3 - Article
AN - SCOPUS:85077771620
SN - 1089-7798
VL - 23
SP - 2130
EP - 2134
JO - IEEE Communications Letters
JF - IEEE Communications Letters
IS - 11
M1 - 8786931
ER -