Harvesting and Threat Aware Security Configuration Strategy for IEEE 802.15.4 Based IoT Networks

Bomin Mao, Yuichi Kawamoto, Jiajia Liu, Nei Kato

Research output: Contribution to journalArticlepeer-review

36 Citations (Scopus)

Abstract

IEEE 802.15.4 protocol defines multiple security specifications to provide different levels of safety protection in the link layer. How to choose the security level for harvesting enabled Internet of Things (IoT) nodes is an important problem as it decides the security protection and also impacts on network performance. Considering the dynamics of network threats and harvesting performance, in this letter, a harvesting and threat aware security configuration strategy is proposed. Simulation results illustrate that the proposal can choose the suitable security configuration according to the network security threats, service requirements, and the variable harvested energy. Comparison with conventional methods, the proposed strategy can extend the working time, resulting in improved network performance. Moreover, the proposed security configuration method can also meet the diversified service requirements.

Original languageEnglish
Article number8786931
Pages (from-to)2130-2134
Number of pages5
JournalIEEE Communications Letters
Volume23
Issue number11
DOIs
Publication statusPublished - 2019 Nov

Keywords

  • energy harvesting
  • Internet of Things (IoT)
  • security

Fingerprint

Dive into the research topics of 'Harvesting and Threat Aware Security Configuration Strategy for IEEE 802.15.4 Based IoT Networks'. Together they form a unique fingerprint.

Cite this