Power-Efficient Architecture of Zigbee Security Processing

In general, the cryptographic operation in wireless devices which have low memory and low computing power causes the system overhead, so that it badly affects the performance of other tasks. Therefore, it is positively necessary to implement the security hardware which is dedicated to the cryptograp...

Full description

Saved in:
Bibliographic Details
Published in2008 IEEE International Symposium on Parallel and Distributed Processing with Applications pp. 773 - 778
Main Authors Jiho Kim, Jungyu Lee, Ohyoung Song
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.12.2008
Subjects
Online AccessGet full text

Cover

Loading…
Abstract In general, the cryptographic operation in wireless devices which have low memory and low computing power causes the system overhead, so that it badly affects the performance of other tasks. Therefore, it is positively necessary to implement the security hardware which is dedicated to the cryptographic operation. Early researches about the security hardware architectures make design metrics with data throughput, gate usage, and power consumption to demonstrate the efficiency of their architectures. In this paper, we provide an efficient hardware architecture of the security processing for ZigBee, which satisfies the constraints IEEE 802.15.4 standard requires. These requirements mainly consist of the critical response time, the verification delay, and the throughput. In experiments, we implemented the security processing for ZigBee that used fewer logic gates and consumed low power than other earlier ZigBee chips and fulfilled the standard requirements with considerable margins.
AbstractList In general, the cryptographic operation in wireless devices which have low memory and low computing power causes the system overhead, so that it badly affects the performance of other tasks. Therefore, it is positively necessary to implement the security hardware which is dedicated to the cryptographic operation. Early researches about the security hardware architectures make design metrics with data throughput, gate usage, and power consumption to demonstrate the efficiency of their architectures. In this paper, we provide an efficient hardware architecture of the security processing for ZigBee, which satisfies the constraints IEEE 802.15.4 standard requires. These requirements mainly consist of the critical response time, the verification delay, and the throughput. In experiments, we implemented the security processing for ZigBee that used fewer logic gates and consumed low power than other earlier ZigBee chips and fulfilled the standard requirements with considerable margins.
Author Jiho Kim
Jungyu Lee
Ohyoung Song
Author_xml – sequence: 1
  surname: Jiho Kim
  fullname: Jiho Kim
  organization: Sch. of Electr. & Electron. Eng., Chung-Ang Univ., Seoul, South Korea
– sequence: 2
  surname: Jungyu Lee
  fullname: Jungyu Lee
  organization: Sch. of Electr. & Electron. Eng., Chung-Ang Univ., Seoul, South Korea
– sequence: 3
  surname: Ohyoung Song
  fullname: Ohyoung Song
  organization: Sch. of Electr. & Electron. Eng., Chung-Ang Univ., Seoul, South Korea
BookMark eNotjE1Lw0AUABdswbbm6MlL_kDq26_sW2-h1FooGKhevJRk921d0UQ2KdJ_r6KnYWCYOZt0fUeMXXNYcg72druvq6UAwB-VFyyzBsGUVktlOE7YTHCNheUGp2z-m1lAYdUly4bhDQAkR7QWZuyu7r8oFesQoovUjXmV3GscyY2nRHkf8pd4bInyPblTiuM5r1PvaBhid7xi09C8D5T9c8Ge79dPq4di97jZrqpdEbnRY-Fli41UUnGtiKAkKm0QZRNa9E4BGWGs99Jwz6VE41BrhcF620AoW-7lgt38fSMRHT5T_GjS-aCM0EJo-Q3o4Esj
