Implementation of XTEA Encryption Protocol based on IEEE 802.15.4 Wireless Systems

12/27/2019
by   Davyd Kurbanmuradov, et al.
0

The problem of data security in IEEE 802.15.4 systems on Pololu Wixel devices is solved, examples of hardware and software implementation of encryption and decryption of different devices on the same platform are given. The proposed approaches can be used in the development, implementation and operation of wireless enterprise, industrial, and personal systems. Possible areas of development for this work are related to research on improving encryption algorithms (increasing key length, using asymmetric ciphers, etc.), comparing their performance, and implementing a complete data exchange protocol. During the work there were problems in the implementation of encryption algorithms on low-power processors. During the work, a number of issues were resolved regarding type reduction, addressing, memory space, buffer overflow, and more. Issues resolved with reconciliation of receiver and transmitter operation. Examples of hardware and software implementation of encryption and decryption of different devices based on Pololu Wixel are given in the paper. The basic task of building a secure communication channel by encrypting data in the channel was solved and firmware and application software were obtained to fully validate the devices. In addition, this work has great application potential, since the implementation of encryption in existing systems will have a small impact on implementation and will not affect the project budget, but will dramatically improve the security of data transmission in these networks. The proposed approaches can be used in the development, implementation and operation of wireless enterprise, industrial, and personal systems. Continuing this work may be to test the performance of other protocols on this and similar hardware for systems that may be embedded in short-range wireless communication projects of short-range standards.

READ FULL TEXT

page 4

page 8

page 9

research
06/17/2019

Danger of using fully homomorphic encryption: A look at Microsoft SEAL

Fully homomorphic encryption is a promising crypto primitive to encrypt ...
research
02/12/2020

Wi-Fi Channel Saturation as a Mechanism to Improve Passive Capture of Bluetooth Through Channel Usage Restriction

Bluetooth is a short-range wireless technology that provides audio and d...
research
07/31/2022

Secure Email Transmission Protocols – A New Architecture Design

During today's digital age, emails have become a crucial part of communi...
research
02/28/2021

HW/SW Framework for Improving the Safety of Implantable and Wearable Medical Devices

Implantable and wearable medical devices (IWMDs) are widely used for the...
research
01/13/2023

An RTL Implementation of the Data Encryption Standard (DES)

Data Encryption Standard (DES) is based on the Feistel block cipher, dev...
research
04/06/2021

RFQuack: A Universal Hardware-Software Toolkit for Wireless Protocol (Security) Analysis and Research

Software-defined radios (SDRs) are indispensable for signal reconnaissan...

Please sign up or login with your details

Forgot password? Click here to reset