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ISPA.2008.113
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Xplore Digital Library
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore Digital Library
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EndPage 778
ExternalDocumentID 4725225
Genre orig-research
GroupedDBID 6IE
6IF
6IH
6IK
6IL
6IN
AAJGR
ACGFS
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IPLJI
OCL
RIE
RIL
ID FETCH-LOGICAL-i175t-d3b8a3434154ee06ee69f26afb8dc40e7279dd371d13387c85548f9d9a0f6b1d3
IEDL.DBID RIE
ISBN 9780769534718
0769534716
ISSN 2158-9178
IngestDate Wed Jun 26 19:22:11 EDT 2024
IsPeerReviewed false
IsScholarly false
LCCN 2008908294
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-d3b8a3434154ee06ee69f26afb8dc40e7279dd371d13387c85548f9d9a0f6b1d3
PageCount 6
ParticipantIDs ieee_primary_4725225
PublicationCentury 2000
PublicationDate 2008-Dec.
PublicationDateYYYYMMDD 2008-12-01
PublicationDate_xml – month: 12
  year: 2008
  text: 2008-Dec.
PublicationDecade 2000
PublicationTitle 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications
PublicationTitleAbbrev ISPDPA
PublicationYear 2008
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0003188990
ssj0001967101
Score 1.4455241
Snippet In general, the cryptographic operation in wireless devices which have low memory and low computing power causes the system overhead, so that it badly affects...
SourceID ieee
SourceType Publisher
StartPage 773
SubjectTerms Communication system security
Computer architecture
Cryptography
Data security
Delay
Energy consumption
Hardware
Power system security
Throughput
ZigBee
Title Power-Efficient Architecture of Zigbee Security Processing
URI https://ieeexplore.ieee.org/document/4725225
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFG-AkydUMH6nB48WtnXrWm_EQNAEQ4IkxAtZ21dDTMAYuPjX-9qNjxgP3tYdmq173fvo7_1-hNxBkliDpsO44pahUThWCGOZy6yx2qrChFL26EUMp-nzLJvVyP2uFwYAAvgMOv4ynOXbldn4Ulk3zRMMF7I6qcsoKXu19vUUJdBZxrsx2iqmEr7Egk7N7-lcllm7yjj-kEVFvrMdyz3_ZvdpMu6VKMvYqx4cqK4EpzNoktH2cUusyUdns9Yd8_2LyfG_73NM2vv2PjreOa4TUoPlKWlu9R1otd1b5GHsJdRYP7BM4Ey0d3DqQFeOvi3eNQCdVBp4tOo6wEnbZDrovz4OWaW1wBYYQKyZ5VoWPEWflqUAkQAQyiWicFpak0aAYY6yluex9Ultbjy6TTqFHzNyQseWn5HGcrWEc0JFkcbSCcWliVPPC2xckWQFJLF1gmtxQVp-KeafJZ3GvFqFy79vX5GjANEICJJr0lh_beAG44C1vg0G8AMb3qry
link.rule.ids 310,311,786,790,795,796,802,27958,55109
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFG8QD3pCBeO3PXi0wNatW70RAwEFQgIkxAvZ2ldDTMCYcfGv97UbHzEevK07NFv3uvfR3_v9CHkA39cKTYdxyTVDozAsEUozE2qlUy0T5UrZg6HoToOXWTgrkcdtLwwAOPAZ1O2lO8vXK7W2pbJGEPkYLoQH5BD9fFPm3Vq7iooU6C697RitFZMJW2RBt2Z3dRTnebsMOf6SRUG_sxnHOwbORm88auU4S8_qHuzprji306mQweaBc7TJR32dpXX1_YvL8b9vdEJquwY_Otq6rlNSguUZqWwUHmix4avkaWRF1Fjb8UzgTLS1d-5AV4a-Ld5TADouVPBo0XeAk9bItNOePHdZobbAFhhCZEzzNE54gF4tDACaAkBI44vEpLFWQRMw0JFa88jTNq2NlMW3xUbi52wakXqan5PycrWEC0JFEnixEZLHygssM7AyiR8m4HvaCJ6KS1K1SzH_zAk15sUqXP19-54cdSeD_rzfG75ek2MH2HB4khtSzr7WcItRQZbeOWP4AVvUrkg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2008+IEEE+International+Symposium+on+Parallel+and+Distributed+Processing+with+Applications&rft.atitle=Power-Efficient+Architecture+of+Zigbee+Security+Processing&rft.au=Jiho+Kim&rft.au=Jungyu+Lee&rft.au=Ohyoung+Song&rft.date=2008-12-01&rft.pub=IEEE&rft.isbn=9780769534718&rft.issn=2158-9178&rft.spage=773&rft.epage=778&rft_id=info:doi/10.1109%2FISPA.2008.113&rft.externalDocID=4725225
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2158-9178&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2158-9178&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2158-9178&client=summon